Explanation:
A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.
When you
you can use the diverse knowledge sets of a team and share a workload.
O strategize
O quantify
discriminate
I
O collaborate
Answer:
Collaborate.
Explanation:
It was correct for me!
Answer:collaborate
Explanation:
cs edgen 100%
What is computer science
Answer:
computer science is the study of computer and computing as well as theoretical and practical applications.
pls give me thanks ☺️☺️
You are given the following segment of code:Line 1: PROCEDURE printScorePairs()Line 2: {Line 3: count <-- 0Line 4: sum <-- 0Line 5: i <-- 1Line 6: scores <-- [73, 85, 100, 90, 64, 55]Line 7: REPEAT UNTIL ( i > LENGTH (scores) )Line 8: {Line 9: sum <-- scores[i] scores[i 1]Line 10: DISPLAY ( sum )Line 11: i <-- i 2Line 12: }Line 13: }The ABC company is thrifty when it comes to purchasing memory (also known as RAM) for its computers. Therefore, memory is of the utmost importance and all programming code needs to be optimized to use the least amount of memory possible. What modifications could be made to reduce the memory requirements without changing the overall functionality of the code?
Answer:
Move Line 10 to after line 12
Explanation:
Required: Modify the program
From the procedure above, the procedure prints the sum at each loop. Unless it is really necessary, or it is needed to test the program, it is not a good practice.
To optimize the program, simply remove the line at displays the sum (i.e. line 10) and place it at the end of the loop.
So, the end of the procedure looks like:
Line 10: i <-- i 2
Line 11: }
Line 12: DISPLAY ( sum )
Line 13:
Suppose you present a project and your supervisor comments that the graphics need to be a higher quality and suggests you replace a circuit board. To what circuit board is your supervisor referring?
graphics card
video card
sound card
system card
Answer:graphics card
Explanation:
Answer:
graphics card
Explanation:
Hello! So I have been practising some coding, however, there seems to be an error in my code. I have been trying to figure out what is wrong, however, I just can't seem to find it. There is no syntax error but, there seems to be a problem with my input. I am currently using repl.it and I am making a calculator. I would input something like "multiply" however, the calculator would only square. I have tried changing the variables but it just keeps coming back to the first "if" statement. I would appreciate some help.
Answer:
You OR expressions are wrong.
Explanation:
Rather than writing:
if method == "Square" or "square":
You should write:
if method == "Square" or method == "square":
The expression should evaluate to something that is true or false.
In the above case, the expression is method == "Square" or method == "square" which can are actually two sub-expressions with an or in between them:
subexpr1 or subexpr2
each of the sub-expressions should evaluate to true or false.
method == "Square" is one of those sub-expressions.
That is how an expression is broken down by the compiler.
TIP: If you would add method = method.lower() right after the input, you could simplify all the if statements by removing the uppercase variants.
Online, it is easy to think of communication as “computer to ____________” rather than “_________ to ___________”.
a.
person, computer, person
b.
computer, person, computer
c.
person, person, person
d.
computer, person, person
Online, it is easy to think of communication as “computer to computer” rather than “person to person”. Thus, option D is correct.
What is communication?It is possible to describe communication as the act of passing the information between one person or group of people to the next. Communicating facilitates easy understanding of what a different person is trying to say or convey. There are two forms of communication: both verbal and nonverbal.
With the help of communication the person can tell and feature tthe data between the person and an group. In this, that data is given to the people and the data is not given to the person but it is rather given to the person. As this data is been transferred from one computer to another and then it reaches the people.
Therefore, option D is the correct option.
Learn more about communication, here:
https://brainly.com/question/22558440
#SPJ2
which internet service is the main reason the internet has expanded and what draws newcomers to the internet?
Answer:
It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized
Social media.
The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.
These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.
Learn more in https://brainly.com/question/21765376
To copy an item, you would:
O Highlight the item, right click, and select copy
O Press Ctrl + X
O Press Ctrl + Z
O Highlight text
Define a class named Money that stores a monetary amount. The class should have two private integer variables, one to store the number of dollars and another to store the number of cents. Add accessor and mutator functions to read and set both member variables. Add another function that returns the monetary amount as a double. Write a program that tests all of your functions with at least two different Money objects.
