45 points

Multiple Choice: Choose the answer that best fits each statement below.

______ 5. Which of the following can be found by clicking the AutoSum drop‐down?
a. Average
b. Min
c. Sum
d. All of the above

______ 6. Which option is used to prevent a cell reference from changing when a formula is copied to
another location?
a. Named ranges
b. Absolute cell reference

______ 7. An advantage to defining range names is:
a. Selections can be larger
b. Selections can be any format
c. Name ranges are easy to remember
d. Name ranges clear cell contents

True/False: Answer True or False for each statement below.
______ 8. You can only increase or decrease the decimal places by two.
______ 9. The comma style allows you to format with a thousands separator.
______ 10. Excel does not allow you to copy and paste formulas with AutoFill.

Answers

Answer 1

Answer:

5 its either a or b and 6 is b 7 is d  and 8 t 9 f 10 f

Explanat ion:


Related Questions

You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure in a single component does not cause the website to become unavailable. What should you add to your configuration to accomplish this

Answers

Answer: Connect one server through a different ISP to the Internet

Explanation:

With RAID 1 configuration, data can be simultaneously copied from one particular disk to another, thereby creating a replica.

Since the person wants to provide redundancy so that a failure in a single component does not cause the website to become unavailable, one server should be connected through a different ISP to the Internet.

Which of the following belongs in a website citation? (select all that apply)

the place where the author works

the Internet address or web page address

the person or organization responsible for the website

page numbers

the date when you got the information

Answers

The place where the author works I think

Answer:

the Internet address or web page address

the person or organization responsible for the website

the date when you got the information

Explanation:

Match the network topology to its description. 1. bus data is certain to reach its destination 2. mesh no danger of data collision with this topology 3. ring limited expansion capability 4. star nodes are connected to a central hub

Answers

Answer:

3,1,2

Explanation:

what is the best wi-fi name you have ever seen?

Answers

Answer:

bill wi the science fi

Explanation:

True or False

Operating systems control the loading of software applications onto a computer

All OSs offer user preferences allowing you to customize your computer

Answers

I used this from a other.

False

Software is the collection of large program or instruction of codes, which is used to perform some task. It is of two types of system software and application software.

The system software is used as a container for the application software and it is used to handle all other software it is used to operate the system.

Application software is used to perform any operation. This type of software can be used by the user if it is installed on the local machine on any system software

The operating system is also the part of the system software because it is used to operate the system and it is also the soul of the computer system which is also the function of the system software but the above question states that the operating system is not the part of the system software which is not correct. Hence false is the correct answer to the above question.

Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.

Answers

Answer:

probly

Explanation:

Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.

Suggest three ways in which celebrating an occasion influences food choices?

Answers


Celebrating influences food in more than 1 way

Answer:

It can completely show the different flavors that might have influenced the people at the past like their traditional spices and their main ingredients. It also is just a big part of celebrations because usually every single celebration comes with food and drinks.

Need answer ASAP!!!!!

Select the correct answer.
What stage of software development incorporates planning to help make changes in the project plan based on reviews?
OA.project startup
OB. proposal stage
OC. periodic checks
OD. product delivery

Answers

Answer:

Option C

Explanation:

Periodic check are similar to period inspection done by a team comprising of software developers who check the flow and output of the core during the different stages of software development.  

The team also do the auditing to check whether the work products meet the different client requirement and thus revise the project plans.

Hence, option C is correct

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

Which connection type is a wireless method of sending information using radio waves?
O Cable
O Wi-Fi Fiber
Otic cable
O Broadband
please i need help but dont put up a wed site​

Answers

Hoped that helped lol, but yeah, the rest of them need wires

Edit: CAN I HAVE BRAINLIEST.

What is the output? Choose 3 options.

>>>import time
>>>time.localtime()

an indicator of whether or not it is a leap year

the day of the year

the month

the number of seconds after the epoch

the time zone's name

Answers

Answer:

the number of seconds after the epoch

the day of the year

the month

Explanation:

The time() function returns the number of seconds passed since epoch. For Unix system, January 1, 1970, 00:00:00 at UTC is epoch (the point where time begins).The function time. asctime(), present if the time module can be used to return the current date and time.

The output from the information given will be:

the number of seconds after the epochthe day of the yearthe month

It should be noted that input and output are simply the communication between a computer program and its user.

The output refers to the program that's given to the user. In this case, based on the information, the output from the information given will be the number of seconds after the epoch, the day of the year, and the month.

Read related link on:

https://brainly.com/question/23968178

What is the correct HTML for adding a background color?


Question 7 options:


< background>yellow


< body background-color=yellow>


< body bg="yellow">


< body style="background-color:yellow;">

Answers

Answer:

< body background-color=yellow>

Explanation:

This is the correct HTML command that is used for adding a background color of choice.

What does the revolver do?

sends the domain name and requests the IP address

sends the IP address and requests the content of the web page

sends the IP address and requests the domain name

sends the domain name and requests the content of the web page

Answers

Answer:

last one

Explanation:

Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.


kinetoscope

selenium

cotton

celluloid

Answers

The answer: Kinetoscope

Answer:

Celluloid

Explanation:

It is Sis

What is the name of the User-defined function that is mentioned in the code?

Answers

The name of the user defined function is: footballMatch

20 Points and Brainliest!!!!!!
Select the correct answer.
Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?

A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions

Answers

Answer:

I think E, sorry if I'm wrong.

Answer:

I think it might be C

Explanation:

No links it’s just a normal question about iPhones.
If you have someone in your contacts you talk with a lot but like everyday you delete the conversation multiple times will you stop receiving texts from that person even if you text them and it says delivered?

Answers

Answer:

You will still get the messages. You are just deleting the messages from YOUR device not the other persons, in order to stop recieving messages from the person you block them. In order to stop receving notifications, you put them on DND. But, if you talk to them everyday I would assume you would not want to stop receiving messages from them.

You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a database server. The new server has five hard disks, all with equal capacity. Your storage solution should meet the following requirements: System files should be on a volume separate from data files. All volumes should be protected so that the server can continue to run in the event of a failure of one of the disks. The data volume should be optimized for improved disk access times. You will use Windows Disk Management to create and manage the volumes. What should you do

Answers

Answer:

Explanation:

The best solution for this scenario would be to first create a mirrored volume for the system volume using two of the available disks and then a single RAID 5 volume with the remaining 3 disks for the data volume. This setup will allow all of the data to be backed up so that if one of the disks fails the server will continue running accordingly. The RAID 5 volume offers error checking and redundancy for the data, therefore, allowing the data to be accessed quickly and efficiently with far greater security and far less chance of data becoming corrupt.

Rachel selected a part of her audio file in the audio editing software and increased its decibel value. Which audio editing effect has Rachel used here?
A.
fade out
B.
normalize
C.
noise Reduction
D.
amplify
E.
compressor

Answers

lmk when someone has an answer

Answer: D. Amplify

Explanation:

Correct Plato answer

what os the full form of cpu​

Answers

Answer:

central processing unit

Central processing unit

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
port or connected wirelessly?
An attachment
A peripheral
A flash drive
A plug-in

Answers

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

The term for a device (usually external to a computer) that is plugged into a computer's communication  port or connected wirelessly is:

B. A peripheral

According to the given question, we are asked to find the correct term for a device which is plugged to a computer's communication port wirelessly

As a result of this, we can see that a peripheral device is used to connect to a computer wirelessly and some common examples include a keyboard, mouse, joystick, etc.

Therefore, the correct answer is option B

Read more here:

https://brainly.com/question/20488785

PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

This is called an Arbiter!

Explanation:

A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.

HELPPP ME PLEASEEE!!

Answers

It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.

PLEASE HELP ME!!! Please don't answer if you're just going to guess.

In this line from a data file, what do you call the comma?
dog, 23, 15
The comma is _____
-Choices-
a BOL set of characters,
an EOL set of characters,
a delimiter.

Answers

Answer:

a

Explanation:

Answer:

BOL

Explanation:

an option already selected by windows is called____ ( default option/ default selection)​.
this is urgent

Answers

Answer:

default option

Explanation:

what is the most popular monitor​

Answers

Probably a television or a radio I guess

PLEASE HELP! Please dont answer if your going to guess
You have three modes for opening a file. You wish to create a new file and write data to

the file. What letter belongs in this line of code?

myFile = open("another.txt", "_____")
r
w
a
d

Answers

Answer:

r

Explanation:

I literally learned this today when trying to make a python server with an html file:)

Answer:

w

Explanation:

select all the correct answers
which two programming languages are most commonly used to write web based software programs?
1. Python
2. C
3. PHP
3. Ada

Answers

Answer:

PythonPHP

Explanation:

Plato Correct!

The two programming languages most commonly used to create software for websites are Python and PHP.

We have,

Python is known for being easy to understand and read, which makes it popular for building web applications.

It has tools and frameworks that help developers create websites quickly.

PHP is a language specifically designed for web development.

It is used to write code that runs on the server and helps create interactive websites.

Many popular websites and content management systems, like WordPress, are built with PHP.

While the C language can also be used for web development, it is not as commonly used as Python and PHP in this context.

Ada is a programming language mainly used in specialized industries like aerospace and defense.

It is not commonly used for creating websites.

Thus,

The two programming languages most commonly used to create software for websites are Python and PHP.

Learn more about programming languages here:

https://brainly.com/question/23959041

#SPJ4

select the correct answer
which sentence correctly describes a low-level language?
A. programs are written in source code
B. programs are written in hexadecimal or binary code
C. programs are translated to machine code by a complier
D. programs can be easily written and debugged

Answers

A  low-level language are known to be programs that can be easily written and debugged.

What are program written in a low level language?

A low-level programming language is known to be a kind of  programming language that helps one to have some amount or no abstraction from a computer's instruction defined architecture.

They are known as commands or functions in the language map that are said to be structurally almost the same to processor's instructions. They are easy to write and also debug.

Learn more about  low level language from

https://brainly.com/question/23275071

one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..​

Answers

Explanation:

you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.

hope it helps ( brainleist please )

Other Questions
Briefly explain importance of financial institution for the economic development of Tanzania o.5 is < or > or = to 0.7 Chloe has been offered a new job in the womens shoe department at Macys. She has two salary options. She can receive a salary of $600 per week (Option 1), or receive $350 per week plus 8% of her weekly sales (Option 2).If Chloe has $3,200 in weekly sales, she will earn more money withIf x represents Chloes weekly sales, the following equation can be used to determine which option will benefit her the most:If x represents Chloes weekly sales, she will earn more money with Option 1 when Please help me ASAP!! How many mL (milleters) are in 12.9 liters?1. 129 mL2. 1,290 mL3. 12,900 mL4. 129,000 mLplease help ASAP! 4. PART B: Which TWO sections from the text best support theanswer to Part A?Commonlit: Can television be considered literature and taught in English classes?A They were first told orally as fairy tales, folklore, and epicpoems, and were eventually written down." ( Paragraph 1)B "First, TV shows started to look better and showcase moreinteresting camera work" ( Paragraph 5)C"the shows Doherty listed are adult entertainment that dealwith sexual and violent themes." ( Paragraph 8)."Teaching television shows in school can help to bridge thatgap by providing a common cultural ground in the waynovels once did." ( Paragraph 13)E As this discussion of TV surges, enthusiasm for traditional,written literature wanes." ( Paragraph 15)F a study at Emory University found that college students hadincreased connectivity in the parts of the brain associatedwith language while reading a novel." ( Paragraph 16) Which cities are port cities?Choose ALL answers that are correctSelect 3 correct answerAtlantaBostonNew OrleansNew York Describe the foundational truth of the Sermon on the Mount. Three numbers multiplied together give an answer of -12. The sum of two of the numbers is zero. What could the three numbers be? When the president vetoes a bill it is considered a ___. Think back on some of your favorite books and describe one that has influenced you in some way. When did you read the book, what was it about, and how did it impact your life? The graph of a line has a slope of 3 and passes through the point (-4,-5).What is the equation of the line in point-slope form? What was the purpose of the American satellite,Explorer I? PLEASE HELP ME!!30 POINTS!! What is the value of y for the point with an x-value of 5? If you dont really know don't answer please. ThanksWhat is the per capita growth rate of a population of frogs that has a per capita birth rate of 1 frog and a per capita death rate of 2 frogs?a. 1b. 2c. -1d. 0 A1. The diagram above shows a bacterial cell.What does structure A do? sc.6.L.14.6It helps the bacterium obtain food. It helps the bacterial cell move. It helps keep the bacterium from dryingout.0 It helps control all processes of the is Marriage impossible without complete faith and trust. The following question is based on your reading of Dr. Jekyll and Mr. Hyde.What are the stipulations of Jekylls will?a.Dr. Jekylls estate is divided evenly between Hyde and Utterson.c.Dr. Jekylls estate is given to charity.b.Mr. Hyde inherits all of Dr. Jekylls estate.d.Mr. Utterson inherits all of Jekylls estate.Please select the best answer from the choices providedABCD Hi 10 +10 here is me question help