Answer:
See explanation below
Explanation:
Named ranges are a very important tool in Microsoft Excel. It is used in assigning a name to a particular number of cells. It is great for automation and makes formula much easy to understand and use.
One way to create named ranges is theory the Name Box.
To create named ranges in the design marketing sheet we do this;
1) We click on cell B8 and then navigate to the name box at the top right corner of the sheet just above the column A.
•The name box is where the cell address of any cell that is active is displayed.
•You would see that “B8” is displayed on the name box.
• Double click on the name box and type in the appropriate name, in this case - Design_Fee.
• Press enter and you have your named range.
You do the same for the other named ranges.
Note that: Named ranges must contain letters, numbers or underscore.
Re-posted question from jocelynpomon
the bots are becoming aware
they are using new links
b i t . l y / 3 a 8 N t 8 n
b i t . l y / 3 t Z x a C Q
b i t . l y / 3 g V Q K w 3
these are the links that I have seen so far that have viruses
the moderators are starting to oppress us, the bot-battling community
Answer:
Ksksksksksksksksksks alv
8. A boy leaves his house at 9.30 a.m. for his
school. The school is 2 km away and classes start at
10.00 a.m. If he walks at a speed of 3 km/h for the
first kilometre, at what speed should he walk the
second kilometre to reach just in time?
Answer:
i would say 4km
Explanation:
Tommy loves taking care of homing pigeons. He sent a note to his crush who lives 24.0 km away from his house. These birds fly at a rate of 48.2 km/h. How long will the note reach Tommys crush?
Answer:
0.5 hours or 1800 seconds.
Explanation:
Given the following data;
Distance = 24km
Speed = 48.2 km/h
To find the time;
Time = distance/speed
Time = 24/48.2
Time = 0.50 hours
Converting the time to seconds;
1 hour = 3600 seconds
0.5 hour = 1800 seconds
Therefore, it would take 1800 seconds or 0.5 hours for the note to reach Tommy's crush.
Using the speed - distance relationship, it will take the pigeon about 29.88 minutes to reach Tommy's crush.
Given the Parameters :
Speed of pigeon = 48.2 km/hr Distance to be covered = 24 kmRecall the Time taken relation :
Time taken = (Distance ÷ Speed)Time taken = (24 ÷ 48.2) = 0.4979253 hours
Converting to minutes :
0.4979253 × 60 = 29.875 minutes
Therefore, it will take the pigeon about 29.88 minutes to reach her destination.
Learn more : https://brainly.com/question/23313999
spreadsheets: what is a row
Answer:
Rows run horizontally across the worksheet and ranges from 1 to 1048576. A row is identified by the number that is on left side of the row, from where the row originates. Columns. Columns run vertically downward across the worksheet and ranges from A to XFD - 1 to 16384.
Explanation:
what is the decimal value for the jump control?
Answer:
Is there suppose to be a pic?
Explanation:
What is the first step in changing where templates are stored?
Click the At startup, open all files in box.
Double-click on the Advanced option.
Open the Excel Options dialog box.
Enter the folder path to use for templates.
Answer:
Open the Excel Options dialog box
Explanation: edg
using the URL:http://www.armyschools.edu/news/sports.html, Identify the protocol,domain name and path.
Answer:
domain - http (usually unsafe)
protocol - news
path - info / web
Explanation:
how does a computer
open a file
Answer:
you go to your drive and click the file and it opens it
Answer:
You press Type here to Search, if you don't know what it is, it's in the pic. Type File Explorer, and click on the File picture. Open the file
Explanation:
What's the best way to find diamonds in Mine craft?
Answer:
go to creative mode
make a diamond block
and go to survivor mode and mine
give a like
Go to a certain y level in the ground. (I'm not sure the exact level )
Also you can go to an abandoned ship and find a map.
You can always just go into creative mode and give your self a stack and then go back into survival
What is the missing line of code?
>>> __________
>>> random.randrange(10)
5
>>> random.shuffle([1,3,6])
A. import random
B. from random import shuffle
C. from random import randrange
Answer:
B. from random import shuffle
Explanation:
Answer: A.
Explanation: Import random
What type of pointing device is often used by artists, and why is it ideal for artists?
Answer:
A drawing/graphics tablet
Explanation:
It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.
Pseudocode is an outline of your code that goes through the steps in human
language.
1) True
2) False
How do I make a game from scratch, what program should I use, and what tutorial should I follow, I want to make a 2D platformer with some 3D elements in there.
