Use the drop-down menus to complete the steps to convert a macro to VBA.
1. Open the macro in view.
2. The Design conditional tab will appear.
3. Find the Tools group, and select .
4. The Convert dialog box will open.
5. Click .
6. The macro is now in VBA formatting.

Answers

Answer 1

Answer:

1. Design

2. Convert Macros to Visual Basic

3. Convert

Explanation:

Use The Drop-down Menus To Complete The Steps To Convert A Macro To VBA.1. Open The Macro In View.2.
Answer 2

Answer:

B D A

Explanation:


Related Questions

Catastrophic injuries and illnesses account for two-thirds of total health care costs in the country of Gnut. The Gnuti government is deciding between two different universal health insurance programs: program X would pay for two-thirds of any health care expense that a Gnuti citizen incurred, while program Y would pay only for catastrophic illnesses and injuries, but would cover 100% of those costs. Which program is likely to better allow Gnuti citizens to smooth consumption

Answers

Answer:

In the country of Gnut

The universal health insurance program that is likely to better allow Gnuti citizens to smooth consumption is:

program Y that would pay only for catastrophic illnesses and injuries.

Explanation:

Program Y is a better option for Gnuti citizens to smooth consumption.  The reason is that catastrophic injuries and illnesses already account for two-thirds of the total health care costs in the country.  These injuries and illnesses cost more income variability to the citizens than other health care expenses.  With the government sponsoring program Y, the citizens will be insulated from consumption patterns caused by income variability.  Consumption smoothing creates the needed balance between spending and saving during the different life phases for the citizens of Gnut.

2. Released in 1992, Street Fighter II, the revolutionary fighting game, was developed by which company?
a) Electronic Arts
b) Atari Interactive Inc.
c) Capcom
d) Nintendo

Answers

Answer:

It is D

Explanation:

Street Fighter II: The World Warrior is a competitive fighting game developed by Capcom and originally released for arcade systems in 1991.

Answer:

c

Explanation:

2. Many successful game companies have adopted this management approach to create successful and creative video games.
a) Creating a creative and fun workspace for employees
b) Offering free lunches and snacks.
c) Having a good design idea to start with.
d) Having enough material and human resources to work with.

Answers

Answer:

Having a good design idea to wotk with

Explanation:

1. It is a technique of creating a picture or pattern by forcing ink or metal on to a surface though a screen of fine material.​

Answers

Answer:

hmm

Explanation:

I'm pretty sure it's screen painting? it's a print making method that forces ink through fine mesh

You work in a pawn shop that gets in shipments of jewelry. Each shipment is kept in a file (see below for a sample file) and contains the type of jewelry, the stone in the piece of jewelry and whether it is real or fake. Create a function that prints to screen certain information about the shipment and returns the number of a specific number of items (based on the arguments-see sample runs)
File: jewelry1.txt ring diamond real necklace diamond real ring sapphire fake bracelet ruby fake bracelet diamond fake Sample runs: printf("%d\n",get_available_items("jewelry1.txt","stone")); (base) Computers-MacBook Air! computers .la.out I see that -stone- is important in this shipment. Any specific stone to count? diamond OK. I will keep count of the number of the following that I find: diamond --diamond print out all stones --diamond - - Sapphire --ruby --diamond -ruby returns 3 since there are 4 diamonds printf("%d\n",get_available_items("jewelry1.txt", "type")); (base) Computers-MacBook Air:C computers ./a.out I see that -type- is important in this shipment Any specific type to count? ring Ok. I will keep count of the number of the following that I find: ring ring print out all types --necklace -ring --bracelet --bracelet --ring 3 returns 3 since there are 3 rings printf("%d\n",get_available items("jewelry1.txt", "authentic")); (base) Computers - MacBook Air:C computers .la.out I see that -authentic. is important in this shipment. Any specific authentic to count? fake Ok. I will keep count of the number of the following that I find: fake - real print out all real/fake - real - fake - fake --fake fake returns 4 since there are 4 fakes printf("%d\n",get_available_items("jewelry1.txt","cookie")); (base) Computers-MacBook Air:C computers ./a.out Unknown parameter to check...-1 you have to pass one of the following: type. Stone, authentic

