Hello, I am smart without showing off and I will help you with your homework and tell you the correct answers (◠ᴥ◕ʋ).
Answer:
HII CSN U ANSWER MY MATH QUESTION
Theo would like to apply formatting to record data based on values in comparison with values in other fields. Which option should he use?
Conditional Formatting
Access Rules
Expression Builder
Field Validation Rules
Answer:
Conditional Formatting
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data when required or needed.
Conditional formatting is a feature found in a lot of spreadsheet software applications such as Microsoft Excel and it avails end users the ability to apply specific formatting options to cells based on certain defined criteria.
Basically, it is used for highlighting, emphasize, comparing or differentiating between data (information) stored in a spreadsheet document i.e data values that are lesser than or greater than a specificied value.
In this scenario, Theo would like to apply formatting to record data based on values in comparison with values in other fields. Thus, the option he should use is conditional formatting.
Answer:
A
Explanation:
WHAT DOES THE SCRATCH CODE BELOW DO?
Write a program in Python which prints your name, surname and class.
Answer:
print(name + "\n" + surname + "\n" + class)
Explanation:
not enough information is given but this will print those three variables with a newline between each.
Design a program that ask the user to enter a series of positive numbers. The user should enter a negative number to the series. After all the positive numbers have been entered the program should display their sum
Answer:
total = 0
while True:
number = float(input("Enter a number: "))
if number < 0:
break
total += number
print("The total of the positive numbers entered is", total)
Explanation:
*The code is in Python.
Initialize the total as 0
Create a while loop. Inside the loop:
Ask the user to enter a number. Check the number. If it is smaller than 0 (This means it is a negative number), stop the loop using break. Add the number to the total (cumulative sum). (This way your program keeps summing numbers until you enter a negative number)
When the loop is done, print the total
Question
You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a frame. What ribbon tab would you click to find the tool to add the rectangle?
Animations
Insert
Design
Home
Answer: Insert :-) !
Explanation:
HELP mE PLZ
Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.
Remove unwanted files.
Reboot the computer.
Back up her data.
Scan for viruses.
Delete the browsing history.
Answer:
scan for viruses
remove unwanted files
back up her data
How would I tell Tracy to move forward 100 pixels?
Answer:
Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
Answer:Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
why is page formatting important??
Answer:
Perhaps one of the most important things you can learn in Microsoft Word is how to format your page with elements such as margins and page breaks. Formatting your pages makes them look more attractive and makes them easier to read.
Answer:
Formatting is important for two reasons: It makes your essay look like an essay (rather than a letter or a note to a friend). It helps to make your essay more readable.
Explanation:
It is the ornamentation of textiles and other material with needle work
for personal use and decoration.
a. Embroidery
b. Handicraft
c. Recycling
d. Sewing
2 When you add text with the Text Tool, __________. the text is added to the current layer a new floating selection layer is created the text is added to every layer a new layer is created
Answer:
A new floating selection layer is created
Explanation:
In a graphic design software for example like CorelDraw, if a text tool is used to add text, a new floating selection layer is created in which, the text is inserted.
Hello anyone to speak?
Answer:
hey hope you have a good day or night :)
Write the function greeting that takes a string as input. That string will be formatted as Name Age Hobby, without any punctuation. greeting should split their response into list elements, then use index values to greet them by name and respond that you enjoy that hobby as well, with the format: ‘Hello, ! I also enjoy !' Make sure your output matches this format! For example, greeting('Jose 17 hockey') # => 'Hello, Jose! I also enjoy hockey!' greeting('Cindy 14 robotics') # => 'Hello, Cindy! I also enjoy robotics!'
Answer:
The function in Python is as follows:
def greetings(details):
details = details.split(' ')
print('Hello, '+details[0]+'!, I also enjoy '+details[2])
Explanation:
This defines the function
def greetings(details):
This splits the input string by space
details = details.split(' ')
This prints the required output
print('Hello, '+details[0]+'!, I also enjoy '+details[2])
After splitting, the string at index 0 represents the name while the string at index 2 represents the hobby
Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations
Answer:
D i think
Explanation:
Which of the following is referred to as "keeping up with the Joneses"?
Answer:
This phrase basically means keeping up with the trend. You can get an Android for cheaper but you get the high quality iPhone because it appears rich and overall, better. But it's used a lot to say, "you're wasting money"
Use the drop-down tool to select the correct answer.
Government agencies work to catch people who engage in software piracy, and can also help to stop them by filing lawsuits.
Answer:
Software producers
Explanation:
Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of
I. Trademarks.
II. Patents.
III. Copyright.
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
Hence, government agencies work to catch people who engage in software piracy, and software producers can also help to stop them by filing lawsuits. Software producers or developers are saddled with the responsibility of filing lawsuits against pirates or intellectual property theft who engages in the illegal use of patents or licensed software applications.
who is father of computer?
Choose the correct term to complete the sentence.
______ uses objects that represent classes to manage, manipulate, and store data.
•Object-defined programming
•Object-oriented programming
•Oriented programming
Answer:
Object-oriented programming
Explanation:
When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).
Answer: Object-oriented programming
Explanation: got it right on edgen
What are your thoughts on the last nintendo direct
Answer:
I don't know? How do you feel about them?
Explanation:
Answer:
Wait, what's that-
Explanation:
Where can
а a
radio be found and how
they used
Answer:
I don't know if I'm the only one who doesn't understand I'm sorry.
Explanation:
Who else hates brainly cause they took over 400 points out of my other account and left me at -324 points so copy and paste this every where
Answer:
That's terrible :(
Explanation:
Which import option is not supported in Access 2016?
from Access
from Excel
from PDF
from Text file
Answer: from PDF(C)
Explanation:
Took it on edg
Answer:
C
Explanation:
Codehs 9.4.5 Phone Book. Anyone have the answers?
Answer:
The program is as follows:
phonebook = {}
while True:
entry_name = input("Name: ")
if entry_name == " ":
break
elif entry_name in phonebook:
print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))
else:
entry_number = input("Number: ")
phonebook[entry_name] = entry_number
print(phonebook)
Explanation:
This creates an empty dictionary for phonebook
phonebook = {}
This loop is repeated until it is exited by the user
while True:
Prompt for name
entry_name = input("Name: ")
If name is empty
if entry_name == " ":
Exit the loop
break
Else if name exists in the phonebook
elif entry_name in phonebook:
Notify the user with the name and the phone number
print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))
If otherwise,
else:
Prompt the user for phone number
entry_number = input("Number: ")
Save in the dictionary
phonebook[entry_name] = entry_number
Print the phonebook
print(phonebook)
Answer:
my_dictionary = {}
while True:
name = str(input("Enter a name: "))
if name == "":
break
elif name in my_dictionary:
print("Phone Number: " + my_dictionary[name])
else:
phone_number = input("Enter this person's number: ")
my_dictionary[name] = phone_number
print(my_dictionary)
Explanation: code hs
Price of ETH coin right now?
Don't answer if u don't know.
Answer:
58,715.40
Explanation:
You've just received an e-mail message that indicates a new serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of the three files in \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should your first action based on this message be?a. Perform a complete system backup.b. Verify the information on well-known malicious code threat management web sitesc. Distribute the message to everyone in your address book.d. Reboot the system.e. Delete the indicated files if present
Answer:
B.) Verify the information on well-known malicious code threat management web sites
Explanation:
Of course, you should verify the message with reliable sources before taking any actions that could impact your computer. Even if the message seemed legit, it telling you to fiddle with the Windows system folder is a red flag.
Verify the information on well-known malicious code threat management web sites. The correct option is b.
What is malicious code threat?The threat posed by malicious code to application security cannot be effectively addressed by traditional antivirus software on its own.
Attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content are all examples of the broad category of system security words known as harmful code.
Malware attacks are frequent cyberattacks in which the victim's system is compromised by malware, which is typically malicious software.
Ransomware, malware, command and control, and other specialised sorts of attacks are all included in malicious software, sometimes known as viruses.
The notification advises you to remove these three files from your system as a countermeasure to stop the threat from spreading further, but you should first double-check the information on reputable harmful code threat management websites.
Thus, the correct option is b.
For more details regarding malicious attacks, visit:
https://brainly.com/question/13137381
#SPJ5
How does HTTP rely on other layers of the internet?
DNS -
TCP-
IP-
Physical Internet -
Please help !!!
Answer:
All of your communications are being sent over the Internet so these requests are being sent inside TCP/IP packets and over the physical wires of the Internet. ... It uniquely identifies the location of each computer or device connected to the Internet.
Which symbol should you use for entering a formula in a cell?
А.+
B.=
C. $
D.%
E#
Answer:
ITS + AND =
Explanation:
Answer:
Explanation: The equals operator is used in the Microsoft excel for the indication of formula in a cell .
Explanation:
Justify the following statement: " Diversity should exist in the workplace."
Answer:
Explanation:
Diversity should exist in the workplace because if everyone working together had the exact same views, there wouldn't be any growth and learning of new ways to expand ideas.Answer:
Diversity should exist in the workplace because if everyone working together had the exact same views, there wouldn't be any growth and learning of new ways to expand ideas.
Explanation:
e d g e
In a single paragraph, write about the functions of HTML tags.
Answer:
The main function of HTML Tag is to define the set of rules for browsers to display the content of web page in a certain way. The content could be anything Text, Image and even video (thanks to HTML5). It tells your browser what to display on the Web Page and how to display it. Overview. People use tags to aid classification, mark ownership, note boundaries, and indicate online identity. Tags may take the form of words, images, or other identifying marks. An analogous example of tags in the physical world is museum object tagging.
Explanation:
Hope this helps :)
Answer:
The main function of HTML Tag is to define the set of rules for browsers to display the content of web page in a certain way. The content could be anything Text, Image and even video (thanks to HTML5). It tells your browser what to display on the Web Page and how to display it. Overview. People use tags to aid classification, mark ownership, note boundaries, and indicate online identity. Tags may take the form of words, images, or other identifying marks. An analogous example of tags in the physical world is museum object tagging.
Explanation:
Explain how malware can be used in cyber warfare or a cyber terrorism attack on a country?
Answer:
Malware can be utilized to damage infrastructure that utilizes computers. It can manipulate what a computer is doing. In this way, a piece of malware could be designed to target government operations, such as government office computers, and then steal and wipe data from a computer. In other ways, a piece of malware could target the water supply control computers, and removing safety features, or target the power grid. This is why infrastructure necessary for day to day life and survival should be separate from the Internet, which can remove a major vulnerability.