Answer:
Option 2: a type of mini chart that users can insert into a worksheet
Explanation:
A graph or chart is used to show trends and changes in a dataset.
When we have to show trends or changes in MS Excel, there are a lot of options available. One of them is Sparklines. Sparklines are like mini charts that can be used to show data graphically.
Hence,
The correct answer is:
Option 2: a type of mini chart that users can insert into a worksheet
Answer:
answer c
Explanation:
Question # 6
Dropdown
Choose the correct ending to the sentence below.
The function localtime() _____________________
Answer:
returns a different value every time you use it
Explanation: :)
What input is needed for the defined output?
Answer:
The data that are needed to be included in the output is called as
Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation
What is Microsoft PowerPoint?
Oa presentation program included with Microsoft Office
oa project management program available only in certain versions of Microsoft Office
Oa desktop publishing program included with Microsoft Office
oa collaboration program available only in certain versions of Microsoft Office
Answer:
ITS THE FIRST ONE :)
Explanation:
ALSO IF ITS NOT THE FIRST ONE GO ON YT!
help please with the question in the photo
Answer:
A
Explanation:
A because, why would someone want to listen to your own interests?
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False
Answer:
False
Explanation:
The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares
The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability
Designing the right elements for the tasks that the user is attempting to perform is called ________.
Answer:
Interface design
Explanation:
INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.
Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?
Answer:
no im not
Explanation:
but i sorry that you are
If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decryption techniques, then you are learning about cryptography.
If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.
If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?
A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team
Answer:
d
Explanation:
hi
an event handler is..
a. a word that is open for interpretation.
b. a sentence that provides information.
c. a procedure that occurs as a result of a users action or another source.
Answer:
The correct answer is:
Option c. a procedure that occurs as a result of a users action or another source.
Explanation:
First of all, let us define what an event is.
An occurrence that is caused by any external user or entity towards a software or a website is called an event i.e. click from mouse, key pressed from keyboard.
When an event occurs, the software or functionality of the website has to respond to the event. An event handler is a function or procedure that contains the code which has to be run when the event occurs.
When the event occurs, the event handler for particular event is executed.
So from the given options,
The correct answer is:
Option c. a procedure that occurs as a result of a users action or another source.
Write one kid-friendly paragraph about a Software Developer's salary,.
Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?
Answer:
120
Explanation:
This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.
5 permutation of 4
To find permutation, we use the formula
P(n, r) = n! / (n - r)!
Where
n is the size of the shirts available, 5
r is the color of each shirt available, 4
P(5, 4) = 5! / (5 - 4)!
P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!
P(5, 4) = 120 / 1
P(5, 4) = 120
Therefore, the total number of shirts available is 120
What is the missing line of code?
>>> phrase = "You are amazing!"
>>> _____
'u a'
phrase[3:6]
phrase[2:6]
phrase[3:5]
phrase[2:5]
Answer:
phrase[2:5]
Explanation:
Given:
The above code segment
Required
Which instruction returns 'u a'
First, we need to get the index of u in the phrase:
u is at the third position but in programming, index starts at 0.
So, u is at index 2
Next, we need to get the index of a in the phrase:
a is at index 4
One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]
Where:
[tex]start = 2[/tex] ----- index of u
[tex]stop = 4[/tex] ----- index of a
phrase ---- The string variable
So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]
Where 5 = 4 + 1
Answer:
phrase[2:5]
Explanation: got it right on edgen
If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );
Answer:
C) someThing.someMethod( )
Explanation:
The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.
In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.
What is the best use of network in homes
Answer:
Spectrem
Explanation:
If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.
Answer:
D) Software problem
Explanation:
plz give me brainliest
D
edge2021 YWWWWWWWWWWWWWWWWWWWWW
Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above
Answer:
d ) all of the above
Explanation:
is the correct answer
What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links
Answer: b
Explanation:
Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!
Answer:
20%
Convert fraction (ratio) 30 / 150 Answer: 20%
The first one.
Please I need one more braniest for 'expert' may I get it?
