Which ways can you locate a function if you cannot remember the specific name? Check all that apply. searching in the Tell Me bar looking it up in the Formula tab looking it up in the Data tab using the Insert Function and typing a description using the Insert Function and selecting a category

Answers

Answer 1

Answer:

A, B, D, E

Explanation:

Just did it in Edge.

Answer 2

Answer:

A, B, D, E

Explanation:


Related Questions

Guys help me, to get 25 examples of computer software​

Answers

Answer:

System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, GNU/Linux , Android and Microsoft Windows, computational science software, game engines, industrial automation, and software as a service applications.

here is the answer, well i'm really srry but I didn't put the 25 examples of computer software because i didn't do 25 but I hope I help :)

Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet?

Answers

Answer:

Answered below

Explanation:

Remote access policies are policies that state how users can connect to organisational networks through remote access. It states the conditions and permissions required for network connection.

XYZ providers need to define remote access policies in order to ensure network security through proper authentication, control standard and documentation. A remote access policy addresses the viability of the remote user, implementation of authentication protocols, connection restrictions, remote access permissions, duration of sessions etc

VOTE: STARWARS, STAR TREK, MARVEL, STRANGER THINGS. OR IT ?

Answers

i'd say stranger things or it lol

Answer: stranger things

Explanation:

Stranger things all the way

How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy of internet users

Answers

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

In an executing process, the program counter points __________.

Answers

Answer:

To the next instruction to be executed and is incremented after each instruction has been executed.

Explanation:

Given that Program counter is a form of record or directory in a computer processor that has the location of the instruction that is currently being executed.

This it does in such a way that, following the execution of each instruction, the program counter increases the number of instructions it stored and immediately points to the subsequent instruction that follows.

Hence, in an executing process, the program counterpoints "To the next instruction to be executed and is incremented after each instruction has been executed."

Prove the following using the specified technique:A) Letxandybe two real numbers such thatx yis rational. Prove by contrapositive that ifxis irrational, thenx−yis irrational.B) Prove by contradiction that for any positive two real numbers,xandy, ifx·y≤50, theneitherx <8 ory <8.

Answers

Answer:

Following are the solution to this question:

Explanation:

In point A:

The predicate of the whole argument is if x+y is rational and x-y is reasonable, then x is reasonable as well" To see the sum of the two logical estimates is often sound. Let us be two real [tex]\frac{p}{9}[/tex] .rs amount then seeing how.  

[tex]\frac{p}{q}+\frac{r}{s} = \frac{(ps+rq)}{qs}[/tex] is logical, too. x Thus if[tex]x + y[/tex] is logical and [tex]x- y[/tex] is true, then [tex]x + y +x- y = 2x[/tex] should be sound.  

Let's assume [tex]2x=\frac{p}{q}.[/tex] Therefore the rational [tex]x=\frac{p}{2q}[/tex]proves the necessary statement in the query.  

In point A:

Let [tex]x \cdot y \leq 50 \ and \ x \geq 8, \ but \ \geq 8 \\\\[/tex], both to demonstrate it through contradiction. So,[tex]x \cdot y \geq 8\cdot 8 = 64[/tex]. This implies that both [tex]x \cdot y \ and \ \leq 50 \ and x \cdot y \ and \geq 64[/tex] are valid in the very same period. The argument is valid.

On a client/server network, which computer initiates the process of assigning an IP address through DHCP?

Answers

Answer:

The client

Explanation:

On a client/server network, THE CLIENT computer initiates the process of assigning an IP address through DHCP. This is because "The Client" computer will serve as the Domain controller in which other computers of the network can find. Hence, The Client computer initiates the process of assigning IP addresses through DHCP to achieve this.

Though, in some case. A user can manually assign the IP address to computer if it is not through DHCP

"Hola! Soy Dora!" From what movie is this sentence?













Hint: parapata

Answers

Answer:

Its obivious it "Dora the Explorer"

Explanation:

in C!!
12.12 LAB: Swapping variables
Write a program whose input is two integers and whose output is the two integers swapped.

Ex: If the input is:

3 8
then the output is:

8 3
Your program must define and call a function. SwapValues returns the two values in swapped order.
void SwapValues(int* userVal1, int* userVal2)

Answers

Answer:

#include <stdio.h>

void SwapValues(int* userVal1, int* userVal2)

{

int temp = *userVal1;

*userVal1 = *userVal2;

*userVal2 = temp;

}

int main(void)

{

int a = 3;

int b = 8;

printf("Before swap: a=%d, b=%d\n", a, b);

SwapValues(&a, &b);

printf("After swap:  a=%d, b=%d\n", a, b);

return 0;

}

Explanation:

For swapping variables efficiently, you need a helper variable in C or C++.

plzzzz helpppppppppppppppppppppppppp

Answers

Answer:

Explanation:

C

In this lab, 172.30.0.0 represents the __________ network and 10.20.1.0 represents the _________ network.

Answers

Answer:

Private, public

Explanation:

In this lab, 172.30.0.0 represents the private network and 10.20.1.0 represents the public network.

Which program will have the output shown below?
15
16
17
>>> for count in range(17):
print(count)
>>> for count in range(15, 17):
print(count)
>>> for count in range(15, 18):
print(count)
>>> for count in range(18):
print(count)

Answers

Answer:

>>> for count in range(15, 18):

   print(count)

is the correct answer

Explanation:

helpppppppppppppppppppppppppppppppppppppppp

Answers

Answer:

the can us microsoft excel

where are super computer mainly used​

Answers

Answer:

they are used in astronomy as well as auto Mobile

Private BLANK are cloud services available to members of a particular organization.

Answers

Answer:

A private cloud is a set of applications and resources that are available only to individuals within a specific organization. These resources may be owned by the organization itself or by a third party, and may be hosted inside or outside

Explanation:

.

Terry visits the website www.examplewebsite.org. What does the domain tell you about the site?

Answers

Answer: i can see that it is i i org site

Explanation:

Answer: the website belongs to an organization

Explanation:

Plato

I am writing a Python code to ask a user to enter students' information including name,
last name and student ID number. The program should continue prompting the
user to enter information until the user enters zero. Then the program enters
search mode. In this mode, the user can enter a student ID number to retrieve
the corresponding student's information. If the user enters zero, the program
stops. Please help!​

Answers

Answer:

student_file = {}

endf_input = '1'

for x in iter(list, 1):

   name = input("Enter a student name: ")

   st_id = int(input("Enter a student id number: "))

   student_file[name] = st_id

   endf_input = input("Add more student to file (type 1 for yes and 0 to end): ")

   if endf_input == '0':

       break

print("Search for Student")

search = int(input("Enter student id: "))

if search == 0:

   print("Sorry, no student with id of zero.")

   quit()

for key, value in student_file.items():

   if value == search:

       print(f"Student name: {key}")

Explanation:

The program source code uses a for loop to continuously add data to the student file dictionary structure but breaks from the loop when a zero is received as input. The program enters search mode and returns the name of the student with the searched id number.

One type of wire sequence commonly used for ethernet cables is called the ________ sequence

Answers

Answer:

100BaseT

Also called Fast Ethernet

Good luck...

What steps should city managers and SAIC have taken at an early stage of the project to identify and prevent fraud?

Answers

Answer:

City Managers and SAIC should have avoided Switching of contract from a fixed-price contract to a time and material contracts this made the project cost to be spiraled out of control. city managers should have have avoided the switch in the terms of the contract and also implemented a project oversight that way they will identify and prevent fraud from those involved

Explanation:

To prevent fraud one needs to  identify the fraud at first . therefore the steps that should be taken by city managers and SAIC in other to Identify and prevent fraud includes ;

City Managers and SAIC should have avoided Switching of contract from a fixed-price contract to a time and material contracts this made the project cost to be spiraled out of control. city managers should have have avoided the switch in the terms of the contract and also implemented a project oversight that way they will identify and prevent fraud from those involved

Write a program that uses a dictionary to store students birthdays. Your program should ask the user what their name is, and look it up in the dictionary . If their birthday is known, it should tell them their birthday.

Answers

di = {"student":"10/30/1984", "student2":"11/16/2020"}

name = input("What is your name? ")

if name in di:

   print(di[name])

else:

   print("Your name is not in the dictionary.")

You can change the values inside the dictionary. I hope this helps!

Write a method named convertToArrayList() that accepts an int array as its parameter and returns an ArrayList of type Integer containing those same elements in the same order. This method stub is NOT provided for you - method name, parameter(s), and return type must match exactly to receive credit. You should not use the word static.