Answer:
#include<iostream>
using namespace std;
class Money{
private:
int dollars;
int cents;
public:
Money(int d=0, int c=0){
setDollar(d);
setCent(c);
}
void setDollar(int d){
dollars = d;
}
void setCent(int c){
cents = c
}
int getDollar() {
return dollars;
}
int getCent() {
return cents;
}
double getMoney(){
return (dollars + (cents/100));
}
};
// testing the program.
int main(){
Money Acc1(3,50);
cout << M.getMoney() << endl;
Money Acc2;
Acc2.setDollars(20);
Acc2.setCents(30);
cout <<"$" << Acc2.getDollars() << "." << Acc2.getCents() << endl;
return 0;
}
Explanation:
The C++ source code defines the Money class and its methods, the class is used in the main function as a test to create the instances of the money class Acc1 and Acc2.
The object Acc2 is mutated and displayed with the "setDollar and setCent" and "getDollar and getCent" methods respectively.
h. What is recycle bin?
->
Answer:
Trash application, the Recycle Bin
Explanation historical development of computer
Answer:
Brief History Of Computer. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. ... Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built.
Explanation:
Computers and electronics play an enormous role in today's society, impacting everything from communication and medicine to science.
Although computers are typically viewed as a modern invention involving electronics, computing predates the use of electrical devices. The ancient abacus was perhaps the first digital computing device. Analog computing dates back several millennia as primitive computing devices were used as early as the ancient Greeks and Romans, the most known complex of which being the Antikythera mechanism. Later devices such as the castle clock (1206), slide rule (c. 1624) and Babbage's Difference Engine (1822) are other examples of early mechanical analog computers.
The introduction of electric power in the 19th century led to the rise of electrical and hybrid electro-mechanical devices to carry out both digital (Hollerith punch-card machine) and analog (Bush’s differential analyzer) calculation. Telephone switching came to be based on this technology, which led to the development of machines that we would recognize as early computers.
The presentation of the Edison Effect in 1885 provided the theoretical background for electronic devices. Originally in the form of vacuum tubes, electronic components were rapidly integrated into electric devices, revolutionizing radio and later television. It was in computers however, where the full impact of electronics was felt. Analog computers used to calculate ballistics were crucial to the outcome of World War II, and the Colossus and the ENIAC, the two earliest electronic digital computers, were developed during the war.
With the invention of solid-state electronics, the transistor and ultimately the integrated circuit, computers would become much smaller and eventually affordable for the average consumer. Today “computers” are present in nearly every aspect of everyday life, from watches to automobiles.
The history of computers is one that began far back 2000 years ago in the city of Babylonia where there was the use of abacus and it has grown to now the use of digital computer as it start in 1642.
What is the history of computer?The history of computers is one that is more than 200 years but in the 19th century, there was the invention of mechanical calculating machines.
Note that the The 1st generation of computers was said to have existed from the year 1940 to 1955 and now it has grown to a whole new level.
Learn more about computer from
https://brainly.com/question/24540334
#SPJ9
2. It is the art of creating computer graphics or images in art, print media, video games.
ins, televisions programs and commercials.
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.
Answer:
kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h
Explanation:
Answer:
is this even a legit question
5.18 LAB: Output numbers in reverse Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicating the number of integers that follow. For coding simplicity, follow each output integer by a comma, including the last one. Ex: If the input is: 5 2 4 6 8 10 the output is: 10,8,6,4,2, To achieve the above, first read the integers into a vector. Then output the vector in reverse.
Answer:
In C++:
#include<iostream>
#include<vector>
using namespace std;
int main(){
int len, num;
vector<int> vect;
cout<<"Length: ";
cin>>len;
for(int i = 0; i<len;i++){
cin>>num;
vect.push_back(num);}
vector<int>::iterator iter;
for (iter = vect.end() - 1; iter >= vect.begin(); iter--){
cout << *iter << ", ";}
}
Explanation:
This declares the length of vector and input number as integer
int len, num;
This declares an integer vector
vector<int> vect;
This prompts the user for length
cout<<"Length: ";
This gets the input for length
cin>>len;
The following iteration gets input into the vector
for(int i = 0; i<len;i++){
cin>>num;
vect.push_back(num);}
This declares an iterator for the vector
vector<int>::iterator iter;
The following iterates from the end to the beginning and prints the vector in reverse
for (iter = vect.end() - 1; iter >= vect.begin(); iter--){
cout << *iter << ", ";}
Cole has to edit and resize hundreds of photographs for a website. Which Adobe
software program would be the best choice to complete this task?
a.) Animate b.) Dreamweaver c.) Illustrator d.) Photoshop
2. BIOS is contained in ROM and not in RAM. Can you guess why?
Answer:
Because RAM is only used for short term storage (and doesn't contain anything that will need to be accessed often) RAM it loses its contents when turned off. So when you power on a computer, it has to start running bootup code which has to be stored in ROM
List and fully describe at least 3 examples of input devices and how they are applied in the real world. (In separate paragraphs.)