Explanation:
Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia
Answer:
D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.
Explanation:
Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.
What are utopias and dystopias?Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.
Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.
Learn more about utopias and dystopias, Here:
https://brainly.com/question/905235
#SPJ2
You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.
8. Write the examples of freeware and Shareware softwares ?
Explanation:
People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.
Freeware software:
Adobe PDF
yahoo messenger
Go.ogle Talk
MSN messenger
People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.
Shareware software:
Adobe acrobat 8 professional
Winzip
Getright
Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
a. HTTP
b. HTTPS
c. Web Application Frameworks
d. Cascading Style Sheets (CSS)
e. Document Object Model (DOM)
Answer:
c. Web Application Frameworks
Explanation:
Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.
Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.
Hence, in this case, the correct answer is Web Application Framework.
What is the purpose of a Hyperlink
Can you answer both
Answer:
Number 16 is A Or B And Number 17 is B I think
Explanation:
What is better to use for start Python or Java?
Answer:
here is your answer ......
hope it helps......
Answer:
python is better
Explanation:
because its my favourite
what is the operating system on an IBM computer?
Answer:
OS/VS2 and MVS
Explanation:
Assume the clock for a 4-bit binary counter is 80 kHz. The output frequency of the fourth stage (Q3) is
Answer:
5kHz
Explanation:
There are four stages so N = 2⁴ = 16.
The frequency at nth stage is given by
[tex]f_n = \frac{f_{clk}}{N} = \frac{80kHz}{16} = 5kHz[/tex]
The output frequency of the fourth stage (Q3) is 5kHz. Thus the correct option is A.
What is a 4-bit binary counter?On each clock cycle, the 4-bit synchronous counter successively counts up from 0 (0000) to 15 as outputs ( 1111 ). It is also known as a 4-bit Synchronous Up Counter as result.
We required four Flip Flops to create a 4-bit counter, as indicated by the number 4 Flip Flops. The counter also has a reset pin, which enables it to enter an all-zero mode in which its output is "0."
The Q output of the previous flip-flop triggers the CLK input in the 4-bit counter above, as opposed to the Q output as in the up counter configuration, where the output of each flip-flop changes state on the rising edge.
There are four stages so N = 2⁴ = 16.
The 4-bit binary counter is 80 kHz.
In order to calculate the output frequency the 4-bit binary counter is divided by 16 which is equal to 5kHz.
Therefore, option A is appropriate.
Learn more about the 4-bit binary counter, here:
https://brainly.com/question/29894384
#SPJ5
The complete question is Probably
Assume the clock for a 4-bit binary counter is 80 kHz The output frequency of the fourth stage (Q3) is. a) 5kHz. b) 10 kHz. c) 20 kHz. d) 320 kHz.
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
Write a program that takes two decimal numbers as input and print the largest. If the numbers are equal, print one of them.
print(max(float(input("Enter a decimal number: ")),float(input("Enter a decimal number: "))))
This would be the simplest way to do it. Best of luck.
On line two, you take a string, word, as input. Then, using that string...
1. In the first line of your output, print the third character of this string.
2. In the second line, print the second to last character of this string.
3. In the third line, print the first five characters of this string.
4. In the fourth line, print all but the last two characters of this string.
5. In the fifth line, print all the characters of this string with even indices
(remember indexing starts at 0, so the characters are displayed starting
with the first)
6. In the sixth line, print all the characters of this string with odd indices
(1.e. starting with the second character in the string).
7. In the seventh line, print all the characters of the string in reverse order.
8. In the eighth line, print every second character of the string in reverse
order starting from the last one.
9. In the ninth line, print the length of the given string,
Answer:
7
Explanation:
This one obtains results that the others in particular do not have, whether it is even one more word or another initial sentence
Always place the smallest dimensions ____ the object, with ____ the object.
Question 2 options:
A) closest to; progressively smaller dimensions outward from
B) closest to; progressively larger dimensions outward from
C) farthest from; progressively smaller dimensions above
D) farthest from; progressively larger dimensions above
E) none of the above