Answers

Answer:

Explanation:

The following code is written in Java and is a method named convertToArrayList() which takes in a preset int array and converts it into an ArrayList called myDynamicArray in the exact same order.

public static void convertToArrayList(int[] myStaticArray) {

       ArrayList<Integer> myDynamicArray = new ArrayList<>();

       for (int x = 0; x < myStaticArray.length; x++) {

           myDynamicArray.add(myStaticArray[x]);

       }

   }

What is the purpose of the ISOWEEKNUM function? determines how many workdays are in a certain week determines how many workdays are in a certain month determines what day of the year that date is determines what week of the year that date is

Answers

Answer:

It's D

Explanation:

Answer:

its D on edg

Explanation:

Write a loop that fills a list values with ten random numbers between 1 and 100. Write code for two nested loops that fill values with ten different random numbers between 1 and 100.

Answers

Answer:

Please look for your answer on Stack Overflow, it's way better.

Explanation:

A tech class question any help will be greatly apprieciated
Why would a programmer use a software artifact, such as a flowchart?

Answers

Answer:

With a code artifact, a software programmer can test the program in detail and perfect things before launching the software. The program can easily pass the testing phase for a project management artifact without any problems if errors are corrected at the level of the coding

Explanation:

:)

How to play Drinkopoly game?

Answers

Answer:
Never heard of that lol

1 : What format would you apply to give an entry the appearance of 12-Mar-2014

Accounting Number
imput
Calendar
Date

2: When you add a columm where did it appear

Answers

Answer:

1. Date 2. It will appear to the right of the selected column.

Explain why the process of sketching in engineering might resemble a loop or a cycle.

Answers

Answer:The process of sketching in engineering might resemble a loop because of the design process.

Explanation: The design process is a loop or cycle to improve a design. So, sketches will be shown to other engineers and they will improve on the design until it is effective and efficient.

Answer:

The correct answer includes that the idea is created in the engineer’s imagination and that he or she must sketch the image on a piece of paper in an attempt to capture the essence of the idea. Once the engineer or team sees the sketch, they may want to modify or change the design. Changes will require other sketches and further brainstorming. The cycle will continue until the engineer achieves the best possible design.

Gus is developing new software in an environment in which incremental changes are released at regular intervals within a timebox. Shana is developing software for the minimum viable product stage in order to provide the development team with feedback on how to improve the application. Gus is employing the software methodology known as __________, while Shana is employing the software methodology known as __________.

Answers

Answer:

Answered below

Explanation:

Gus is employing a software methodology known as agile while Shana is employing the minimum viable product methodology.

In agile methodology, changes are built and released incrementally within a time frame.

Therefore the software product is continuously updated.

In the minimum viable product methodology, the basic aspect of the software is released for use and feedback is received from the users thereby informing what improvements to make.

Answer: Agile, Lean

Gus is employing the software methodology known as agile, while Shana is employing the software methodology known as lean.

e. _______ is the standard recommended by the ITU for low bit-rate voice transmission over the Internet.

Answers

Answer:

VoIP ( Voice over internet protocol )

Explanation:

Voice over internet protocol is the standard recommended by the ITU  for low bit-rate voice transmission over the internet

VoIP is a methodology and also a group of technology used for the efficient delivery of voice communication and also for the delivery of multimedia files

The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting.

Answers

Answer:

The correct approach is "Presence awareness".

Explanation:

