Which is a method used with arrays?
find
index
insert
sort
Answer:
Index
Explanation:
Got it right e2020
order the steps to create a pivotchart
Answer:
Select any cell in your PivotTable. Clicking a cell in the PivotTable.
From the Insert tab, click the PivotChart command. Clicking the PivotChart command.
The Insert Chart dialog box will appear. Select the desired chart type and layout, then click OK. ...
The PivotChart will appear.
Explanation:
A pivot chart is a way to quickly summarize large amounts of data. These can be created by selecting a cell, then clicking on insert tab, select the insert chart option and then add the data as given.
What is Pivot chart?A PivotTable is an interactive way to quickly summarize the large amounts of data. A person can use a PivotTable to analyze the numerical data in detail, and answer all the unanticipated questions about the data. A PivotTable is especially designed for querying large amounts of data in many different user-friendly ways.
A Pivot Table is generally used to summarize, sort, re-organize, group, count total, or average data stored in a table. Pivot table allows us to transform columns in the chart into rows and rows into columns.
The steps to create a pivot table include : Select a cell in the PivotTable. Then, on the Insert tab, select the Insert Chart dropdown menu, and then by clicking on any chart option. The chart will appear in the worksheet. Then, select OK.
Learn more about Pivot chart here:
https://brainly.com/question/26745566
#SPJ2
Alyssa Steiner volunteers at an animal shelter and helps with their fundraising efforts. She has shot a video of the animals and wants to post it on the web to encourage donations. However, the video she shot is a huge MOV file. What can Alyssa do to reduce the size of the video to about 20 MB so it loads quickly on the shelter’s webpage?
Answer:
See Explanation
Explanation:
Required
What to do, to upload a large video on a webpage
Alyssa has several options to pick from, one of which is to divide the videos into various segments and then upload each segment separately or to compress the huge MOV file and then upload.
Of the two options I highlighted in the first paragraph, the best is to compress the video using a video compressor software and then upload the compressed video.
Also; MOV files are always huge files, she could convert the video file from MOV file format to mp4 or other compatible video formats. However, this will reduce the video quality (though the reduction may not be visible).
The component of an information system consisting of raw facts is the definition for which of the following?
Answer:
The answer to this question is: Information
An information system is a set of command that i used to analyze available information in order to create a better decision for the company.
Which means that information will not be able to do any function of it does not possess the initial information, to begin with, so we can conclude that information is a major component of the information systems. hope this makes sense in your mind lol
Explanation:
Answer:
It should be data.
there are no options here.
Which of the following is important to optimize your Website for viewing on mobile devices?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Use more images than text to take advantage of mobile device technology.
B
Target the user who wants to browse.
C
Optimize your site to a larger screen size.
D
Keep your Webpages simple and uncluttered.
What is your favorite tech
A phone b computer
Answer:
phone
Explanation:
Answer:
A. Phone!
I use it way more often than my computer :)
What is the first step in finding a solution to a problem? Choose a solution. Think of options to solve the problem. Try the solution. Turn the problem into a question.\
Answer: Summarize the six steps of the problem solving process.
Explanation:
Answer:
turn the problem into a question
Explanation:
I got it right on a test!
Scanning low allows you to locate________before you
hit them.?
Answer:
Scanning low allows you to locate potholes before you hit them.
Explanation:
Write a program that accepts a positive integer N as command-line argument, and outputs True if N is the square of some integer, and False otherwise. Do not use math.sqrt() or similar! Hint: Clearly, all candidates i which may satisfy i2 = N must be at most N (for which "corner case" of N is i equal to N?). Therefore, it is sufficient to check if there exists an i in the range 1 ≤ i ≤ N such that i2 = N. In other words, you want to evaluate the expression (12 == N)or (22 == N)or (32 == N)or ··· or ((N − 1)2 == N) or (N2 == N). Practice goal: A variation of the primality checking program we have seen in class; follows a Boolean accumulation pattern, with logical or.