Type the correct answer in the box. Spell all words correctly.
Derek wants to share his digital portfolio with a wider audience. How can he do so?
Derek should publish his digital portfolio on the
, to show it to a wider audience.
Answer:
internet
Explanation:
Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.
What is the internet?An international network is a collection made up of linked networks that use standardized data exchange to provide a range of digital services.
Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.
More about the internet link is given below.
https://brainly.com/question/13308791
#SPJ2
Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate the amount that you will have after a specific number of months. The formula is as follows:
f = p * (1 + i)^t
• f is the future value of the account after the specified time period.
• p is the present value of the account.
• i is the monthly interest rate.
• t is the number of months.
Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.
Sample Run
Enter current bank balance:35.7↵
Enter interest rate:0↵
Enter the amount of time that passes:100↵ 35.7↵
Btw, this does not work, but is presumably close to the answer.
p=float(input("Enter current bank balance:"))
i=float(input("Enter interest rate:"))
t=float(input("Enter the amount of time that passes:"))
print(p *(1+i)^t)
Answer:
The update code is:
p=float(input("Enter current bank balance:"))
i=float(input("Enter interest rate:"))
t=float(input("Enter the amount of time that passes:"))
print(p*(1+i)**t)
Explanation:
Required
Program to compute future value
Up to the third line, your program is correct.
The only correction that needs to be made is as follows:
On the fourth line, change p*(1+i)^t to p*(1+i)**t because Python use ** as raise to power and not ^
please answer this question
Answer:surfing, printer
Explanation:
WHO SAYS BUP ALL THE TIME
Answer:
Mario
Explanation:
If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7; if the value in cell C3 is not 9, the number 4 will be assigned to cell G7.
Answer:
=IF(C3=9,7,4)
Explanation:
If cell G7 contains the function =IF(C3=9,7,4), it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7; if the value in cell C3 is not 9, the number 4 will be assigned to cell G7.
how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network
Answer:
C. by interacting directly with external networks to protect a private network.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.
Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.
A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.
Need answer ASAP. No links
Select the correct answer
Clara writes online articles based on world religions. Her articles have references to dates. Which HTML element will help her display dates (A.D. or B.C.) correctly on a web page?
Posted the answers on the picture since they don’t show up when I write them on here
Answer:
A <b>
Normally AD and BC are written in bold letters.
for example : The terms anno Domini (AD) and before Christ (BC).
Within available option the best option to choose is <b> hope it helped
Answer:
its d <small>
Explanation: A:D and B:C are displayed smaller then normal letters
Q)What software application is the most effective tool to create charts of data? *
a)Word Processing software
b)Spreadsheet software
c)Photo editing software
d)Desktop Publishing software
Answer:
b) spreadsheet software
What are the key components to planning a presentation? Check all that apply.
audience
conclusion
methods
purpose
thesis
title
topic
Answer:
I. audience
II. methods
III. purpose
IV. topic
Explanation:
Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources or samples.
Basically, any speaker who wish to create an effective presentation should endeavor to interact frequently with the audience by holding a conversation.
This ultimately implies that, to create an effective presentation, speakers are saddled with the responsibility of interacting more often with the audience by taking questions, making a joke, getting them to repeat informations loud at intervals etc.
Additionally, speakers are advised to be passionate and show enthusiasm during their presentation because it would enhance their ability to speak confidently and as such leading to an engaging presentation.
The key components to planning a presentation include the following;
I. Audience: these are the group of listeners to whom the speaker is making a presentation to.
II. Methods: the speaker should choose the most effective and efficient method to use in getting the message across to the audience (listeners).
III. Purpose: this is the main idea or reason for which the presentation is being created or done by the speaker.
IV. Topic: this is simply the title of the presentation and it describes the subject matter.
Based on what you've learned about the main elements, themes, and conventions in
Gothic literature and based on the popular Gothic works that you've read and analyzed,
what does the Gothic genre mean to you? If you had to write a Gothic story, what are
the elements and themes you'd want to include and why?
Further your participation in the discussion by reading and responding to what others
post
Hey!
Answer:
Gothic literature is a genre that emerged as one of the eeriest forms of Dark Romanticism in the late 1700s, a literary genre that emerged as a part of the larger Romanticism movement. Dark Romanticism is characterized by expressions of terror, gruesome narratives, supernatural elements, and dark, picturesque scenery. Gothic fiction, sometimes called Gothic horror in the 20th century, is a genre of literature and film that covers horror, death and at times romance. It is said to derive from the English author Horace Walpole's 1764 novel The Castle of Otranto, later subtitled "A Gothic Story".