Answer:
1. Mouse
2.Graphic Tablet
3.Keyboard
Explanation:
1. A computer mouse (plural mice, rarely mouses) is a hand-held pointing device that detects two-dimensional motion relative to a surface. This motion is typically translated into the motion of a pointer on a display, which allows a smooth control of the graphical user interface of a computer.
2.Graphic tablets, because of their stylus-based interface and ability to detect some or all of pressure, tilt, and other attributes of the stylus and its interaction with the tablet, are widely considered to offer a very natural way to create computer graphics, especially two-dimensional computer graphics
3.A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.
____________ reference is used when you want to use the same calculation across multiple rows or columns.
Answer:
relative cell
Explanation:
So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3
Answer:
Relative
Explanation:
Relative reference is used when you want to use the same calculation across multiple rows or columns.
What does the abbreviation JPEG stand for?
A. Japanese Photographic Examination Group
B. Joint Photo Examination Group
C. Joint Photographic Expert Group
D. Jefferson Photo Exclusive Group
E. Jacket Photo Extension Group
Answer:
c) giant photographic experts group
Answer:
C
Explanation:
(often seen with its file extension stands for
"Joint Photographic Experts Group",
Are items a through e in the following list algorithm? If not, what qualities required of algorithms do they lack?
a. Add the first row of the following matrix to another row whose first column contains a nonzero entry. (Reminder: Columns run vertically; rows run horizontally.)
[1 2 0 4 0 3 2 4 2 3 10 22 12 4 3 4]
b. In order to show that there are as many prime numbers as there are natural numbers, match each prime number with a natural number in matching the first prime number with 1 (which is the first natural number) and the second prime number with 2, the third with 3, and so forth. If, in the end, it turns out that each prime number can be paired with each natural number, then it is shown that there are as many prime numbers as natural numbers.
c. Suppose you're given two vectors each with 20 elements and asked to perform the following operation. Take the first element of the first vector and multiply it by the first clement of the second vector. Do the same to the second elements, and so forth. Add all the individual products together to derive the dot product.
d. Lynne and Calvin are trying to decided who will take the dog for a walk. Lynne suggests that they flip a coin and pulls a quarter out of her pocket. Calvin does not trust Lynne and suspects that the quarter may be weighted (meaning that it might favor a particular outcome when tossed) and suggests the following procedure to fairly determine who will walk the dog.
1. Flip the quarter twice.
2. If the outcome is heads on the first flip and tails on the second, then I will walk the dog.
3. If the outcome is tails on the first flip, and heads on the second, then you will walk the dog.
Answer:
Following are the responses to the given points:
Explanation:
The following features must contain a well-specified algorithm:
Description [tex]\to[/tex] Exact measures described
Effective computation [tex]\to[/tex] contains steps that a computer may perform
finitude [tex]\to[/tex] It must finish algorithm.
In choice "a", there is little algorithm Because it does not stop, finiteness has already been incomplete. There is also no algorithm.
In choice "b", it needs productivity and computational burden. because it's not Enter whatever the end would be.
In choice "c", the algorithm is given the procedure. It fulfills all 3 algorithmic properties.
In choice "d", each algorithm is a defined process. Since it needs finitude.
Practice Question
What will be displayed after this
code segment is run?
count
0
REPEAT UNTIL (count = 3
count count + 1
DISPLAY
and"
DISPLAY count
"1 and 2 and 3"
"And 1 and 2 and 3"
"0 and 1 and 2"
"And 0 and 1 and 2"
Answer:
Follows are the code to the given question:
#include <stdio.h>//header file
int main()//main method
{
int count=0;//defining an integer variable
for(count=0;count<3;count++)//use for loop to count values
{
printf("%d\n",count);//print count values
}
return 0;
}
Output:
0
1
2
Explanation:
In this code, it declares the integer variable "count" which has a value of "0" and in the next step declares a loop, using the count variable to regulate count values, which is less than 3, and increases the count value, and prints its values. This variable is the count value.
