_____ are fields that are used to personalize a mail merge document
A. rows of a spreadsheet data source
B. Excel workbooks
C. columns of the spreadsheet data source
D. cells

Answers

Answer 1

Answer:

The answer is A; rows of a spreadsheet data source.

Explanation:


Related Questions

Which CPU characteristic when enabled, doubles the number
of instructions which can be processed at once?

Answers

Answer:

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s. Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.

The form, design and implementation of CPUs have changed over the course of their history, but their fundamental operation remains almost unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.

Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated devices are variously calledmicrocontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called “cores”; in that context, single chips are sometimes referred to as “sockets”. Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central.

Please help please help

Answers

Answer:

Bonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az

ExplanationBonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az:

Help to draw in turtle. Python

Answers

Answer:

a basic piece of code:

from turtle import *

color('red', 'yellow')

begin_fill()

while True:

   forward(200)

   left(170)

   if abs(pos()) < 1:

       break

end_fill()

done()

Explanation:

What its doing is The TurtleScreen class defines graphics windows as a playground for the drawing turtles. Its constructor needs a tkinter.Canvas or a ScrolledCanvas as argument. It should be used when turtle is used as part of some application.

The function Screen() returns a singleton object of a TurtleScreen subclass. This function should be used when turtle is used as a standalone tool for doing graphics. As a singleton object, inheriting from its class is not possible.

All methods of TurtleScreen/Screen also exist as functions, i.e. as part of the procedure-oriented interface.

RawTurtle (alias: RawPen) defines Turtle objects which draw on a TurtleScreen. Its constructor needs a Canvas, ScrolledCanvas or TurtleScreen as argument, so the RawTurtle objects know where to draw.

Derived from RawTurtle is the subclass Turtle (alias: Pen), which draws on “the” Screen instance which is automatically created, if not already present.

All methods of RawTurtle/Turtle also exist as functions, i.e. part of the procedure-oriented interface.

What is this on G00gel Documents , how do I fix it?

Answers

Answer:

Sorry but it donest show the picture

Explanation:

what does reporter failure mean on adt alarm system

Answers

On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.

How does the ADT alarm system function?

ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.

ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.

Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.

Learn more about the ADT alarm system, refer to:

https://brainly.com/question/28199257

#SPJ5

In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.

ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.

When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:

Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.

Learn more about network on:

https://brainly.com/question/29350844

#SPJ6

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan’s smartphone to overheat?
A. Bluetooth receiver is causing the smartphone to overheat.
B. The smartphone is located too close to the car’s heat vent.
C. The GPS receiver is causing the smartphone to overheat.
D. The screen has been active too long.

Answers

Answer:

I think A Bluetooth receiver is causing the smartphone to over heat

how does microsoft label mac addresses in the windows utilities that show you the mac address?

Answers

Based on computer analysis, Microsoft labels mac addresses in the windows utilities "by showing the MAC address in the 'Physical Address' field."

What is MAC Address?

MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).

MAC address is used as a network address in communications within a network component.

There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.

Hence, in this case, it is concluded that the correct answer is "by showing the MAC address in the 'Physical Address' field."

Learn more about MAC Address here: https://brainly.com/question/24812654

_____ is the method of binding instructions and data to memory performed by most general-purpose operating systems.

Answers

Execution time binding is the method of binding instructions and data to

memory performed by most general-purpose operating systems.

This type of binding is usually done by the processor. It also generates both

logical and dynamic absolute address.  The binding can be delayed if the

process is moved during execution between two or more  memory segment.

This generally  involves binding of instructions and data to the memory of

the operating system.

Read more about Execution time binding here https://brainly.com/question/19344465

i need freinds.:(plz

Answers

Answer:

Explanation:

sure wassup

Answer:

i'll be your friend!

Explanation:

What is an example of an outcome for a game?

A. trying to save the world from an evil wizard
B. rescuing Princess Peach from Bowser
C. playing an ocarina to teleport across the land
D. pressing Up, Up, Down, Down, Left, Right, Left, Right, Start on a controller as a “cheat code” to gain extra lives

Answers

Answer:

B

Explanation: I play alot of ####### NIntendo games!!!!!!

Answer:

b

Explanation:

how to check amazon gift card balance without redeeming

Answers

Answer:

Follow these steps to check your Amazon gift card balance without redeeming.

1. Locate the gift card's claim code. The claim code is on the back of the card (if it's a physical gift card) or on your email or paper receipt (if it's an electronic gift card). The claim code will be 14 to 15 digits long. If it's a physical gift card, you may need to scratch off the protective coating to find the claim code.