Answers

I find: ring ring print out all types --necklace -ring --bracelet --bracelet --ring 3 returns 3 since there are 3 rings printf("%d\n",get_available items("jewelry1.txt", "authentic")); (base) Computers - MacBook Air:C computers .la.out I see that -authentic. is important in this shipment. Any specific authentic to count? fake Ok. I will keep count of the

write a c program to find product of all even numbers between 10 t0 30

Answers

Answer:

#include <stdio.h>

int main(void) {

 unsigned long n = 1;

 for(unsigned long i=10; i<=30; i+=2) {

   n *= i;

 }

 printf("%lu",n);

 return 0;

}

Explanation:

The output is: 111588212736000

The answer will take 47 bits, so you have to use 64-bit longs. An int is 32 bit thus will give the wrong answer due to a numeric overflow.

CODE

#include <stdio.h>

int main() {

   long long int product = 1;

   for(int i = 10; i <= 30; i = i + 1) {

       if(i%2 == 0) {

          product = product * i;

       }

   }

   

   printf("%lld",product);

   return 0;

}

DISPLAY

111588212736000

EXPLANATION

Declare the variable product as a long long integer type to hold 8 bytes.

Use a for loop which initializes at 10 and maximizes at 30, and increases a point each time.

Use an if statement to check for even numbers by checking the remainder.

Display the product.

16. The Nintendo Entertainment System (NES) saw its sales skyrocket as a result of the launch of which of the following games?
a) Pac-Man
b) Super Mario Bros
c) The Legend of Zelda
d) Popeye

Answers

Answer:

Super Mario bros

Explanation:

Give four important of search engine

Answers

Search engines have become an active part of our lives. Why I say active is because these days search engines are performing more than just one task. Even if we look at the main task that search engines perform, i.e. providing information, just look at the function they perform for us. In our automated world, information is power. On a daily basis we come in contact with millions of small facts and figures. Some we require, some we don’t. Some we use immediately, some we look up later. Fact is search engines essentially help us remember and retrieve critical pieces of information as and when we need them.

Search engines basically act as filters, allowing the users to search the internet for information using keywords. Without these search engines the information on the internet could essentially become indecipherable. The main goal of search engines is to unwind this information and provide relevant information, but this is by no means the only service that search engines can provide.

13. By adding built-in writable memory to its cartridge, Nintendo’s _________________ was the first console game that gamers could save.
a) Mario Bros.
b) Donkey Kong
c) The Legend of Zelda
d) Zork

Answers


The answer is c
Explanation:

List ICT components of video conferencing​

Answers

Answer:

Displays

Microphones

Speakers

Internet Connection

Explanation:

In the following instruction sequence, show the values of the Carry, Zero, and Sign flags where indicated:_____.
mov al, 00001111b
test al, 00000010b
mov al, 00000110b
cmp al, 00000101b
(Hint: type in your answer as CF = ZF = SF = ___)

Answers

Answer:

CF  = 0

ZF = 0

SF = 0

Explanation:

Assuming that at the initial stage that all Flag values are = zero

every Instruction sequence will have the values of CF , ZF and SF = 0 respectively

i.e.