The count variable holds a value of 0, and use a for loop that checks its value is less than 3, and print its value, that's why it will print the value that is 0,1, and 2.
Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the Customers table
A count of the number of orders
The total amount for each order
(Hint: First, subtract the discount amount from the price. Then, multiply by the quantity.) Return only those rows where the customer has more than 1 order. Sort the result set in descending sequence by the total amount . Hint: You will join three tables together. Returns 3rows of data.
Questions done up until #4: https://pastebin.com/LwSKknPi
all questions before and after:
Write a SELECT statement that returns these columns:
The count of the number of orders in the Orders table
The sum of the tax_amount columns in the Orders table
Returns 1 row of data.
Write a SELECT statement that returns one row for each category that has products with these columns:
The category_name column from the Categories table
The count of the products in the Products table
The list price of the most expensive product in the Products table
Sort the result set so the category with the most products appears first.
Hint: You will join two tables together. Returns 3 rows of data.
Write a SELECT statement that returns one row for each customer that has orders with these columns:
The email_address column from the Customers table
The sum of the item price in the Order_Items table multiplied by the quantity in the Order_Items table
The sum of the discount amount column in the Order_Items table multiplied by the quantity in the Order_Items table
Sort the result set in descending sequence by the item price total for each customer.
Hint: You will join three tables together. Returns 7 rows of data.
Modify the solution to exercise 4 so it only counts and totals line items that have an item_price value that’s greater than 400. Returns 2 rows of data.
Write a SELECT statement that answers this question: What is the total amount ordered for each product? Return these columns:
The product name from the Products table
The total amount for each product in the Order_Items (Hint: You can calculate the total amount by subtracting the discount amount from the item price and then multiplying it by the quantity)
Use the WITH ROLLUP operator to include a row that gives the grand total.
Hint: You will join two tables together. Returns 10 rows of data.
Write a SELECT statement that answers this question: Which customers have ordered more than one product? Return these columns:
The email address from the Customers table
The count of distinct products from the customer’s orders
Hint: You will join three tables together. . Returns 3 rows of
Answer:
Please find the attachment files of the queries:
Explanation:
In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.
Write a print statement that uses an f-string to output $5,242.83
Answer:
print("${:,.2f}".format(5242.83))
Explanation:
Given
$5,242.83
Required
Use an f string to output the above
The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)
$ means that a dollar sign be printed before the required number
., means that the number be separated with commas
2f means that the number be presented in 2 decimal places
So:
"${:,.2f}".format(number) becomes
"${:,.2f}".format(5242.83)
In a print statement, the full instruction is:
print("${:,.2f}".format(5242.83))
Consider the security of a mobile device you use
(a) Explain how transitive trust applies to your use of an operating system on a
mobile device (e.g. smartphone). Then, explain how an attacker can exploit this
transitive trust to violate the CIA properties of the software and data on your
device
Answer:
keep it private
Explanation:
Which term describes the surrounding area of this image?
The surrounding area of this image is called
Surroundings
Foreground
Background
This area is also called a
Negative
Positive
Neutral
Answer: background/negative
Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.
Create the HTML code for this
1.Font size for the text is 20px2.Background color for table dataiscyan and table headeris lightgrey.3.Text is center aligned.4.Height of the table is 200px andwidth is 500px.5.Border thickness 2px,colour black and collapsed
Answer:
index.html:
<!DOCTYPE html>
<html>
<head>
<title>Brainly</title>
<link href="style.css" rel="stylesheet" type="text/css" />
</head>
<body>
<table id="myTable">
<caption>Duty Roster for last two days</caption>
<tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>
<tr><td>Monday</td><td colspan="2">John</td></tr>
<tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>
<tr><td>Wednesday</td><td>simon</td></tr>
</table>
</body>
</html>
style.css:
#myTable {
background-color: Cyan;
border-collapse: collapse;
height: 200px;
width: 500px;
font-size: 20px;
}
#myTable td,th {
border: 2px black solid;
text-align: center;
}
#myTable td:first-child, th {
background-color: lightgray;
font-weight: bold;
}
I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?
Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==
which among the following if absent, a computer is not complete.
A. mouse
B. DVD
C. user
D. projector
Answer:
user because all the other things the computer need
One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54
Answer:
D.191.23.21.54
Explanation:
Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address
(Please heart the answer if you find it helpful, it's a motivation for me to help more people)
1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented
a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc