Alex needs to create a function capable of counting item reference numbers that he is inserting into a spread sheet. The purpose of this function will be to keep track of inventory. How would Alex go about finding a function to do this? Click the Home tab and use the Find.
Alex can find a function to do this by entering the item reference numbers into the worksheet, and click the Sort button to count the items.
A spreadsheet can be defined as a document or file which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating, counting, and sorting data on computer systems through the use of a spreadsheet application such as Microsoft Excel.
In this scenario, Alex wants to keep track of inventory by creating a function that is capable of counting item reference numbers as he is inserting into a spread sheet. Thus, he should enter the reference numbers of each item into the worksheet, and click the Sort button to count the items.
Read more: https://brainly.com/question/14299634
Answer:
It’s C
Explanation:
edge
Which phrase will be coded using the element in HTML?
Answer:
The <i> tag is often used to indicate a technical term, a phrase from another language, a thought, a ship name, etc. Use the <i> element only when there is not a more appropriate semantic element, such as: <em> (emphasized text) <strong> (important text)
Explanation:
brainliest please thank you :)#CARRYONLEARNINGCORRECT ME IF IM WRONG# I need help with my python code, it won't work, and no matter what I try, I can't get it to run properly. Every time I try top run it, it gives me an error saying:
# syntaxError, bad input on line 43, I am not very good at programming, and I just started. I wanted to ask if you guys could help me.
# Here's my code, the purpose of it is to be a rock paper scissors game:
```
import random
def welcome_prompt():
print ("Rock paper Scissors game")
print ("Rules: Rocks beats Scissors, Scissors beats Paper, Paper beats Rock")
def get_player_move():
print ('Round ' + str(round))
print ("Please play one of the following")
move = raw_input(" 1) [R]ock, 2) [P]aper, 3) [S]cissors:")
if get_player_move == ("R"):
print ("You used Rock!")
return 1
elif get_player_move == ("P"):
print ("You used Paper!")
return 2
elif get_player_move == ("S"):
print ("You used Scissors!")
return 3
else:
print "Invalid input, please use capitalized initial (R,P,S)"
return get_player_move()
def get_computer_move():
get_computer_move = random.randint(1,3)
if get_computer_move == 1:
print ("Computer used Rock!")
return 1
elif get_computer_move == 2:
print ("Computer used Paper!")
return 2
elif get_computer_move == 3:
print ("Computer used Scissors!")
return 3
def compare_moves(get_player_move, get_computer_move):
if (get_player_move == 1 and get_computer_move == 1) or (get_player_move
== 2 and get_computer_move == 2) or (get_player_move == 3 and
get_computer_move == 3):
print ("It's a tie!")
return 0
elif (get_player_move == 1 and get_computer_move == 3) or
(get_player_move == 2 and get_computer_move == 1) or (get_player_move ==
3 and get_computer_move == 2):
print ("You win the round!")
return 1
elif (get_player_move == 1 and get_computer_move == 2) or
(get_player_move == 2 and get_computer_move == 3) or (get_player_move ==
3 and get_computer_move == 1):
print ("You lose the round!")
return -1
elif (get_player_move == 4):
print ("You didn't put in correct input, computer gets a free win")
return -1
player_score = 0
comp_score = 0
round = 0
welcome_prompt()
('Round ' + str(round))
while round< 10:
round = round + 1
get_player_move()
get_computer_move()
compare_moves(get_player_move, get_computer_move)
if compare_moves == 1:
player_score = player_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
elif compare_moves == -1:
comp_score = comp_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
print ("Game Over")
Answer:
hmm i would assume your syntax code has a hidden error that's messing up your code that you are trying to input inside your computers field matrix to do the game. question is where is that error?
Explanation:
- What is the use of border? Differentiate between changing color of cells and color of data class 6
Conditional formatting makes it easy to highlight interesting cells or ranges of cells, emphasize unusual values, and visualize data by using data bars, color scales, and icon sets that correspond to specific variations in the data.
A conditional format changes the appearance of cells on the basis of conditions that you specify. If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates.
write 10 place where computer use and it uses
Answer:
dynamite ohohoh
Explanation:
nânnananananananann eh
is a virtue by which you need to secure information by limiting computer access to authorized personnel only.
Answer:
ummmmmmmmm
Explanation:
Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.
Keeping confidential data is crucial especially if your business deals with very important information about a person and his security.
Trust is built between a company and a client. The client trusts the company to keep his information secure and confidential from outside parties. Once the confidentiality of the company is compromised, the business will suffer because clients will no longer trust the company to keep their data secure.
What is this on googel documents and how do I fix it
Answer:
if you're trying to take off the words on the side, when you hover over it, an "X" will appear and you can delete it
Explanation:
In Super Mario Bros., you become Mario and your friend is Mario’s younger brother Luigi. Your job is to race through Mushroom Kingdom to save Princess Toadstool and avoid the enemy, Bowser. You can jump from and to different objects, picking up coins and other items to help you on your journey through the levels. What game genre (or combination of genres) best describes this game?