Answer:
In Python:
N = int(input("Positive integer: "))
if N > 0:
flag = False
for i in range(1,N+1):
if i * i == N:
flag = True
break
print(str(flag))
else:
print("Positive integer only")
Explanation:
N = int(input("Positive integer: "))
If the number is positive
if N > 0:
This initializes a boolean variable to false
flag = False
This iterates from 1 to the input integer
for i in range(1,N+1):
This checks if th number is a square of some integer
if i * i == N:
If yes, flag is set to true
flag = True
The loop is exited
break
This prints either true or false, depending on the result of the loop
print(str(flag))
If otherwise, that the number is not positive
else:
print("Positive integer only")
question: define oprators
Answer:
Explanation:
Operator can be defined as
a character or characters which gives determination of actions that are needed to be performed/ considered. Operators are symbols that gives the compiler information to perform specific mathematical/logical manipulations.They are special type of functions, which are capable of taking one or more arguments, then produces a new value. Different types of operator are;
✓arithmetic operators(addition "+" substraction "-"
✓relational operators( greater than ">"
lesser than"<"
✓Logical operators.( Connective words/symbols such as AND, NOT, OR)
Arithmetic Operators: These include "+" (addition), "-" (subtraction), "*" (multiplication), "/" (division), "\" (integer
During the course of execution of a program, the processor will increment the contents of the instruction register (program counter) by one word after each instruction fetch, but will alter the contents of that register if it encounters a branch or call instruction that causes execution to continue elsewhere in the program. There are two alternatives with respect to instruction addresses:
a. Maintain a relative address in the instruction register and do the dynamic address translation using the instruction register as input. When a successful branch or call is encountered, the relative address generated by that branch or call is loaded into the instruction register .
b. Maintain an absolute address in the instruction register. When a successful branch or call is encountered, dynamic address translation is employed, with the results stored in the instruction register
Ryan wants to make part of a heading bold. What would he use?
A. Presentation markup
B. Content-based markup
Answer:
Ctrl+B
Explanation:
or the bold button thats in the cornner for brainly and normally at the top of most word prosesers
im sorry i had to... for the other persons sake
What
are
the main technologies that have
contributed to the growth and commercialization of the intereret?
8.3 code practice
Need help someone that is good a coding
Answer:
Following are the code to the given question:
public class Main//defining class Main
{
public static void main(String[] abv)//defining main method
{
int nums[]={11,36,31,-2,11,-6};//defining an integer array nums
System.out.print("{");//print bracket
for(int i=0;i<nums.length;i++)//defining for loop to print value
{
System.out.print(nums[i]+",");//print array values
}
System.out.print("}");//print bracket
}
}
Output:
{11,36,31,-2,11,-6,}
Explanation:
In this code, a class Arr is declared that uses the main method, and inside the main method, an integer array nums are declared, which initializes the integer values and uses the for loop to print the initialized values with the curly bracket to prints value between them.
Where does an antivirus run suspicious applications?
Antivirus software runs suspicious applications in a ________ and checks for malicious activity.
Answer:
Antivirus programs use heuristics, by running susceptible programs or applications with suspicious code on it, within a runtime virtual environment. This keeps the vulnerable code from infecting the real world environment. Behavioural-based detection - This type of detection is used in Intrusion Detection mechanism.
Which of the following is the best reason for aspiring visual artists and designers to create greeting cards? a-popularity of greeting cards b-innovative design techniques used in cards c-ease of production d-Low cost of production
Answer:
ease of production
Explanation:
The following are the CPU and I/O behavior of three processes, timings in seconds.
