Answer:
Is called "data source"
MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use Excel for personal, work and school purposes? Give an example for all three.
Answer:
Different uses of MS Excel in personal, work and school purposes are discussed below in details.
Explanation:
For personal: MS Excel is that the data can be obtained online from any portion of the world anytime and anyplace. It presents the ease of reaching the excel files over cell phones even if there is the availability of laptops.
For Work: MS Excel is being extensively used in the preparation of a large work project or celebration or marriage party, where it can keep track of different duties, applications, and deadlines, and to examine the plans of collaborators in the planning of the event.
For School purpose: students can improve their training skills to resolve basic and logical analytical & mathematical puzzles in excel.
What is the full form of,"MIPS"
Answer:
Millions of Instruction Per Second
What is a common open source operating system
MacOS
Linux
IOS
Windows 10
Linux. But some distros aren't open source... Example: Ubuntu OS
Linux a common open-source operating system is the most prominent example. The correct option is an option (B).
Linux is an open-source Unix-like operating system kernel that serves as the foundation for various Linux distributions (commonly referred to as "distros"). Some popular Linux distributions include Ubuntu, Fedora, Debian, and CentOS, among others. These distributions are built on top of the Linux kernel and provide a complete operating system with additional software and tools.
Windows 10, developed by Microsoft, is also not an open source operating system. It is a proprietary operating system that is widely used on personal computers.
So, Linux is the most prominent example. The correct option is an option (B).
To know more about Linux:
https://brainly.com/question/32161731
#SPJ4
Which section, or hive, in the Windows Registry stores information about drag-and-drop rules, program shortcuts, the user interface, and related items?
Answer:
The correct answer will be "HKEY_CLASSES_ROOT (HKCR) ".
Explanation:
The Windows Registry seems to be an environment inside the operating system applications of Microsoft Windows that holds certain details as to whether machine memory becomes configured up, which applications are to be launched whenever the operating process becomes booted, which hardware is connected and the device solutions were selected.This HKCR is indeed a Windows Registry registration system hive but instead incorporates organization file extension additional data, and also some data from a conceptual identification number, class ID, but mostly connectivity ID. It includes references again for correct file identifier as well as COM class contact information including such IIDs.Q8:What is the correct way to declare an integer named age? ----- , ---- , ----- , ----- . hint= use this (variable , integer ) .
Answer:
age=int(14)
Explanation:
When declaring an integer variable you use int which stands for integer. You place the number (age) inside the parentheses of int.
Calories, sugars, and total fats could exceed the declared calorie value on the menu by only what percentage?
Answer:
20
Explanation:
instructor is describing a component that is always located on the CPU and accelerates the processing of instructions. Which component is being discussed?
Answer:
Cache memory.
Explanation:
The cache memory is the component used to accelerate the processing of instructions. it is called as Level 1 cache or internal cache. L1 cache operates at the same speed as the processor.Few processors have two L1
caches; of which, one stores instructions, and the other one stores data.
What symbol do you use to choose a feature for your notes on Notion?
Answer:
The core element of notions is called blocks from where all the content bring forth. It has around fifty blocks.
Explanation:
Notion is the newest and fastest growing productivity tools for the recent memory. Notions has been reached out to the fight club meme status. When it is plain, it is easy to use and start. But even after it many of the users have difficulty in using this tools when it comes to the powerful cases.
There are some steps through that one can start to use this tool for their productivity.
To built the blocks
To organize the notions.
To create the habit tracker
To move the pages in notions
Data base and the views.
Type / - type table - select online- full page
What does it mean for a module to be ""coherent?"" Why is this important? What are the advantages of coherence? What are the disadvantages of incoherent modules?
Answer:
Following are the answer to this question:
Explanation:
Coherent means, in some kind of a communication process, that transmits the side and well the receiver side generally use those common features, which is the provider used for modulation.
Its frequency only at the end and end of both the transponder is the same.
It's also important to recover from the modulated signal to its original message signal.
The advantage of coherence clarifies the system architecture and signal transmission throughout the carrier, as well as the carrier, is not to be regenerated on the receiver side. The disadvantage of the incoherent modules is being more difficult to build than the Coherent modules.Select the proper ergonomic keyboarding techniques.
-Push firmly on the keys and hold them down for long periods.
-Your arms should be comfortable at your side, forming a 45° angle with your upper arms, and your forearms should be parallel to the floor.
-Position the keyboard directly in front and close to you so you don't have an excessive reach.
-If you are working for a long period of time, alternate between sitting and standing.
- -Take breaks to stretch.