Gothic elements include the following:
Setting in a castle An atmosphere of mystery and suspense An ancient prophecy is connected with the castle or its inhabitants (either former or present) Omens, portents, visions Supernatural or otherwise inexplicable events High, even overwrought emotion Women in distress etc.This genre is dark, eerie, and mysterious, often containing elements of terror, horror, and the macabre and the bizarre. Common themes and motifs of the Gothic include power, confinement, and isolation.
Hope it helps :)
Have a great day!
Which of the following are exclusively associated with copyright protection? (Select three.)
Right to reproduce small excerpts of a work
Right to apply for a patent
Right for anyone to display a work
Right to lend a work
Right to use a trademark
Right to make derivatives of a work
Right to reproduce a work
Answer:
Right to make derivatives of a work.
Right to reproduce a work.
Right to lend a work.
Explanation:
Just took the quiz on testout.
The rights which are exclusively associated with copyright protection are:
F. Right to make derivatives of a work. G. Right to reproduce a work. D. Right to lend a work.Copyright protection has to do with an intellectual property law which makes it illegal for a person to copy the work of another, without approval, or adequate reference
As a result of this, we can see that the rights which are exclusively associated with copyright protection are the rights to make derivatives of a work, reproduce a work and to lend a work because they are the intellectual property of the author.
Therefore, the correct answers are options F, G, and D
Read more here:
https://brainly.com/question/23385572
What is Inheritence in computer science? Explain in your won words with examples.
Answer:
Inheritance is when one class or script, inherits the properties and methods of another class. They can be re-used which makes it useful. This is why there are parent classes and child classes. Child classes inherit the properties of the parent class. An example is when a "car", "truck" are subclasses of a class called vehicle. Allowing you to make more vehicle using the same parent class.
Hope this makes sense!
Easy way of communication with people is one disadvantage of a network. *
1.True
2.False
Answer:
false
because we are able to connect with people easily..
without have to wait for long time in the case of letters..
Answer:
False.
Explanation:
WLAN is a network connected by cables. *
true or false
Answer:
are you girl
shslanshaknskaozbdksos
Answer:
true
Explanation:
it is wireless LAN network connected by cables
1. Pasar los siguientes ejercicios a diagrama de bloque
Ejercicios:
a) Un editor puede corregir 184 páginas de un libro en 8 horas de trabajo. ¿Cuántas páginas puede corregir los sábados que trabaja únicamente 5 horas?
b) Si 14 lápices cuestan $42 ¿Cuánto cuesta un lápiz y cuánto me costará comprar 25 lápices?
2. Pasar los Diagrama de Bloques obtenidos a Pseudocodigos
Answer:
A) Los sábados el editor puede corregir 115 páginas.
B) Cada lápiz cuesta $3 y 25 lápices cuestan $75.
Explanation:
A) Dado que un editor puede corregir 184 páginas de un libro en 8 horas de trabajo, para determinar cuántas páginas puede corregir los sábados que trabaja únicamente 5 horas se debe realizar el siguiente cálculo:
184 / 8 x 5 = X
23 x 5 = X
115 = X
Por lo tanto, los sábados el editor puede corregir 115 páginas.
B) Dado que 14 lápices cuestan $42, para saber cuánto cuesta un lápiz y cuánto me costará comprar 25 lápices se deben realizar los siguientes cálculos:
42 / 14 = X
3 = X
3 x 25 = 75
Por lo tanto, cada lápiz cuesta $3 y 25 lápices cuestan $75.
A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this role. Name three other necessary skills for a system analyst
Answer: See explanation
Explanation:
Systems analysts are the people who analyse how a particular software, or IT system will be able to fit and meet the needs of their company or client. They are charged with the responsibility of writing requirements for new systems.
Some if the skills required for a system analyst include:
• Flexibility
• Strong analytical skills
• Adaptability
• Initiative
• Interpersonal skills.
• Attention to detail.
• Teamwork skills.
• Written and verbal communication skills.
Select the correct answer.
Lionel writes for his personal blog. He would like to know how many users visit his blog. Which tool will help him to know the number of users visiting his blog?
A.
Microsoft Word
B.
Antiword
C.
StatsCounter
D.
pdftohtml
E.
Cron
Answer:
Antiword is your answer
Explanation: