Answer:
hehe
Explanation:
Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
Answer:
Trace Precedent
Explanation:
Trace Precedent is a Microsoft Excel tool that is mostly used in auditing work to evaluate the connection or linkage between the cells in a spreadsheet. It is used to display the cells that are referred to by a formula in the selected cell. This is to locate the basis of an error in knowing how the formulas are adapted.
This can be done by clicking on the Formulas tab, then click on Formulas Auditing, then click on Trace Precedents.
Hence, in this case, the correct answer is TRACE PRECEDENTS.
The New Slide command on the Ribbon lets you choose ________.
Question 3 options:
slide dimensions
print settings
slide layouts
transitions
Answer: slide layouts
Explanation:
Just took the test hope this helps ❤️✨
The New Slide command on the Ribbon lets you choose slide layouts. Thus, option C is correct.
What is New Slide?
Make your arrangement selection in the New Slide message box for your new presentation. Study slide layouts in more detail. Choose Add Slide. That new slide has now been added, allowing you to start adding information by clicking within a placeholder.
You may select slide patterns using Ribbon's New Slide command. To have the new slide display just below the selected slide there in the slide window, click on that slide. On the Insert tab, in the Slides grouping, choose the New Slide option.
The fresh slide needs to be displayed beneath the current slide. Select the initial of the two rolls and initiatives Slide to insert a new slideshow seen between existing ones. Therefore, option C is the correct option.
Learn more about New Slide, here:
https://brainly.com/question/1372598
#SPJ2
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.
For this exercise, you are going to write a recursive function that counts down to a Blastoff!
Your recursive function will not actually print. It will return a String that can be printed from the main function. Each recursive call will add on to that string.
In your main function, prompt the user for a starting value, then print the results.
Sample Output
Please enter a number to start:
5
5 4 3 2 1 Blastoff!
import java.util.Scanner;
public class Countdown
{
public static void main(String[] args)
{
// Start here
}
public static String countdown(int number)
{
// Base case - return Blastoff!
// Recursive call
}
}
Answer:
import java.util.Scanner;
public class Countdown {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int n;
System.out.print("Please enter a number to start: ");
n = input.nextInt();
System.out.print(countdown(n));
}
public static String countdown(int number) {
if(number>0) { return " "+number+countdown(number-1); }
else { return " Blastoff!"; }
}
}
Explanation:
The main method begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This declares an integer variable n
int n;
This prompts user for a number
System.out.print("Please enter a number to start: ");
This gets user input n
n = input.nextInt();
This calls the countdown function
System.out.print(countdown(n));
}
The countdown function begins here
public static String countdown(int number) {
This is the base case where input number is greater than 0
if(number>0) { return " "+number+countdown(number-1); }
This ends the recursion
else { return " Blastoff!"; }
}
For all programs, you should write a small amount of code and _______
it before moving on to add more code?
Answer:
test
Explanation:
One newly popular development paradigm is "test-driven development"; which borrows agile engineering principles in architecting project components.
You already know how to use lists. What is the index of 5 in the following list? [2, 3, 5, 1, 6]
Answer:
it's 2
Explanation:
it goes 0, 1, 2.
The index of 5 in the following list [2, 3, 5, 1, 6] is 2. The correct option is b.
What is a list in computer language?A list is a collection of items that can be ordered or unordered. Adding, removing, and storing items are just a few of the many uses for lists. However, the software needs adequate memory to keep up with changes made to the list in order for the programmer to do the various duties for the list.
An ordered group of values is a list. The components of a list are referred to as its elements or items. An ordered list of numbers (or other items like geometric objects) is referred to as a sequence, and it frequently follows a certain pattern or function.
A list is a series of different variables that are all gathered under one common name. Rather than creating a program with numerous variables,
Therefore, the correct option is b, 2.
To learn more about the list, refer to the link:
https://brainly.com/question/14297987
#SPJ2
The question is incomplete. Your most probably complete question is given below:
O 4
02
O 1
03
how to earn money fast in adopt me?
Answer: If you want money in adopt me quickly, you could become a baby and buy a pet and take care of it and yourself. Also, you could purchase adopt me bucks with robux.
Explanation:
In python, Write a function (name: identi Substring) that, given a string S, returns an integer that represents the numbers of ways in which we can select a non-empty substring of S where all of the characters of the substring are identical. Two substrings with the same letters but different in locations are still considered different. For example, the string "zzzyz" contains 8 such substrings. Four instances of "z", two of "zz", one of "zzz" and one instance of "y". String "k" contains only one such substring:"k". The length of S will be between 1 and 100, inclusive. Each character in S will be a lowercase letter (a-z).
Answer:
def identiSubstring(S):
n = len(S)
inst = ""
count= 0
for Len in range(1,n+1):
for i in range(n-Len+1):
for k in range(i,i + Len):
inst =inst+S[k]
if(len(set(inst)) == 1):
count = count + 1
inst = ""
return count
S = input("Enter a string: ")
if(len(S)>=1 and len(S)<=100):
print("There are "+str(identiSubstring(S.lower()))+" possible occurrences")
else:
print("Length is invalid")
Explanation:
This line defines the required function
def identiSubstring(S):
This calculates the length of string S
n = len(S)
This initializes an instance of the required string to an empty string
inst = ""
This initializes count to 0
count= 0
This following iterations iterate through the length of the string
for Len in range(1,n+1):
for i in range(n-Len+1):
for k in range(i,i + Len):
This gets an instance of string S
inst =inst+S[k]
This checks if the characters of the instance are identical
if(len(set(inst)) == 1):
If yes, the counter is incremented by 1
count = count + 1
This instance is reset back to an empty string
inst = ""
This returns the number of instances of the substring
return count
The main begins here
This prompt user for a string
S = input("Enter a string: ")
This checks for valid length
if(len(S)>=1 and len(S)<=100):
If length is between 1 and 100 (inclusive), this calls the identiSubstring function
print("There are "+str(identiSubstring(S.lower()))+" possible occurrences")
If otherwise
else:
This prints invalid length
print("Length is invalid")
See attachment
Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL
Answer:
hi
Explanation:
dumb question but...for christmas should i get the animal crossing switch or the forrnite one which has a lot and a colored doc?
Answer:
Its your decision but I would go with animal crossing!
what type of computer is an ATM attached to ?
which port is used for RDP
Answer:
RDP servers are built into Windows operating systems; an RDP server for Unix and OS X also exists. By default, the server listens on TCP port 3389 and UDP port 3389. Microsoft currently refers to their official RDP client software as Remote Desktop Connection, formerly "Terminal Services Client".
Explanation:
Usually using TCP port 3389, the Remote Desktop Technology (RDP) is a Microsoft-exclusive protocol that permits remote connections to other computers.
What is RDP?RDP stands for remote desktop protocol. It is defined as a proprietary protocol created by Microsoft that offers a graphical user interface for connecting to another machine over a network connection Using the Remote Desktop Protocol, remote users can access and utilize Windows on a device in a different location (RDP).
The server often listens on both UDP port 3389 and TCP port 3389. It makes use of port 443, which employs an SSL tunnel to send data. In order to increase network security, port 3389, which is used for Remote Desktop connections, is restricted.
Thus, usually using TCP port 3389, the Remote Desktop Technology (RDP) is a Microsoft-exclusive protocol that permits remote connections to other computers.
To learn more about RDP, refer to the link below:
https://brainly.com/question/3895875
#SPJ2
Write an algorithm and draw a flowchart to enter the length and width of any room then check if length and width are equal find area and circumference of the square room. Otherwise, find the area and circumference of the rectangle room.
Answer: i have no clue
Explanation:
if opening capital is ks 70000 and closing capital is ks 90000 what is the amount of profit or loss
Explanation:
if opening capital is ks 70000 and closing capital is ks 90000 what is the amount of profit or loss
A junior account manager owns an account and creates a new opportunity to manage a complex deal. She needs the help of the product specialist and solution engineer.
Given the size of this deal, she knows the account is likely to be reassigned to a senior Account manager in the near future.
What is the optimal way for the Junior Account manager to share the opportunity, given the private sharing model?
Manual share on the account
Opportunity Team
Manual share on the opportunity
Create owner-based sharing rule
Answer: I'd say She should share by Email, Text, or call.
Question 24 Multiple Choice Worth 5 points)
(01.04 MC)
Zavier needs to compress several files. Which file type will allow him to do this?
ODOC
GIF
OJPG
O ZIP
Answer:
ZIP
Explanation:
ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections
TBH:
it may be O ZIP but i've never heard of it.