CF = 0

ZF = 0

SF = 0

This is because the instruction "mov" in the instruction sequence does not have an effect on the flags. until when the accumulator is loaded with the value zero

12. What separated Grand turismo from other racing games was its focus on ______.
a) Your audiences and females in particular
b) Fantasy graphics and visuals
c) Pure simulation and ultrarealistic features
d) All of the above

Answers

Answer:

c) Pure simulation and ultrarealistic features

Explanation:

The main difference between Grand Turismo and other racing games was its focus on Pure simulation and ultrarealistic features. The Grand Turismo series has always been a racing simulation, which was made in order to give players the most realistic racing experience possible. This included hyperrealistic graphics, force feedback, realistic car mechanics, realistic weather, and wheel traction among other features. All of this while other racing games were focusing on the thrill of street racing and modifying cars. Therefore, it managed to set itself apart.

computer is classified into how many ?​

Answers

Answer:

four types

Explanation:

There are four types in the classifications of the computer by size are Supercomputer, Mainframe computer, Minicomputer, and Micro Computer

Answer:

The computer is classified in 4:

Supercomputer

Mainframe computer

Minicomputer

Micro Computer

Explanation:

I have an array that is already sorted. Periodically, some new data comes in and is added to the array at random indexes, messing up the ordering. I need to re-sort the array to get it back to being fully ordered. I do not want to use very much additional memory during the sort. Choose the sorting algorithm we studied that will perform the best:

a. Quick sort
b. Merge sort
c. Insertion sort
d. Selection sort

Answers

Answer:

The answer is "Option C".

Explanation:

The array was already sorted. Much new information is applied to the array on a recurring basis at random indices, to bring everything back in order. During in the sort, I wouldn't want to use much further memory.

It is a sorting algorithm that constructs one piece at a time in the final sorted array. In large lists, it is far less effective than sophisticated technology like quicksort, heapsort, or combination sort.

List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13, 18, 21, 24

Answers

Answer:

13217182472

Explanation:

liner search and binary search

Java Programming
Create a USMoney class with two private integer instance variables named dollars and cents. Add a constructor with two parameters for initializing a USMoney object. The constructor should check that the cents value is between 0 and 99 and, if not, transfer some of the cents to the dollars variable to make it between 0 and 99.
Add a plus() method to the class that takes a USMoney object as its parameter. It creates and returns a new USMoney object representing the sum of the object whose plus() method is being invoked and the parameter. Hint: Your USMoney object may require both a getDollars() method and a getCents() method.
The plus() method does not modify the values of the two existing objects. It should also ensure that the value of the cents instance variable of the new object is between 0 and 99.
For example, if x is a USMoney object with 5 dollars and 80 cents, and if y is a USMoney object with 1 dollar and 90 cents, then x.plus(y) will return a new USMoney object with 7 dollars and 70 cents.
Of course, you will need to create a USMoneyDemo class that tests the USMoney class. Your USMoneyDemo should prompt the user twice. The first to enter an integer representing dollars and the second to enter an integer representing cents. Use these values to create the first object named x. Do it again for the object named y. Do not worry about putting these prompts in a loop for now.
Be sure to add some documentation and put any partner(s) names in the main application's doc box.
For Part 1, submit two files on Blackboard: USMoney.java and USMoneyDemo.java
Part 2 – 25 points
Create a Date class with three private integer instance variables named day, month, year. It has a constructor with three parameters for initializing the instance variables, and it has a method named daysSinceJan1(). Note: It could have other methods.
Just as its identifier suggests, the daysSinceJan1() method computes and returns the number of days since January 1 of the same year, including January 1 and the day in the Date object itself.
Create a DateDemo class that tests the Date class. First prompt the user to enter an integer representing the day, a second prompt to enter an integer representing the month and a third to enter an integer representing the year. (Do not worry about doing any validation of the values entered.) Then, instantiate your Date object with these values. After that, call the method DaysSinceJan1() to display the answer.
An example would be that the user enters values of day = 1, month = 3, and year = 2019, then the call day.daysSinceJan1() should return 60 since there are 60 days between the dates of January 1, 2019, and March 1, 2019. In leap years, it should return 61.
Note that, in a leap year like 2020 will be, there will be one more day counted between January 1 and any date following February 28. What are the rules for leap years? If the year is evenly divisible by four, then it is a leap year...but not always! If it is a century year such as 1900 or 2000, it is only a leap year if evenly divisible by 400. Therefore, the century year 2000 WAS a leap year but 1900 was NOT a leap year! Neither were 1700 or 1800 and neither will be 2100...but 1600 was!
You may NOT use an Array or ArrayList (or any other type of array) and you may not use any of the Java API date classes and/or methods.
Document like you did for Part 1.
For Part 2, submit two files on Blackboard: Date.java and DateDemo.java

Answers

Answer:

Explanation:

The following codes are written in Java. Both the class and the classDemo are in the same file but seperated as classes should be for each part of the question. The example outputs are shown in the attached pictures below, and the codes are added as txt files due to technical difficulties.