Process P1 has 1 second CPU burst followed by 3s I/O followed by 1s CPU burst
Process P2 has 2 second CPU burst followed by 2s I/O followed by 2s CPU burst
Process P2 has 4 second CPU burst followed by 1s I/O followed by 4s CPU burst
Please provide approximate sketches of Gantt charts, and average turnaround times for the following scheduling algorithms:
Round Robin with a smallish time quanta (below 0.1s)
Answer:
Explanation:
From the given information:
The CPU and I/O behavior of three process timings in seconds are as shown in the image below. Not only that, the Gantt Charts and the Average Turnaround time for the scheduling algorithms were also calculated.
NOTE:
AT = arrival time
BT = Brief-time
TAT = turn around time
Turnaround Time TAT = CT - BT
Waiting Time = TAT - BT
Average TAT = 32.7/3
= 10.9 sec
Average TAT = 10.9 sec
From the attached images below showing the process and charts; we can conclude that it implies that P1, P2, P3 are scheduling in these sequences from time to time period.
Which of the following are good ways to keep your information and your computer secure?
A. Group of answer choices
B. Make sure you install updates whenever they are released.
C.Make sure you keep backups of your work.
D. Keep a password on your devices so only authorized people can access them.
E. All of these are correct.
Answer:
the correct answer is E
I do all of these so I would assume E
Answer:
E
Updating your computer makes your security system (like Windows Defender) up to date
Keeping backups of your work can ensure that you dont lose them to a virus or a hacker.
Keeping a password on your computer can prevent people from breaking in to your personal business.
Hope the Heps
Write a program that calculates the amount of money in a savings account that earns a guaranteed yearly interest rate. The program will accept from the user the account is present value (i.e. what is in the savings account now), the annual interest rate (in a percentage), and the number of years the money will be left in the account (years). The program should display the savings account future value and the number of years the money will be left in the account.
Solution :
# Reading principle amount from user
[tex]$\text{accountPresentValue}$[/tex] = eval([tex]$\text{inpu}t("$[/tex]Enter principle amount: "))
# Reading time duration in number of year from user
years = eval(input("Enter time duration in number of year: "))
# Reading interest rate from user
annualInterestRate = eval(input("Interest rate: "))
# calculating futureValue using user input data
futureValue = accountPresentValue * (1 + annualInterestRate / 100) ** years
# printing calculated futureValue to console
print("Final balance =",futureValue)
explain the defference in reference to version and edition in windows operating system
Answer: It depened on what the other version is
Explanation:
What would this HTML code look like on a web page?
A. Local artist, Shalaine Powers, will be exhibiting her paintings throughout all next year!
B. Local artist, Shalaine Powers, will be exhibiting her paintings throughout all next year!
C. Local artist, Shalaine Powers, will be exhibiting her paintings throughout all next year!
D. Local artist, Shalaine Powers, will be exhibiting her paintings throughout all next year!
Answer:
it's look a local artist.
is a device connected to a sound card in the system.
Answer:
Yes
Explanation:
A sound card (also known as an audio card) is an internal expansion card that provides input and output of audio signals to and from a computer under control of computer programs. The term sound card is also applied to external audio interfaces used for professional audio applications.
You can write a function to find Fibonacci numbers using recursion.
How do you find the next number?
add five to the previous number
add one to the previous number
multiply the two previous numbers
add the two previous numbers
Answer:
Add the two previous numbers
Explanation:
A recursive definition of the Fibonacci sequence would look like this, in python:
def fibonacci(n)
if n <= 1:
return n
else:
return(fibonacci(n-1) + fibonacci(n-2))
what is the role of information system in bank?
Explanation:
The main goal of these systems is to organise all data collected from every level of the company, summarize it, and present it in a way that facilitates and improve the quality of the decisions being made to increase the company's profitability and productivity.Which TWO programming languages are most commonly used to write software programs for mobile devices?
A. COBOL
B. Objective-C
C. Swift
D. FORTRAN
Answer:
The correct answers are:
A. Objective-C
C. Swift
Explanation:
I got it right on the Edmentum test.
How do I use the VLOOKUP function to find the course grade on this excel sheet.