Answer:
Zip (D)
Explanation:
Took The Test
Consider the following code:
a = 3
b = 2
print (a ** b)
What is output?
A.9
B.8
C.1
D.6
Answer:
C
Explanation:
*i'm really bad at explaining* the letters is going up like- a b c d e f g and the numbers are going down like- 3 2 1 0
Answer:
A. 9
Explanation:
the symbol (**) means to put to the exponent to. So in this case, 3**2 is the same as 3^2 or 3 squared, 3x3=9. So that is the answer.
Krista needs to configure the default paste options in PowerPoint 2016. Which area of the Options dialog box will she need to use to configure these options?
Proofing
General
Save
Advanced
Answer:
[tex]\red{\underline{\underline{\sf{Answer :-}}}} [/tex]
★ Advanced
Answer: General
Explanation:
The Register Set that stores temporary results related to the computations are
Answer:
ooh Bhai sahab
Explanation:
ooh Bhai Yaar Mata tyo gari sanisanisanisani
cutting of trees is bad or not bad
Answer:
bad
Explanation:
it gives out air and oxygen
Amber is working as an intern at a local law firm to learn all she can about the field of law. She is having a difficult time completing her work on time because she doesn't understand everything. What can Amber do?
Ask her manager for help.
Look for another internship.
Look up information online.
Stay late to finish the work.
Answer:
i think c
Explanation:
not sure
Answer:
A . ask her manager for help.
Explanation:
April is worried that she is not a "good speller" so she plans to let the spelling checker correct all her mistakes. What would be the most helpful advice for April?
Answer:
Likely, the best option would be to use the "auto-correct" function found on Microsoft Word or Google Docs. There are other forms of spell-checking such as Grammarly or by using a dictionary.
Explanation:
They have tools meant for checking for grammatical errors and can be used to better enhance your overall writing.
Exodia
Principle of Computer Operation
Answer:
????
Explanation:
I WILL MARK BRAINLEST FOR THAT FIRST ANSWEr that is CORRECT!!!!!!!!!!!!
Which option lists the correct steps to apply a style?
1 Select the text, click the Home tab, and in the Styles Gallery, click to select a style to apply.
2 Select the text, click the Insert tab, and in the Formatting Gallery, click to select a style to apply.
3 Select the text, click the Home tab, and in the Font group, select a font, font size, and type to apply.
3 All of the options listed above are correct.
Answer:
Explanation:
Maybe all of the options listed above are correct
What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links visit the pages with hyperlinks visit all pages that appear on the navigation menu
Answer:
B. visit every page and verify all links
Explanation:
I just took the test, and only one year late.
Answer:
THe answer s b
Explanation:
Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?
Compatibility Checker
Accessibility Checker
Insights
AutoCorrect
Answer:
Accessibility Checker
Answer:
answer is accessibility checker or B on edge
Why is it important to proofread your work even after using the Spelling and Grammar tool?
To make sure you have the correct word count
To make sure your document layout is correct
To print your document correctly
To catch mistakes the spelling and grammar check will not catch
Answer:
To catch mistakes the spelling and grammar check will not catch.
Explanation:
Grammar and spelling check is not always perfect!
It is the 4th one, to catch mistakes the spelling and grammar check will not catch.
If there is a need to write code in order to help the player move through the game, which team member would create this code?
Answer:
the main programmer
Explanation:
or the person who studies the algorithm and writes the code
hence, the programmer or main programmer
A software engineer is somebody who develops, creates, maintains, tests, and evaluates software using principles of software development. The term "programmer" is sometimes used as a synonym, although it may also imply a lack of engineering degrees or abilities.
Software developers, sometimes known as software architects, collaborate closely with clients to plan and develop software. Most software engineers do not start coding, they do establish a strong foundation in programming skills in order to communicate successfully with programmers.It must cover the full software development, commencing with only an analysis of the needs and ending with the design, test, and development of the technology to suit these goals.Therefore, the answer is "Software Engineer".
Learn more:
brainly.com/question/23661471
if resistors were 10 times larger what would happen to output voltage
Answer:
is there a picture to go w the question?
Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exception in Firewall and enable WinRM. PowerShell has a cmdlet that can perform all of these tasks at once.
A. Start-PSRemoting.B. Enable-PSRemoting.C. Enable-PSSession.D. Get-PSRemoting.
Answer:
B. Enable-PSRemoting.
Explanation:
Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.
The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".