Consider a logical address space of 64 pages of 1,024 words each, mapped onto a physical memory of 32 frames. Show your work. You can either type the solution or write

Answers

Answer:

Logical address = 16 bits

Physical address = 15 bits

Explanation:

Logical space, number of pages = 64 = 2^6

Word size per page = 1024 = 2^10

Size of logical address :

Number of pages * words per page

2^6 * 2^10 = 2^(6+10) = 2^16 = 16 bits

For the physical address :

Number of frames = 32 = 2^5 frames

Word size = 1024 = 2^10

Number of frames * word size

2^5 * 2^10 = 2^(10+5) = 15 bits

Sergio needs to tell his team about some negative feedback from a client. The team has been
working hard on this project, so the feedback may upset them. Which of the following explains
the best way for Sergio to communicate this information?

A) Hold an in person meeting so that he can gauge the team's body language to assess their
reaction

B) Send a memorandum so everyone will have the feedback in writing

C) Hold a video conference so everyone can see and hear about the client's concern without the group witnessing each other's reactions

D) Send an email so everyone will have time to think about the feedback before the next team meeting

Answers

Answer: A

Explanation: sergio should do it in person that way he can assess their body language. by doing this, he can tell how the team feels about the feedback

Can 7Cs help to develope an effective document?

Answers

Answer:

i dont know k srry

Explanation:

Point out the correct statement:_____.
a. A virtual machine is a computer that is walled off from the physical computer that the virtual machineis running on
b. Virtual machines provide the capability of running multiple machine instances, each with their own operating system
c. The downside of virtual machine technologies is that having resources indirectly addressed means there is some level of overhead
d. All of the mentioned

Answers

Answer:

b. Virtual machines provide the capability of running multiple machine instances, each with their own operating system

Explanation:

A VM ware is a virtual machine that is designed to run, test, and optimize operating system software. It's an emulation program that is set for running and supporting multiple OS within the single host operating system. The virtual system offers similar hardware and software tools that are present in a system virtually.

write an algorithm and flowchart to calculate sum of two given numbers​

Answers

Step 1: Start
Step 2: Declare variables num1, num2 and sum.
Step 3: Read values for num1, num2.
Step 4: Add num1 and num2 and assign the result to a variable sum.
Step 5: Display sum
Step 6: Stop
#include
int main()
{
int num1,num2,sum;
printf("\n Enter the first number to be added: ");
scanf("%d",&num1);
printf("\n Enter the second number to be added: ");
scanf("%d",&num2);
sum = num1 + num2;
printf("\n The sum of two numbers is: %d",sum);
return 0;
}

Write a program in Python that:
- Reads in the data in the file given, Sets up the appropriate classes/attributes/methods, Assigns definitions to each category, Prints out the report for all instances in the input file
Setting up the data:
Month name, Number of days in the month, Market name, Category name, Category definition, Store name, Store type, brand name, sales
The output should have 10 lines or sets of lines. The output will look like this:
For the month of April, Charmin Bath Tissue within Jewel Food stores had sales of $ 68 in the Chicago market for a market share of 52
For the month of April, Charmin Bath Tissue within Jewel Food stores had sales of $ 62 in the Chicago market for a market share of 47
File contents are in .csv file (excel) and were copied and pasted below:
April 30 Chicago Bath Tissue Jewel Food Charmin 68
June 30 Chicago Bath Tissue Jewel Food Charmin 74
April 30 Chicago Bath Tissue CVS Drug Charmin 96
June 30 Chicago Bath Tissue CVS Drug Charmin 33
April 30 Chicago Bath Tissue Jewel Food Scott 62
June 30 Chicago Bath Tissue Jewel Food Scott 87
April 30 Chicago Bath Tissue CVS Drug Scott 98
June 30 Chicago Bath Tissue CVS Drug Scott 39
April 30 Chicago Bath Tissue Marianos Food Charmin 85
June 30 Chicago Bath Tissue Marianos Food Charmin 20