A.
strategy simulation
B.
action adventure
C.
RPG
D.
sports action
I know this isn't the right platform for this question, but where should I go to get a good PC and a good monitor? I'm thinking about becoming a streamer.
Answer: Alienware is really good if you are into fps games such as call of duty but it depends on your price I know alien ware can be pretty expensive so it's up to you.
Axel is conducting some online research, and he wants to narrow down his search to a specific date
range, and he only wants to find images. What should he use?
O quotations
O a Boolean search
O truncation of terms
O filters
Answer:
filters
Explanation:
you use filters to specify what you want to find
What is this on G00gel Documents , how do I fix it?
Answer:
Sorry but it donest show the picture
Explanation:
HELP ME PLEASE
explain 2 threats to data that can arise when a pc is not connected to the Internet
Explanation:
Threats
Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats
Types of Computer Security Threats
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
SCAREWARE
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
KEYLOGGER
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
ROOTKIT
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Tips for Best Computer Security
For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.
Which of the following described a global network connecting billions of computers and other
devices?
A) WiFi
B
ISP
C
World Wide Web
D
Internet
Which of the following statements best explains how multitasking works in the human mind?
Answer: He's right
Explanation: I got the answer too
Open-ended games give players the most freedom to explore other worlds.
A.
True
B.
False
Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environment, and game mechanics.
A.
True
B.
False
Answer:
B. False
Explanation:
Numerous amount of games have narrative, there is an entire genres built around narratives. Any RPG game has a narrative and even bog standard FPS games have some sort of backstory and effects setting a mood.
Shadow and highlight create depth (3D).
TRUE OR FALSE
Answer:
true because then it would be like not popping out
One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system.
Required:
What actions is MOST likely to increase the security of this system?
Answer:
All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.Explanation:
Describe the function of memory and
processing unit of Computer system
Answer:
Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs. ... This allows the CPU direct access to the computer program. Memory is needed in all computers.
Explanation:
hope it help
I'm confused as to if subclasses can call the supers without any implementation and what the right answer is
Answer:
E
Explanation:
Since Example1 and Example2 inherit from Example0, all classes have the method doNothing() at their disposal, so you can call it from e0, e1 and e2.
However, the arguments of this method are Example1 and Example2, so you cannot pass Example0 as a first argument, and you cannot pass Example0 or 1 as a second argument. That only leaves answer E.
You can call the inheritance relation an "is a kind of" relation. So Example1 is a kind of Example0, and Example2 is a kind of Example1, but also Example2 is a kind of Example0.
Now you can understand why e2 can be passed as an argument for Example1, because e2 is a kind of Example1.
HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?
var titles = ["score", "points"];
titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");
Answer:
titles.push("home");
Explanation:
It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.
"... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)
[] Attached is from the same source
-> I think this is correct
Have a nice day!
I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
A portfolio is a living and changing collection of records that reflect your accomplishments, skills, experiences, and attributes. It highlights and showcases samples of some of your best work, along with life experiences, values and achievements. A portfolio does not take the place of a resume, but it can accentuate your abilities and what you can offer in the chosen field.
Find out more about portfolio at: https://brainly.com/question/24811520
Computers were originally developed to accomplish various tasks in relative isolation, very different from the collaboration and communication we see today.
A.
True
B.
False
Can someone help me please and please answer all the questions and explain :D
Answer:
1. is A. 2. is C. 3. is A.
Explanation:
Filters remove all data that does not match the requirements.
To remove a specified number of characters from anywhere within a string, you should use the ____ method.
Answer:
remove
Explanation:
what does reporter failure mean on adt alarm system
On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.
How does the ADT alarm system function?ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.
ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.
Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.
Learn more about the ADT alarm system, refer to:
https://brainly.com/question/28199257
#SPJ5
In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.
ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.
When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:
Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.
Learn more about network on:
https://brainly.com/question/29350844
#SPJ6
Draw truth table for the following logic circuit:
(Please I really need help with this)
Keep Scrolling! :D
[tex] \rule{999pt}{66646pt}[/tex]
(01.02
High-level programming languages are used to write a wide variety of programs, like
operating systems, scientific modeling, and general applications.
True
False
Answer:
ture
Explanation:
hope it help u
a data visualization tool that updates in real time and gives multiple outputs is called
Answer:
A data dashboard
Explanation:
A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.
Why is data dashboard required?A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.
Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.
These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.
Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.
Data dashboard is a term used to describe a real-time updating, multi-output data display tool.
For more details regarding a data dashboard, visit:
https://brainly.com/question/29854747
#SPJ6
_____ is the method of binding instructions and data to memory performed by most general-purpose operating systems.
Execution time binding is the method of binding instructions and data to
memory performed by most general-purpose operating systems.
This type of binding is usually done by the processor. It also generates both
logical and dynamic absolute address. The binding can be delayed if the
process is moved during execution between two or more memory segment.
This generally involves binding of instructions and data to the memory of
the operating system.
Read more about Execution time binding here https://brainly.com/question/19344465