An advantage of keeping data in lists, in Excel, is that if you update a data value in one row of data in a list, other occurrences of the same data item in other rows will be automatically updated as well.

a. True
b. False

Answers

Answer 1
Answer: The answer is True

Related Questions

A location connected to the Internet that maintains one or more pages on the World Wide Web. A) Website structure B) Website C) Website content D) Digital footprint

Answers

Explanation:

website structure. Website structure

What is the relevance of Address Block?​

Answers

Answer: The relevance of Address Block is Yoda.

Explanation: Yoda is the main course for the Address Block.

Which camera required the photographer to project the image on paper

A. I zone combo
B. Polaroid
C. Camera obscura
D. Autochrome

Answers

Answer: A polaroid

Explanation: I have all these cameras

Answer:

I think it would be B)

Explanation:

hope it helped

A CPU's processing power is determined by the combination of the clock speed, the number of cores, and the amount of ________ memory.

Answers

Answer:

A CPU's processing power is determined by the combination of the clock speed, the number of cores, and the amount of _random access _______ memory.

.......... are commonly used as servers in network environments that handle the data sharing needs of other computers on the network​

Answers

Answer:

The other person is correct, the answer is server.

Explanation:

The same sprite in a different position or version is called: A) The glide block B) The stage C) A costume D)The change block

Answers

The answer would be C

What is a detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy and any applicable laws and regulations?

Answers

Answer:

"Compliance audit " seems to be the correct answer.

Explanation:

A compliance or enforcement audit seems to be a systematic analysis of the conformity of such an agency to the reporting requirements and guidelines. In a compliance audit, independent auditors determine the extent and completeness of enforcement plans, security protocols, user authentication, including risk management framework.

somebody tell me 2 differences between string variables and numeric variables ​

Answers

      Numeric variables contain only numbers and are suitable for numeric calculations such as addition and multiplication.

     String variables may contain letters, numbers and other characters. You can't do calculations on string variables -even if they contain only numbers.

My laptop is stuck on the blue screen of death I can’t shut it down what should I do plz help ASAP

Answers

I think you must wait for sometimes and it will restart itself

Answer:

either wait for it to restart on its own or hit control+alt+delete and then restart it.

Explanation:

What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission?

Answers

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run time? 15 10 25 0 5

Answers

Question:

After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run time?  

cin>> input_value;

if (input_value >5)

input_value = input_value+5;

else if (input_value > 2)

input_value= input_value+10;

else

input_value= input_value + 15;

Answer:

input_value= 15

Explanation:

Line 1 of the program gets the value of user_input

i.e user_input = 0

Line 2 checks if user_input is greater than 5, since this is false, the program jumps to line 4

Line 4 checks if user_input is greater than 2, since this is also false, the program jumps to line 6

The instruction on line 6 implies that, if the previous conditions are false, then line 7 be executed.

So:

input_value= input_value + 15;

input_value= 0 + 15

input_value= 15

Hence, input_value is 15

The term __________ is often used in relation to the hardware of computers

Answers

Answer;

Software

Explanation;

The term hardware refers to the physical components of the computer system (as opposed to the software**). ... The primary component of the computer is the motherboard (also called the main circuit board, main logic board, mainboard, or systemboard).

**

Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, and hardware the invariable part.

In Microsoft Excel, you are working with a large worksheet. Your row headings are in column A. Which command(s) should be used to see the row heading information in columns X, Y, and Z?

Answers

Answer:

The answer is "freeze panes command".

Explanation:

To see the row heading information into the columns "X, Y, and Z" we use the freeze panes command, which Pick's the cells from rows and on the right side of the columns, where you scroll.  

This tool allows you to block columns/row headings so, the first column /or top row will stay on the screen and you also scroll down or over to see the rest of the panel.

Select the correct answer. Matt works for an advertising agency. He is often involved in the designing and development processes of websites. What is his profession? A. web developer B. video game developer C. multimedia designer D. graphic designer

Answers

Answer:

MAY BE A

Explanation:

I THINK A IS THE CORRECT ANSWER

which protocol is used by the network?