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes in the location of the csv file. Reads it line by line and ouputs the desired statement as seen in the example output provided in the question. The data does not provide the market share value to add to the statement so it was left blank.

from csv import reader

def printCSV(csv_file):

   with open(csv_file, 'r') as read_obj:

       csv_reader = reader(read_obj)

       for row in csv_reader:

           print(

               "For the month of " + row[0] + ", " + row[7] + " " + row[3] + " " + row[4] + " within " + row[5] + " " +

               row[6] + " stores had sales of $ " + row[8] + " in the " + row[2] + " market for a market share of ")

Your program will be used by many departments at the university. Your comments will be important to their IT people. What would be a useful comment?

This was a really hard part to write, but it finally works.

I’m not sure what this does, but I don’t have time to troubleshoot it.

This segment returns a value that is used by the segment marked B.

Answers

Answer:

This segment returns a value that is used by the segment marked B.

Explanation:

just took assigment

Answer:

C

Explanation:

3. In which of the following places can
you always find a 'home page'?
a) at home
b) in a book
c) on the World Wide Web
d) in a printer​

Answers

Answer:

On the World Wide Web

Explanation:

Sure theres always a homepage somewhere. But i dont know what your researching so i went with c.

On the World Wide Web

Write a method that converts a time given in seconds to hours, minutes and seconds using the following header:

public static String convertTime(int totalSeconds)

The method returns a string that represents the time as hours:minutes:seconds.

Write a test program that asks the user for the time in seconds and then display the time in the above format.

Answers

Answer:

hope this helps.

Explanation:

import java.util.*;

class Timeconvert{ //class nane

public static String convertTime(int totalSeconds) /* fn to convert seconds to hh:mm:ss format */

{

int sec = totalSeconds; // a copy of totalSeconds is stored in sec

int m=sec/60; //to find the total min which obtained by doing sec/60

int psec=sec%60; //psec store remaining seconds

int hrs=m/60; //stores hr value obtained by doing m/60

int min=m%60; //stores min value obtained by m%60

return (hrs + ":" + min+ ":" +psec);// returning that string

}

}

public class Main

{

  public static void main(String[] args) {

  Timeconvert t = new Timeconvert();

  Scanner in = new Scanner(System.in); //Scanner class

System.out.println("Enter the number of seconds:");

int sec = in.nextInt(); //to input number of seconds

System.out.println("hours:minutes:seconds is " + t.convertTime(sec)); //result

 

  }

}

What is the answer to the question

Answers

Answer:

B. H1

Explanation:

H1 is the largest header in the hierarchy. H6 is the smallest.

Answer:

<h1>Hello</h1>

H1 is bigger

Frank enters "1" in the field for postal code. What is frank most likely trying to do?

Answers

Answer:

Explanation:

Identify the management, organization, and technology factors responsible for slow adoption rates of internal corporate social networks.when a company decides to launch a social networking program the management, all need to be on board with the launch. from the ceo down to the shift or assistant manager everyone needs to know its coming and be excited. the organization of such a launch needs to be mapped out, and training provided for the new systems. within the company, they need to make sure the technology at hand (computers, tablets, and company phones), are all compatible with the system. when a company launches a new system, and the find that the employees are not adopting it, they need to investigate the reasons. is the management at all level's onboard? did we organize the launch properly? do we have the right technology for the system? things can goeither way but if