-Keep your shoulders, arms, hands and fingers relaxed.
-Position your wrists straight or in neutral position while typing.
-Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair.
-Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you.
-Do not rest your hand on the mouse when resting. Rest your hands in your lap when not working.
Answer:
The correct options are;
-Position the keyboard directly in front and close to you so you don't have an excessive reach
-Keep your shoulders, arms, hands and fingers relaxed
-Position your wrists straight or in neutral position while typing
-Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair
-Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you
Explanation:
1) It is important to keep the fingers in a relaxed position when typing
2) Ensure to type in a tapping fashion when typing rather than pressing on the keys of the keyboard
3) The fingernails should be kept short when frequent typing is done
4) The wrist is better kept above the keyboard than resting on it
5) Ensure that the mouse is easily reached.
Answer:The correct options are;
-Position the keyboard directly in front and close to you so you don't have an excessive reach
-Keep your shoulders, arms, hands and fingers relaxed
-Position your wrists straight or in neutral position while typing
-Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair
-Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you
Explanation:
Write a Java program that generates the second, third, and fourth powers of a list of whole numbers from 1 to n where n is input by the user. Write a Java program to do this. • First, ask the user for the largest of the whole numbers to use (n). • Second, output column headers (see below, n, n^2, n^3, n^4). • Then, use a for loop to iterate from 1 to n, computing each of that loop variable to the second power, third power and fourth power, respectively. NB: The values should be stored in a 2dimensional array. Display the values as shown below: Sample output
Answer:
//import the Scanner class
import java.util.Scanner;
//Begin class definition
public class Powers{
//Begin the main method
public static void main(String []args){
//Create an object of the Scanner class
//to allow for user inputs
Scanner input = new Scanner(System.in);
//Prompt the user to enter the largest of the whole number
System.out.println("Enter the largest of the whole numbers to use");
//Receive user input using the Scanner object
//and store in an integer variable
int n = input.nextInt();
//Create a two-dimensional array using the user input
int [][] powerlist = new int [n][4];
//Create an outer for loop
//to loop as many times as the number entered by the user
for (int i = 0; i < n; i++){
//Create an inner loop to find
//the powers of each of the numbers
for(int j = 0; j < 4; j++){
//Typecast the value returned from the Math.pow() function
powerlist[i][j] = (int) Math.pow((i+1), (j+1));
}
}
//Print out the header of the table
//\t will print a tab character.
System.out.println("n" + "\t\t" + "n^2" + "\t\t" + "n^3" + "\t\t" + "n^4");
//Print out the elements in the two dimensional array
for (int i = 0; i < powerlist.length; i++){
for(int j = 0; j < powerlist[i].length; j++){
//Separate each term by two tabs
System.out.print(powerlist[i][j] + "\t\t");
}
System.out.println();
}
}
}
Sample Output:
Enter the largest of the whole numbers to use
4
n n^2 n^3 n^4
1 1 1 1
2 4 8 16
3 9 27 81
4 16 64 256
Explanation:
The code above has been written in Java and it contains comments explaining important lines in the code. Please go through the comments.
For clarity, the actual lines of code have been written in bold face to distinguish them from comments.
Screenshots of the code and a sample output have also been attached to this response.
The program is an illustration of loops.
Loops are used to perform repetitive and iterative operations.
The program in Java where comments are used to explain each line s as follows:
import java.util.*;
public class Main{
public static void main(String []args){
//This creates a scanner object
Scanner input = new Scanner(System.in);
//This prompts the user for the largest integer
System.out.print("Largest:");
//This gets input for the prompt
int n = input.nextInt();
//This prints the output header
System.out.println("n" + "\t" + "n^2" + "\t" + "n^3" + "\t" + "n^4");
//This iterates from 1 to n
for (int i = 1; i <= n; i++){
//This iterates through the powers
for(int j = 0; j < 4; j++){
//This displays each output
System.out.print((int) Math.pow((i), (j+1))+"\t");
}
//This prints a new line
System.out.println();
}
}
}
Read more about similar programs at:
https://brainly.com/question/5419214
The simple concept of personal computing, hatched by several Silicon Valley entrepreneurs and permeating almost all of modern society, remains perhaps the most important technological idea of the last 50 years.
a. True
b. False
Answer:
True
Explanation:
The advent of personal computing brought about by the implementation of several technologies including MOSFET, semiconductors, microchip and integrated circuits has revolutionized life in at a very high rate of change where traditional ways of doing things rapidly change and for the first time power was easily reachable by accessing a personal computer.
1. The computer personal computer brought about word processing, where there are very limited errors in individually printed documents and the time to produce a quality document was reduced
2. Email - With the advent of personal computers email, the information and communication time were lowered and it resulted in changes in commerce
3. Video conferencing - It was possible to have video conferencing with people and make decisions regarding direction can be made real time from very distant locations, which improved business reaction time
4. The mouse- The concept of having a graphic user interface improved computer interaction for people with limited programming skills.
An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user?
a. Power user
b. Administrator
c. Standard
d. Guest
Answer:
a. Power user
Explanation:
In this situation, the administrator should create a power user account for the user. This is a user who uses advanced features of computer hardware, operating systems, programs, or websites that are not used by the average user as well as having similar permissions to an administrator without the ability to edit or view subscriptions or other users and they do not have access to billing information. Thus in this scenario, a power user account will allow the individual to complete all of their required tasks but at the same time preventing them from accessing administrator level rights.
Where can you go in QuickBooks Online to import a list of products and services? Select the Quick Create icon and under the Tools column, select Import Data, then Products and Services Select the Gear icon and under the Tools column, select Import Data, then Products and services Select the Accountant toolbox and under the Tools column, select Import Data, then Products and services
Answer:
Select the Gear icon and under the Tools column, select Import Data, then Products and services
Explanation:
The steps to import list of products and services in QuickBooks Online
Select Settings Gear icon ⚙
Under Tools column, select Import Data.
Select Products and Services.
Import products and services page will appear.
Select Browse.
Map your information of your file to corresponding fields in Quick Books .
Select Import.
Jonah needs to add a list of the websites he used to his report. He opens the "Websites" document and copies the information. He now needs to change his view to the "Renaissance" report to add the information before saving his report. What are the steps, in order, that Jonah needs to follow to view the "Renaissance" report?
Answer:
1.Go to the ribbon area
2.Click on the View tab.
3.Click on the Switch Windows tab.
4.Click on the "Renaissance" report
Explanation:
Answer:
1.Go to the ribbon area
2.Click on the View tab.
3.Click on the Switch Windows tab.
4.Click on the "Renaissance" report
Explanation:
just took it
In a response of approximately 50 words, explain why it would be essential for the successful A/V technician to participate in additional coursework, presentations and seminars offered by equipment manufacturers as well as annual conferences attended by colleagues in the industry.
Answer:
The role of an audiovisual technician are to service, operate, maintain and repair and set electronic equipment meant for meetings, concerts, webinars, teleconferences, presentation, television and radio broadcasting. Audio technicians playback video recordings, they improve set lighting they ensure proper graphics coordination and they mix audio sound boards making after-school activities essential to the audiovisual career development.
Explanation:
difference between . RAM and hard disk
Answer:
RAM HARD DISK
RAM is used to store computer | HDD, hard disk has permanent
programs and data that CPU needs | storage and it is used to
in real time. RAM data is volatile | store user specific data
and is erased once computer is | and operating system files.
switched off. |
Which of the following summarized subnets represent routes that could have been created for CIDR’s goal to reduce the size of Internet routing tables?A. 10.0.0.0 255.255.255.0.
B. 10.1.0.0 255.255.0.0.
C. 200.1.1.0 255.255.255.0.
D. 200.1.0.0 255.255.0.0.
Answer:
The answer is "Option D".
Explanation:
This addressing arises in class C also with 255.255.255.0 subnets summarises with the 255.255.0.0 subnet. IP addressing the class. 10.0.0.0, is the part of the network class A, that port with a standard 255.0.0.0 subnet mask, and the address of 200.1.1.0 in Class C, which contains 255.255.255.0 classic subnet., and the wrong choice can be defined as follows:
The choice a and choice b, it is incorrect because, the 10.0.0/24 a /24 is much more descriptive than a /8, the reverse of a description. The choice c, It does not summarise anything since 200.1.1.0 would be a Class C with such a classical 255.255.255.0 subset mask.Universal Containers (UC) has multi-level account hierarchies that represent departments within their major Accounts. Users are creating duplicate Contacts across multiple departments. UC wants to clean the data so as to have a single Contact across departments. What two solutions should UC implement to cleanse their data? (Choose 2 answers) Use Data to standardize Contact address information to help identify duplicates Make use of the Merge Contacts feature of Salesforce to merge duplicates for an Account Use Workflow rules to standardize Contact information to identify and prevent duplicates Make use of a third-party tool to help merge duplicate Contacts across Accounts
Answer:
The answer is "first and the last choice".
Explanation:
For providing single contact across all department the Universal Containers (UC) uses two methods, that can be defined as follows:
It uses the standardized contact in data, that helps to identify multiple copies, of the Information and convert it into standardized contact information. It uses the third-party tool, which helps to merge the duplicate contact information through accounts.The capability of moving a completed programming solution easily from one type of computer to another is known as ________. transferability inheritance portability scalability
Portability in high-level computer programming is the usability of the same software
in different environments. The prerequirement for portability is the generalized
abstraction between the application logic and system interfaces.
When using Windows Deployment Services, you do not need to have the installation media ready and sit at the server console as Windows performs the task of OS installation.
a. True
b. False
Answer:
True
Explanation:
because
A whole-house surge protector is installed ________. at the breaker panel on computers on each device and appliance at the power line from the street
Answer:
the breaker panel
Explanation:
A whole-house surge protector is installed at the breaker panel. This panel is the main distribution point for all of the electrical circuits in your home. This panel divides your home's electrical system into different sectors, each with its own surge protector. The electricity flows through an electrical meter, which records your electricity usage, and then into the panel, thus providing electricity to the entire household.
What do digital signals tum sounds into?
A. analog signals
B. interference
C. continuity
D. zeros and ones
A purpose of the __________ in a vascular plant is to connect other parts of the plant. A. leaves B. stem C. seeds D. roots
Answer:
I thinkkkk its D
Explanation:
Answer: C.C is correct answer
Explanation:
If you wanted to find out whether an integer contained an even number of 1 bits, which status flag would be useful
Answer:
The correct answer will be "Parity".
Explanation:
Parity seems to be a methodology that tests when information is transferred or missing or overwritten when something is transferred between one storage location to another, and then it is communicated between processors or devices.It would be used whilst also contrasting the container as well as the aggregated parity to evaluate or dual inspect for inaccuracies.Which type of systems development is characterized by significantly speeding up the design phase and the generation of information requirements and involving users at an intense level? .
Answer:
Joint Application Development (JAD)
Explanation:
Joint Application Development is a method of application development that lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.
What music is best for calming down and relaxing?
could be lofi hip hop or chill type music beats like that or soft jazz
do you guys know the addition and subtraction of binary numbersi need help in that
Answer:
The process of adding binary numbers is the same as the process adding decimal numbers which are the normal base 10 numbers with the difference being that in decimal numbers there are digits 1 to 9 and in binary numbers, there are only digits 1 and 0
So when we add binary numbers, we havr;
0 + 0 = 0
1 + 0 = 1
0 + 1 = 1
1 + 1 = 10
Why 1 + 1 = 10 is because, there are no 2s in binary number system, just like when we get from 0 to 9 in a decimal system we start again at 10
For binary subtraction, we have the following;
0 - 0 = 0
1 - 0 = 1
1 - 1 = 0
10 - 1 = 1 (from 1 + 1 = 10)
For example 1100₂ - 1010₂ = 0010₂
As shown below
Borrow 1
, ↓
1, 1 ¹0 0
1, 0 1 0
, 0 0 1 0
The addition and subtraction of the binary number system are similar to that of the decimal number system. The only difference is that the decimal number system consists the digit from 0-9 and their base is 10 whereas the binary number system consists only two digits (0 and 1) which make their operation easier
Explanation:
write a watch java program
Answer:
import javax.swing.*;
import java.awt.*;
import java.text.*;
import java.util.*;
public class DigitalWatch implements Runnable{
JFrame f;
Thread t=null;
int hours=0, minutes=0, seconds=0;
String timeString = "";
JButton b;
DigitalWatch(){
f=new JFrame();
t = new Thread(this);
t.start();
b=new JButton();
b.setBounds(100,100,100,50);
f.add(b);
f.setSize(300,400);
f.setLayout(null);
f.setVisible(true);
}
public void run() {
try {
while (true) {
Calendar cal = Calendar.getInstance();
hours = cal.get( Calendar.HOUR_OF_DAY );
if ( hours > 12 ) hours -= 12;
minutes = cal.get( Calendar.MINUTE );
seconds = cal.get( Calendar.SECOND );
SimpleDateFormat formatter = new SimpleDateFormat("hh:mm:ss");
Date date = cal.getTime();
timeString = formatter.format( date );
printTime();
t.sleep( 1000 ); // interval given in milliseconds
}
}
catch (Exception e) { }
}
public void printTime(){
b.setText(timeString);
}
public static void main(String[] args) {
new DigitalWatch();
}
}
Explanation:
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
Answer:
encryption
Explanation:
A(n) encryption virus runs a program that searches for common types of data files, compresses them, and makes them unusable.