The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself. With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.
Other Questions
An airplane takes three hours to travel a distance of 1320 miles with the wind the return trip takes four hours against the wind find the speed of the plane in still air and the speed of the wind How do u mark a person with brainlest please acttually tell me 2. Last year, Springfield Middle School had 620students. This year, it has 582 students. To the nearesttenth, what is the percent of decrease?A) 6.1%B) 6.6%C) 93.9%D) 106.5% which case would the Supreme Court hear though it's original jurisdiction power life in a hill station in contrast with life in a desert please draw fast in 15 minutesI will mark them brainilist100 poits f(x)=14x+12 for x=3? Evaluate the expression for the given value of the variable3x + 5 when x = 5 In the 1700s and 1800s, nationalism in the Ottoman empire:created a strong sense of unity.encouraged the empire to seek overseas colonies.resulted in Ottoman expansion further into Europe.led various ethnic groups to attempt to break away and form independent nations. Si 5 trabajadores realizan el 60% del muro en el dia, y los demas trabajan en partes iguales. Que porcentaje del muro construyen los demas trabajadores? If 10% of the students in your class like sushi, how many students are in your class if 2 students likesushi? How did Granville Woods change the telegraph in 1887?A: Woods made it possible use the telegraph as a recording device.B: Woods made it easier for untrained people to use the telegraph.C: Woods made it possible for moving trains to use telegraphs.D: Woods made the telegraph lighter and easier to carry around. Rachel got her kite stuck at the top of a tree that is 35 feet tall. If she is standing 55 feet away from the base of the tree, how long is the string? What is 2/5 closer to What is the definition of a MissionaryA religious community run by monksSomeone who prays five times a dayChristians who left home to convert foreign people to ChrissianityA man or woman taking a pilgrimage to Mecca for their Haid Nadia has 3/5 a yard of fabric. If Nadia cuts the fabric into 2 equalpieces, how long are each of the 2 sections?(The picture has the answer) :) I have lots of work to do right now. If anyone is familiar with World War 1 particularly the short narrative "If WWI was a Bar Fight" and has some free time I have to write my own little flick off of that. It is "if WW1 was contestants on survivor." It doesn't have to be super detailed, it can pretty much mirror the bar fight one. If someone could please write that for me it'd be greatly appreciated. Let me know if I need to attach "If WWI was a Bar Fight." I need this done by 5 pm Sunday. Thanks Question 1:Which group of words would be used in the study of science?A) laboratory, formula, theoryB) equation, operation, additionC) laws, officials, electionsD) language, music, art Question 2:What is the purpose of skimming?A) to read for understandingB) to be able to summarize materialC) to get an overview of somethingD) to prepare for a test Question 3:Which type of writing is used in most science lessons?A) scientificB) exploratoryC) expositoryD) narrative Question 4:What are context clues?A) side notes that accompany the main textB) words that have to do with the sensesC) words placed in the header as lesson guides D) words that surround a term and help define the term. Question 5:USE CONTEXT CLUES TO DETERMINE THE BEST DEFINITION FOR TRANSFORMED.Energy is constantly being transformed (or converted). That means it is changing from one form to another.A) reshapedB) createdC) changedD) moved Question 6:Which of these is not a place you would find the definition of an unfamiliar term?A) in the text surrounding the termB) in a dictionaryC) in the headersD) in the glossary Question 7:What is the best definition of skimming?A) reading to get an overviewB) quickly looking at pictures in a lessonC) reading while in a hurryD) reading to learn Question 8:WHICH HEADER BEST FITS THIS READING PASSAGE?Sound is something that is often taken for granted. Of course, people are aware of the sound of the voices and music. Sometimes the sound of loud airplanes overhead or lawn equipment being used outside might be disturbing. However, what we don't often recognize is that people rarely experience silence. Even in a quiet house, there can be the hum of a refrigerator or the ticking of a clock. Outside in nature, birds might be singing, or the wind could be rustling.A) NoiseB) SilenceC) SoundD) Humming Question 9:WHICH HEADER BEST FITS THIS INFORMATION?The three bones of the middle ear act as amplifiers. A small vibration of the eardrum causes the hammer to vibrate. It's shape and position produce a greater vibration in the anvil. The stirrup transfers the increased vibrations to an inner ear structure called the oval window. A) SoundB) AmplifiersC) VibrationsD) The Middle Ear Question 10:Based on your knowledge of Greek and Latin root words, which is the best definition of hydrolysis. hydro - related to waterA) a cooling processB) underwaterC) the water cycle D) a process that involves water Consider the following instructions for a game element: Move Forward If not at end, move forward Else stop This is an example of which type of programming structure? A Iteration B Looping Selection D Object OPEN What is the hypothesis of the following conditional statement? Conditional Statement: If a triangle has three congruent sides, then it is an equilateral triangle.A.) The triangle has three sides.B.) If it is an equilateral triangle, it has three congruent sides.C.) It is an equilateral triangle.D.) A triangle has three congruent sides. Find the variables in the following simple experiments and state which variable is theindependent variable, dependent variable, and the controlled variables.1. Experiment to find out if tomato plants grow faster in full sunlight or partial sunlight.2. Experiment to find out if red ants prefer honey over sugar as a source of food.3. To find out if where fish survive better in rainwater or chlorinated water from faucet.4. To find out if chicken grow faster if they are fed with pure corn or pure rice.5. An experiment to find out if corn plants grow better in sand or clay soils