Carla wants to add the existing field "Order ID Number" to an Access form. Which steps will allow her to complete
this task in Design view?
in the Design section, select the Format tab → select Add Existing Fields → cut and paste the field "Order ID
Number" into the form
O in the Design section, select the Form Design Tools tab → select Add Existing Fields — drag and drop the field
"Order ID Number" into the form
O in the Form Design Tools section, select the Arrange tab → select Add Existing Fields → cut and paste the field
"Order ID Number" into the form
O in the Form Design Tools section, select the Design tab → select Add Existing Fields → drag and drop the field
"Order ID Number" into the form
Mark this and return
Next
Submit

Answers

Answer:

in the Design section, select the Form Design Tools tab → select Add Existing Fields — drag and drop the field

"Order ID Number" into the form

Explanation:

I just took it

Consider the following code:
val = 50
def example():
val = 15
print (val)
print (val)
example)
print (val)
What is output?
1.
2.
3.

Answers

I got you bro the answer is 50, 15, 5

Describe Atari and explain how the level of technology available at the time impacted the development of Atari game systems

Answers

Answer:

Atari is something that is dangerous .

has led to many bad things to the young ones

Other Questions
Find the length of the unknown leg of the right triangle. Use pencil and paper.Draw the triangle on graph paper and measure to verify the answer. Question 1 of 10Which two factors affect the amount of thermal energy an object has?A. The directions in which its particles are movingB. The mass of the objectO C. The amount of motion its particles haveD. The amount of space between its particles Elazari discussed how some companies are willing to reward hackers when they make a discovery that needs to be fixed within their system. Do you believe hackers are a necessary part of ensuring Internet safety and should they be rewarded for their efforts? The students in Mrs. Smith's class used pH paper to measure the acidity levels between different samples of breakfast drinks. The pHmeasurements ranged from 3.27 to 3.88 on the pH scale. Based on this range, we can determine that the most acidic solution had a pH of: i need help please if u give me the right answer ill give u a brainliest What is the definition of independent samples? A. All samples of the same size have an equal chance of being selected from the population. B. The sample selected from one of the populations has no effect or bearing on the sample selected from the other population. C. The sample selected from one of the populations is paired with a sample selected from the other population. The small, discontinuous movements of the eye that involve its lateral "jumping" fromone focal point to another are termed _____. 12. At a store each notebook has a cost of x dollars. Which situationcan be represented by this inequality?5x < 3 x + 2 2. Between which two weeks did the plant grow the least? solve for x can somebody please help The difference between 9 times a number and 5 is 40. Which of the following equations below can be used to find the unknown number? What three characters die in act 5 of Macbeth? NO LINKS OR FILES-10 ptsTYPE OUT THE ANSWER-10ptsThe chart below shows the number of fish caught at different water depths by a group of friends.Water Depth (feet) Number of Fish0-6 36-12 812-18 618-24 1324-30 4Which histogram best represents this data? In addition to different gameplay styles, games also have different player states.True False How did President Wilson's goals differ from those of other leaders at Versailles? A. He wanted to punish Germany for the war. B. He wanted to achieve peace without victory. C. He wanted to acquire new colonial territory. D. He wanted to reduce Germany's military power. If x=|9| what are the possible value of x On April 17, 2021, the Loadstone Mining Company purchased the rights to a coal mine. The purchase price plus addi- tional costs necessary to prepare the mine for extraction of the coal totaled $4,500,000. The company expects to extract 900,000 tons of coal during a four-year period. During 2021, 240,000 tons were extracted and sold immediately. Required: 1. Calculate depletion for 2021. 2. Is depletion considered part of the product cost and included in the cost of inventory (yes/no) y=5x2 into polar form 7.500/3.125 What is written in decimal form? 3.195 A. 0.116 O B. 2.4 O c. 4.375 D. 75.3125 1. what is f(3)?2. what is f(-2)?3. find g(10).4. given g(x) = 17, find x.