Answer:
stop
Explanation:
If you set the error alert style to Stop, then you are asking Excel to prevent the user from typing in an invalid value.
2. What is an operating system? Describe any three functions of
operating system.
An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware.
how do i ask a question for less points
On the bottom left there should be a number that you can change.
how is technology moving the business world forward?
Answer: It can help businesses develop new products, experiences, markets and business models
Explanation:
Give at least five examples of both types of ciphers.?
Answer:
Examples include Porta cipher, Vigenere, Gronsfeld, Beaufort, Autokey, Running key cipher, and even ciphers such as Enigma. Polygraphic Substitution ciphers - groups of characters are replaced. Examples include Hill cipher, playfair, foursquare etc.
Explanation:
follow me please
Erin is planning to develop an online app that users can access using any type of Apple device, including iPads and iPhones. Which app development trend should Eric learn about before she starts
A lot of good educational apps are been developed. The app development trend that Erin should learn about before she starts is Cross platform development.
There are lots of mobile app development where one can have different device platforms that a person have to build for such as Apple vs Android.
Cross-platform development is simply known to be the act of developing software products or services for more than one platforms or software environments.It is known to helps give an individual a lot of flexibility to build your app through the use of a universal language such as a Javascript.
Learn more about Cross platform development from:
https://brainly.com/question/24902217
A function is called from the main function for the first time and then calls itself seven times. What is the depth of recursion
Recursion is known to be a process of defining a problem. the depth of recursion is 7.
A Recursion is simply known as finding the solution to a problem. The depth of recursion is known to be the number of levels of activation of a procedure which is seen in the deepest call of the procedure.
A recursive function often has overhead actions which are not necessary in a loop structure. There is no limit to the number of levels in a Recursion.
Learn more about Recursion from
https://brainly.com/question/25268753
Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. (1pts) Question 14 - Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. system definition component design system maintenance system implementation
Answer:
system implementation
Explanation:
A _____ software system determines the steps needed to produce components and instructs the machines that do the work.
Answer:
A computer-aided manufacturing or (cam) software system
Explanation:
Hope I could help :)
From the View tab you can display _______ in the Slide pane, giving you visual markers for aligning placeholders and images.
From the view tab of the Microsoft PowerPoint, you can display correct gridlines which serves as visual markers.
The interface of the view tab of the Microsoft PowerPoint application is shown in the image attached below.
As we can see, from the view tab, the correct gridlines can be displayed, which serves as visual markers that can be used to ensure placeholders and images are properly aligned.
In summary, from the view tab of the Microsoft PowerPoint, you can display correct gridlines which serves as visual markers.Learn more here:
https://brainly.com/question/3366661
what can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?
Answer:
Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.
Explanation:
large carriers like sprint, at&t, and xo communications exchange internet traffic freely at physical locations called ________.
The answer is Internet Exchange
in a network operating system, this computer coordinates all communication between computers.
Answer:
Explanation:
In a network environment, the network server computer coordinates all communications between the other computers. Smartphones generally include a network operating system. The operating system is often referred to as the software platform.
how are words and numbers encoded as ones and zeros?
Answer:Multiple true and false variables
Explanation:
0 is the equivalent to flase variable ande 1 is a true variable
The words and numbers are encoded as ones and zeros by converting the data into assigned ASCII then this data is converted into binary code that is the form of zero and one.
What are binary codes?Binary codes are those codes that are used by digital computers to understand the data that we enter, The computer does not understand the language we speak. It converts the data into American Standard Code for Information Interexchange first, then it is concerted into binary codes.
The binary codes are in the format of 010010. Each letter has a specific code and these codes are arranged according to the words.
Thus, by first converting the data into assigned ASCII, which is the form of a one and a zero, the words and numbers are then encoded as ones and zeros.
To learn more about binary codes, refer to the link:
https://brainly.com/question/9421694
#SPJ2
Walk around your house and locate at least ten hazards. Classify them according to type. Explain why these things that you have identified or listed pose danger to the members of your family.
Answer:
1. Falls
2. Poisoning
3. Carbon Monoxide
4. Fire Hazards
5. Drowning
6. Choking
7. Sharp Objects
8. Stoves
9. Dishwashers
10. Suffocation
Examples :
Copyright is applied to a new piece of work:
A.
after agent approval.
B.
after being registered with the patent office.
C.
automatically after publication.
D.
if publishers decide it is needed.
Answer:
I say C. Automatically after publication.
Explanation:
Srry if im wrong
cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging
A data __________ is trained in both computer science and statistics and knows how to effectively process and analyze large amounts of data.
Answer: data scientist
Explanation:
A data scientist is trained in both computer science and statistics and knows how to effectively process and analyze large amounts of data.
What is Statistics?Statistics may be defined as a branch of scientific mathematics that significantly deals with the collection, analysis, interpretation, and presentation of masses of numerical data. It is a methodology of gathering, analyzing, and summarizing the data.
A data scientist may be characterized as a person who is employed in order to analyze and interpret complicated digital data in form of websites and assist in business and decision-making.
Therefore, a data scientist is trained in both computer science and statistics and knows how to effectively process and analyze large amounts of data.
To learn more about Data scientists, refer to the link:
https://brainly.com/question/21031963
#SPJ2
__________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors that may interfere with obtaining accurate test results are detected and eliminated.
Answer:
Quality assurance
Explanation:
WORTH 15 POINTS
Yo, Quick question in the movie Into The Woods 2014 version. What character would you want to be in the movie. Give me a good reason too
DUE 11/17/2021 10:00 PM
LOOKING FOR PEOPLE WHO KNOW THE ANSWER.
Answer:
didnt watch it
Explanation:
i dont watch furry movies
What do you think is the best horror game BATIM FNAF or Baldi's Basics?
Answer:
FNAF
Explanation:
its goated
Answer:
fnaf
Explanation:
You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards
A(n) _____ contains software components that are well documented and have a proven track record of working well together.
Considering the computer analysis, a Solution stack contains software components that are well documented and have a proven track record of working well together.
What is a Solution Stack?Generally, a solution stack in computer science is a combination of different applications which function to solve the problem. The problems designed to solve may either be related or unrelated.
Different types of the solution stackVarious types of solution stacks are available in the computing world. Some of the solution stacks are:
Application stackServer stackStorage stackVirtualization stackWeb stackHence, in this case, it is concluded that the correct answer is "Solution stack."
Learn more about solution stack here: https://brainly.com/question/13480036
What will be the result of this line of code: print("I am amazing!")
a syntax error
a tool error
"I am amazing"
I am amazing
Answer:
I am amazing!
Explanation:
you forget this symbol ( ! )
Answer:
I´m pretty sure its I am Amazing. So D
Explanation:
¨I am amazing" is like you talking sarcastically.
I could be wrong, but this is my opinion. Do what you want with it and run I guess, haha.
Please explain what steps you will take to prevent hackers from getting access to your personal information.
I need the sentences longer
You have a Windows Vista workstation with a built-in network card. The card is intermittently malfunctioning. You install a USB network card and want to permanently disable the internal card to avoid any conflicts. Which administrative tool should you use
Answer:
Device Manager
Explanation:
try it yourself
press windows key + X
then click device manager
here you can right click anything and disable it
its easy its cake
have fun
URGENT HTML5 can support videos and audio playback, but not 2D and 3D graphics.
A. True
B. False
Answer:
False I think.
Explanation:
A _________ attack is an attack on a computer system or network that causes a loss of service to users.
Answer: Denial of Service
Explanation:
the term is self-explanatory
As part of the communication element, many websites use sophisticated computer programs called ______ which mimic human conversation using artificial intelligence.
Answer:
ai based learing i think
Explanation:
how are packets sent through the internet
Explanation:
When we send data across the internet, it is usually converted into smaller chunks called packets. The computer sends each packet to the nearest router, and this router checks the packet's IP header which contains the destination IP (an IP number is like an address, it lets the computer know where the packet wants to go) or the "address where the packet wants to end up". This router has multiple pathways it can send the packet through, but its goal is to send it to a router that is closer to its final destination. Then, this router can send it to its final destination. Once all packets have reached this final destination, they can be put back together, recreating the original piece of data.
Hope this helps and feel free to ask any questions!
If an artist’s work is shared for free under certain situations but not others; this is usually because it is under _____, with the artist’s knowledge.
A.
copyright law
B.
ownership
C.
sales taxation
D.
fair use rules
Answer:
Fair Use Rules
Explanation:
THE GOVERNMENTSJBVHUIEGUI:SDVGD