2. Sign in to your Amazon account. You can sign in through the website or the mobile app.

3. Search for the word 'help'. Click the search bar, type 'help', and press Enter or Return to search.

4. Click 'Help and customer service'. This option is located at the top of the screen.

5. Talk to a customer support agent.

Mobile app:

Scroll down and click 'Need More Help?'.Click 'Contact Us'.Click 'Something else'.Click 'I need more help'.

Computer:

Click 'Something else'.Click 'I need more help'.

6. Type 'find the balance of a gift card without redeeming' into the message box. Send the message.

7. Request the balance of your Amazon gift card. Provide the claim code and request the balance. The support agent will check the gift card balance associated with the claim code and provide it to you without redeeming the card.

EASY 15 POINTS IF YOU CAN HELP
What is the value of the variable named result after this code is executed?

numA = 3

numB = 2

result = numA ** numB

A. 5
B. 9
C. an error has occurred
D. 6

Answers

Answer:9

Explanation:

The value of the variable named result after this code is executed "numA = 3 numB = 2 result = numA ** numB  is 9.

What does value mean?

The value of an output is known to be the sum or the monetary worth of that thing.

Note that looking at the  variable of the code that is executed "numA = 3 numB = 2 result = numA ** numB, we can say that the output is 9.as one can ger it when 3 multiplied itself twice.

Learn more about value from

https://brainly.com/question/843074

#SPJ2

what is a saved link to a particular web page?​

Answers

Answer:

A bookmark

Explanation:

A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.

How many things can a computer compare at one time?

Answers

Answer: billion of items at one time

Explanation: The computer is very capable of comparing items bulk at one time

You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would make to the slide to make it more effective.

Answers

To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.

Answer:

I would add colors to the backround of the slide to decorate it and make sure it is not distracting, Use different fonts but dont make it too fancy.

Explanation:

Your Welcome

Pls help me I beg u

Answers

Self attribute skills

1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

what hash format are modern windows login passwords stored in?

Answers

User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.

What are the windows?

Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.

A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.

Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.  

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ5

a data visualization tool that updates in real time and gives multiple outputs is called

Answers

Answer:

A data dashboard

Explanation:

A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.

Why is data dashboard required?

A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.

Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.

These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.

Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.

Data dashboard is a term used to describe a real-time updating, multi-output data display tool.

For more details regarding a data dashboard, visit:

https://brainly.com/question/29854747

#SPJ6

16. If a user can make modifications to database objects, what permission has that
user been assigned?
A. Update
B. Alter
C. Create
D. Select

Answers

B

Explanation:

The Alter command is used when we want to modify a database or object contain in database.

Type the correct answer in the box. Spell all words correctly.
Which method of cooking does the following passage describe?
makes use of a flat-topped plece of equipment to quickly cook food products.

Answers

Answer:

I believe that this is frying. When you cook food on a flat-topped piece of equipment you are usually using a frying pan.

Explanation:

For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used? Check all that apply.

Answers

The two (2) technologies that must be used in order to allow Internet Protocol version 6 (IPv6) traffic travel on an Internet protocol version 4 (IPv4) network are:

1. Datagram

2. IPv6 tunneling

An IP address is an abbreviation for internet protocol address and it can be defined as a unique number that is assigned to a computer or other network devices, so as to differentiate them from one another in an active network system.

In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;

Internet protocol version 4 (IPv4)Internet protocol version 6 (IPv6)

IPv6 is the modified (latest) version and it was developed and introduced to replace the IPv4 address system because it can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

Furthermore, the two (2) technologies that must be used in order to allow Internet Protocol version 6 (IPv6) traffic travel on an Internet protocol version 4 (IPv4) network are:

1. Datagram

2. IPv6 tunneling

Read more on IPv6 here: https://brainly.com/question/11874164

which function would you use to change the appearance of data in a cell from decimal to percentage

Answers

Answer: use the numbers behind the decimal for the percentage

Explanation:

Answer:format

Explanation: I took the test

What is the correct method to reset the contents of the CMOS NVRAM on HP Desktop / Workstation computers after the AC power has been disconnected

Answers

It should be noted that in order to reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

It should be noted that the non-volatile RAM simply means a complementary metal-oxide-semiconductor chip that can be found inside computers which is vital for storing information.

To reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

Learn more about computers on:

https://brainly.com/question/24540334

What is my mistake on this code? (Python)

Answers

Answer:

Explanation:

bakugo;sup shoto i didnt know you go on here too

the coding has no problems just go and get deki kaminary

HELP ME PLEASE

explain 2 threats to data that can arise when a pc is not connected to the Internet​

Answers

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

Even though it would be convenient to build a network with only one transmission medium, why wouldn't it be practical for big corporations?