Answer:
Explanation:i don't know
if you would give me more of an idea on what you are doing i could help
What is the output of this program?
age = 4
if age > 5:
print("more")
else:
print("less")
Output:
Answer:
less
Explanation:
Edge 2022
(1) Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output those four values on a single line separated by a space. (2 pts) Note: This zyLab outputs a newline after each user-input prompt. For convenience in the examples below, the user's input value is shown on the next line, but such values don't actually appear as output when the program runs. Enter integer: 99 Enter double: 3.77 Enter character: 2 Enter string: Howdy 99 3.77 z Howdy (2) Extend to also output in reverse (1 pt) Enter integer: 99 Enter double 3.77 Enter characteri Enter string: Howdy 99 3.772 Howdy Howdy z 3.77 99 (3) Extend to cast the double to an integer, and output that integer (2 pts) 0 en soa Enter integer: 99 Enter double: 3.77 Enter character: 2 Enter string: Howdy 99 3.77 z Howdy Howdy z 3.77 99 3.77 cast to an integer is 3 LAB ACTIVITY 14.1.1: Prog 1: Variables, input, and casting 0/5 BasicInput.java Load default template. 1 ort java.util.Scanner: 2 3 lic class Basic Input I 4 public static void main(String args) { 5 Scanner ser-new Scanner(System.in); 6 int userint; 7 double userDouble; B // FTOME Define chor and string variables similarly 9 char UserChar: 10 String userString: 11 12 System.out.println("Enter integer"): 13 user Int - ser.nextInto: 14 15 // FTXMC (1): Finish reading other items inte variables, then output the four values on a single line separated by a space
Answer:
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int intgVal; double dblVal; char chrVal; String strVal;
System.out.print("Enter integer: ");
intgVal = input.nextInt();
System.out.print("Enter double: ");
dblVal = input.nextDouble();
System.out.print("Enter character: ");
chrVal = input.next().charAt(0);
input.nextLine();
System.out.print("Enter string: ");
strVal = input.nextLine();
System.out.println(intgVal+" "+dblVal+" "+chrVal+" "+strVal);
System.out.println(strVal+" "+chrVal+" "+dblVal+" "+intgVal);
int IntValue = (int) dblVal;
System.out.print("Cast to an integer: "+IntValue);
}
}
Explanation:
See attachment for complete program where comments were used to explain each line of the program
An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot conform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development and staging) without risk acceptance, but must receive risk approval before the system is placed in production. Weekly scan reports identify systems that do not conform to any secure baseline. The application team receives a report with the following results:
Host Environment Baseline deviation ID(criticality)
NYAccountingDev Development
NYAccountingStg Staging
NYAccounting Prod Production 2633 (low), 3124 (high)
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and the organization cannot operate if the application is not running. The application fully functions in the development and staging environments. Which of the following actions should the application team take?
A. Remediate 2633 and 3124 immediately.
B. Process a risk acceptance for 2633 and 3124.
C. Process a risk acceptance for 2633 and remediate 3124.
D. Shut down NYAccounting Prod and investigate the reason for the different scan results.
Answer:
C. Process a risk acceptance for 2633 and remediate 3124.
Explanation:
There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.
What is Web analytics?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
An integration of communications, data management and security capabilities to allow organizations and consumers to exchange information related to the sale of goods and services
B
A process of improving the volume and quality of traffic to a Website by structuring content to improve search engine ranking
C
An Internet marketing technique that enables you to list your site high in search engine rankings by advertising on keywords that describe your product or service
D
A practice of collecting data and studying user behavior in an attempt to increase market share and sales
Answer:
D. A practice of collecting data and studying user behavior in an attempt to increase market share and sales.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
Web analytics can be defined as a practice of collecting data and studying user behavior in an attempt to increase market share and sales. Some examples of web analytics software are Goo-gle analytics, Piwik, etc.
It includes gathering the following informations from customers;
I. A customers' favorite product.
II. Preferred means of payment.
III. Most widely used features.
IV. Frequently visited sections.