Answers

Answer:

TCP/IP and UDP/IP and HTTP and FTP

Explanation:

no explanation for this

Answer: TCP/IP,  UDP/IP, HTTP and FTP

Explanation:

Hope this helps^^

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
A. Digital Rights
B. Intellectual Property Rights
C.Fair use rights
D.Artistic rights

Answers

Answer: D. Artistic rights

Explanation:

The artistic rights are those rights that provide an artist with the protection of both artistic works and also allows the profit. The artist can create a piece of artistic work and distribute it for their profit.

If one without any permission creates a copy or uses original artistic work for their own purpose then he is subject to the punishment of copyright infringement due to breaching the copyright of the owner's protection.

The artistic rights will be violated if we copy a drawing from the internet and use it in a report.

If a person copies a drawing from the internet and use it in a report, then the intellectual property right of the artist has been violated.  

Intellectual property rights refer to the legal rights which are given to the authors or the creators of a particular work for their works or inventions.

Examples of intellectual property rights include trade secrets, trademarks, copyrights and patents.

It should be noted that it is unlawful for someone to use or copy the work if another person without taking permission from them. In such case, the Intellectual property right of the person has been violated.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/14391069

Write any 2 differences between implicit variables and explicit variables.​Plz tell :' (

Answers

Explicit is stated very clearly
Implicit is implied
Explicit leaves no room for confusion
Implicit doesn’t have to be directly stated

An idea concerning what will happen in the future. (Crossword)

Answers

Answer:

Expectation

Explanation:

Expectation is  an idea concerning what will happen in the future

Who designs online portals for companies? A. illustrator B. video editor C. storyboard artist D. web designer

Answers

The answer here is, D. Although in reality someone in IT architecture should design a portal
It must be D. Web designer

Have a good day

I need urgent help. which of these network has minimum data loss. a. LAN b. MAN c. WAN ​

Answers

Answer:

The correct option is;

a. LAN

Explanation:

The computer networks listed vary in their transmission medium from the wired transmission medium using the network cable for the Local Area Network (LAN) network, to the wireless transmission network used in the Wide Area Network (WAN), while the Wide Area Networks, (WAN) consists of several LAN networks connected to a larger network through telephone lines.

Of the three network types, the type that has the least amount of data loss is the LAN, due to its structure, being the smallest unit of wired network that can handle direct port to port data flow through physical network switches, which ensures sufficient bandwidth and lesser opportunity for congestion which results in packets of data losses.

A network that typically reaches a few meters, such as up to 10 meters (33 feet), and consists of personal devices such as mobile computers, smartphones, and handheld devices is called:_______

Answers

Answer:

PAN (Personal Area Network)

Explanation:

A network that typically reaches only a few meters (10 m or 33 ft) and contains personal devices like mobile computers, smartphones and handheld devices is called PAN (Personal Area Network).

PAN enables communication between devices that are near a human being (i.e. only for shorter distances).

It can be wireless such as bluetooth earphones used with the smartphone, wireless keyboard and mouse used with laptop or computer, TV and remote control communication.

It can be wired such as wired earphones used with the smartphone, any USB (Universal Serial Bus) device connected to a computer/laptop.

As part of his proofreading process, and to catch any spelling or grammar mistakes, John uses this feature in Word Online to have the program read what is on the document.

Answers

Microsoft word online uses “Proofing Tools”, it can check spelling and grammar, translate the document, and set the proofing language. Word for the web does not use a custom dictionary or include a thesaurus.

John uses a feature in Word Online to have the program read what is on the document. This feature is a proofing tool.

What is a proofing tool?

A workflow management solution made specifically for the requirements of content creators is a proofreading tool or proofing software. Without continually downloading the file, you can utilize it to produce fresh text or visual material, as well as to solicit and reply to feedback.

Proofreading software can hyphenate text, verify spelling and grammar, and look up terms in a thesaurus, depending on the language you're using. In word, go to the File menu, click Options, and then click Proofing.

Therefore, John makes use of a function in Word Online to have the software read the document. It serves as a tool for proofreading.

To learn more about the proofing tool, refer to the link:

https://brainly.com/question/10148620

#SPJ5

Use the drop-down menus to select the type of goal described in each statement. I want to finish all of my social studies homework by dinner. I want to graduate in three years in the top 15% of my class. I want to earn a good grade on my math test tomorrow. I want to qualify for Honors Spanish next year.

Answers

Answer:

I want to finish all of my social studies homework by dinner. - Short term goal.

Short term goals are targets that are to be achieved in the near and immediate future such as in a day or in a week. As the goal listed is to be done on the same day, it is a short term goal.

I want to graduate in three years in the top 15% of my class.  - Normative Goal

Normative goals are the goals people set based on what society looks upon as desirable and a good thing to do. Academic excellence is a normative goal as it is looked upon favorably by society.

I want to earn a good grade on my math test tomorrow. - Intrapersonal goals.

Intrapersonal goals are goals that we set within ourselves to motivate ourselves to do better. The writer here wants to do a good job in the math test which makes it intrapersonal.

I want to qualify for Honors Spanish next year. - Long term goal

A long term goal is one that is to be achieved in the future most likely after a period of a year. Qualifying for an Honors in Spanish in the next year is therefore a long term goal.

Answer:

I want to finish all of my social studies homework by dinner. - Short term goal.

Short term goals are targets that are to be achieved in the near and immediate future such as in a day or in a week. As the goal listed is to be done on the same day, it is a short term goal.

I want to graduate in three years in the top 15% of my class.  - Normative Goal

Normative goals are the goals people set based on what society looks upon as desirable and a good thing to do. Academic excellence is a normative goal as it is looked upon favorably by society.

I want to earn a good grade on my math test tomorrow. - Intrapersonal goals.

Intrapersonal goals are goals that we set within ourselves to motivate ourselves to do better. The writer here wants to do a good job in the math test which makes it intrapersonal.

I want to qualify for Honors Spanish next year. - Long term goal

A long term goal is one that is to be achieved in the future most likely after a period of a year. Qualifying for an Honors in Spanish in the next year is therefore a long term goal.

What do we call anything that has been saved electronically?

Answers

Answer:

An electronic document is any electronic media content (other than computer programs or system files) that is intended to be used in either an electronic form or as printed output.

1) In your own words, explain what a browser is. 2) Why is it important to keep your browser up to date?

Answers

Answer:

A browser is a software that is used to access the internet. A browser lets you visit websites and do activities within them like login, view multimedia, link from one site to another, visit one page from another, print, send and receive emails, among many other activities

The most important reason to keep your browser up-to-date is for your own safety and security, and that of your computer. ... If you're a Firefox user, your browser will remind you to update your add-ons whenever new versions become available.

Malicious hackers and Web sites can exploit security flaws in browsers and infect your computer with harmful programs, trojans, and viruses. Regular updates to your browser fix security problems when they are detected, and make your computer safer from those types of attacks.

"You need to prove ownership of a domain name for an upcoming transfer to a new registrar. Which Domain Name System (DNS) record do you create to prove ownership?"

Answers

Answer:

Canonical Name Record (CNAME)

Explanation:

The Canonical Name Record also known as CNAME Record is a Domain Name System (DNS) record, that allows mapping of a domain name to another domain name. The CNAME record is useful when several services are hosted under one IP address.

The CNAME record allows the specification of a domain name as another name for another domain name. The CNAME record enables an alias name to be mapped to the actual canonical domain name.

A friend has asked you to help him find out if his computer is capable of overclocking. How can you direct him? Select all that apply.

Answers

Explanation:

Any computer is capable of overclocking; however, depending on the CPU manufacture and motherboard vendor, options may be removed or limited causing potential issues with overclocking.

Note, when overclocking computer hardware, this typically involves the increase of voltage or current which will increase heat output inside the system.

The first thing you want to do is make sure there is adequate cooling for the system, that can handle the level of overclock you plan on applying.

The second thing you want to do is check motherboard and CPU overclocking compatibility as some CPUs or some motherboards are arbitrarily locked down.

The third thing you want to do is to ensure your power supply will be able to handle the additional load applied by the overclock.

The fourth thing you want to do is check that the motherboard bios is accessible.  Without access to the bios, any attempts at hardware overclocking may be void.

If all these things are true or valid, then you should be able to easily apply an overclock to your computer system.

Cheers.

Caleb is leading a project involving the use of natural resources, but his group is having problems finding its focus with such a large topic. Caleb organizes several online meetings in which he instructs the group on how to narrow the topic and find direction. He also schedules frequent "check-in" meetings to evaluate their progress. The group gets so excited that they miss the deadline for turning in their project. Which qualities of an effective digital leader are being demonstrated by Caleb? Check all that apply. problem-solving skills good time-management overseeing group tasks effective scheduling excitement about the project

Answers

Answer:

(A)  (C)   (E)

problem-solving skills

overseeing group tasks

excitement about the project

Explanation:

Caleb is leading a project involving the use of natural resources, but his group is having problems finding its focus with such a large topic. Caleb organizes several online meetings in which he instructs the group on how to narrow the topic and find direction. He also schedules frequent "check-in" meetings to evaluate their progress. The group gets so excited that they miss the deadline for turning in their project.

Which qualities of an effective digital leader are being demonstrated by Caleb? Check all that apply.

problem-solving skills

overseeing group tasks

excitement about the project

its 100% CORRECT PEOPLE

What would be the best engine to use for making a 3d beginner game

Answers

Answer:

Unity

Explanation:

People like the unity engine to make basic 3d games.  It's open and free so it lets you use or create your own assets to create 3d models for your game.

Cheers.

1. Which of these is an example of output?
A. typing on a keyboard

B. a smartphone ringing

C. using a mouse

D.a fingerprint sensor


2. Which of these is an example of input?

A. music playing through a smartphone’s speaker

B. a video playing on a laptop

C. swiping right to choose a picture a

D. phone vibrating when there is a new text

Answers

Answer:

Output: B

Input: C

Explanation:

An input is something which is given in order to cause something (Example: You click on a video, and it starts playing)

Output is something that occurs due to the input (The video playing is the output of your input)

The example of output is smartphone ringing.

The example of input is swiping right to choose a picture

The input/output in computing are simply known as the communication between an information processing system.

With inputs devices, signals or data received by the system. With outputs devices, signals or data are sent from them.

These devices are the pieces of hardware used by a human.

Conclusively, Devices for communication between computers, Includes modems and network cards etc.

Learn more from

https://brainly.com/question/17241201

Other Questions
Which compound forms when carbon dioxide diffuses and reacts with seawater?A. Carbonic acidB. Hydroxide ionsC. CarbonateD. Bicarbonate How do you solve this equation by using the quadratic formula 8x^2+3x-45=0 Their are 1,000 kids in one class 99 leave how many are left in one class? If the nominal interest rate is 4.7% and the inflation rate is 3.4%, what is the real interest rate? Which law most likely prompted organizations to create codes of ethics and install ethics hotlines?A) Corporate and Auditing Accountability, Responsibility, and Transparency Act. B) Federal Sentencing Guidelines for Organizations Act. C) Procurement Integrity Act.D) McCarran-Ferguson Act. Overlapping events are events that have at least one outcome in common.TrueFalse Which contributes to the lack of evidence of the Period of HeavyBombardment on Earth? 1. Graph the line y=2x+5 on the graph. Referring the population pyramid of Spain how would the shape of pyramid change in 20 year and what problem would the population race then Please help give brainliest Need answer asap Love that you answer Limes are on sale. That sale price is 8 limes for $2.00. Why could the unit rate be 4 or 0.25? Given the figure below, find the values of x and z the way through the wood, describe the present state of the woods. by drawing inferences from the poem, describe the changes the woods have gone through from the past to present The result of subtracting two numbers is known asthe quotientthe subtrahendO the productthe difference The following relations are written as equations. Which one is NOT a.function?x = 4y=4.x= y +4y = x +4 If x=4 what is the value of 2x+18 What voltage battery would you need to send 2.5A of current through a light bulb of resistance 3.6 ohm Find the value of x in the triangle shown below.12 EBITDA stands for:________A) Earnings before Income Taxes, Discontinued Operations and Other Adjustments B) Earnings before Income Taxes, Discontinued Operations and Other Amortization C) Earnings before Interest, Taxes, Depreciation and Amortization D) Earnings before Interest, Taxes, Discontinued Operations and Amortization According to Indiana law, a driver of a motor vehicle with a child passenger under age _______ is required to properly secure the child in a child restraint system. A researcher wants to contact former prisoners who are now on parole. She wants to study the difficulty of obtaining employment based on whether the subjects had been convicted of felony versus misdemeanor crimes. She needs to:(A) Have made initial contact with potential subjects while they were in prison.(B) Stop because this type of study is not permitted under federal regulations.(C) Do nothing in regards the Subpart C because the research does not meet the criteria for prison research