A.
because they have far too many hackers breaching their security on a daily basis for only one transmission medium

B.
because they prefer a fancier network to match their elite reputation

C.
because they require a combination of transmission media types to function properly

D.
because with such large user-bases, they couldn't afford to build a network with only one medium

Answers

The reason why it wouldn't be practical for big corporations to build a network with only one (1) transmission medium is: C.  because they require a combination of transmission media types to function properly.

A big corporation can be defined as a corporate organization that has facilities and owns (controls) assets that are used for the manufacturing of goods and services in at least one (1) country, other than its headquarter (home office) located in its home country.

This ultimately implies that, a big corporation is a corporate organization that owns (controls) its business operations in two or more countries.

In light of the above, a big corporation require a combination of multiple transmission medium or transmission media types such as the following, in order for them to function properly, effectively, and efficiently:

Fiber-optic cableTwisted pairDigitalAnalogue

Read more on transmission media here: https://brainly.com/question/7120023

Help please

What is an ordered pair?

1. a type of font in Microsoft Word

2. the end of the x-axis on a coordinate grid

3. two numbers that tell the location of a point on a coordinate grid

4. a type of table located in the Table drop-down menu

Answers

Answer:

two numbers that tell the location of a point on a coordinate grid

Explanation:

Answer:

Two numbers that tell the location of a point on a coordinate grid.

Explanation:

An ordered pair would look like this

(0, 4) or (7, 2)

the first number would be on the x-axis and then the second would be on the y-axis

3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
a. Dynamic website
f. Static website
b. Ecommerce site
c. Social media sites​

Answers

Answer:

f. Static website

Explanation:

HTML stands for hypertext markup language. It is the standard markup language for web pages that define the structure of the content. These elements are the building blocks of any website.

HTML (Hypertext Markup Language) is the code that is used to structure a web page and its content. For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data tables.

Static web pages are often HTML documents stored as files in the file system and made available by the web server over HTTP (nevertheless URLs ending with ". ... Static web pages are suitable for content that never or rarely needs to be updated, though modern web template systems are changing this.

Static website
Hope this will help.
Other Questions
Fill in the blank with the Spanish equivalent of the phrase in parentheses Tengo receso (at noon)A. a medianoche B. maanaC. tempranoD. a medioda whats an perpendicular equation of a line to y=-2/7x+9 that passes through the point (4,-6) At Stage 1 of the Self Regulatory Model of illness behavior (SRM), an individual may be confronted with the problem of a potential illness through two channels: _______________ or ________. Select one: a. symptom perceptions; interpretations b. social messages; symptom perceptions c. social messages; interpretations d. social perceptions; symptom messages explain why animals exhibit differences in their essential food requirements? Compare and contrast the Mughal Empire to the Ottoman Empire will give BrainliestThe ___________ who supported Parliament against the king were called Roundheads.(Pg. 295) Part A In "Nicholas's Diary: April 2 and 3," what does Nicolas think of the treasure his father hunts for? Part B Which sentence from the text best supports the answer in Part A? One coin is flipped and then one die is rolled. What is the probability of getting a head on the coin and an odd number on the die? {?} Give your answer as a percentage. Roosevelt, Churchill, and Stalin met at Allied conferences throughout the war. Which critique best sums up the extent to which they achieved their goals?. If [tex]a + ar + ar^{2} + ... = 15[/tex] and [tex]a + ar^{2} + ar^{4} + ar^{6} + ... = 9[/tex], then what is the sum of the geometric series [tex]a + ar^{3} + ar^{6} + ar^{9} + ...[/tex]? Complete the equation for photosynthesis. + water + oxygenIn light-dependent reactions, light energy is absorbed and converted into chemical energy in the form of . The table below shows a correct representation that 15 pounds (lb) of sugar cost $3:A. True B. False Nitrogen H2 has :a)Double bondsb)Bounded by 6 electronsc) The bond is ionicd) Can forms der Waals bondse) B& d If y varies directly as x, and y= 12 when x = 4, what is y when x = 8? This is a special array.1,2,2,5,2,2,9,0,...what is next number? Write an inequality to compare the ratios 2/4 and 5/6. Find all the missing angles. Please help 8.How did the U.S. governments attempts 'save the world for democracy' end upthreatening civil rights in America? A birthday cake was cut into equal pieces, and 10 pieces were eaten. Thefraction below shows how much cake was left over. According to the fraction,into how many pieces was the cake cut?111A. 1B. 10C. 21D. 11 where does 80% of the population live? a)on farms b)in rural areas c)in or near the city d)along the coast