Answer:
Conditional Formatting
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data when required or needed.
Conditional formatting is a feature found in a lot of spreadsheet software applications such as Microsoft Excel and it avails end users the ability to apply specific formatting options to cells based on certain defined criteria.
Basically, it is used for highlighting, emphasize, comparing or differentiating between data (information) stored in a spreadsheet document i.e data values that are lesser than or greater than a specificied value.
In this scenario, Theo would like to apply formatting to record data based on values in comparison with values in other fields. Thus, the option he should use is conditional formatting.
Answer:
A
Explanation:
14 points, what is an IP v4 packet??
Answer:
Internet Protocol version 4 (IPv4)
Explanation:
is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.
Answer:
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.
Explanation:
This describes what is charted. It can be placed above or below the chart.
a. Chart area
b. Chart title
C. Bar chart
d.Pie chart
Answer:
a . chart area
This describes what is charted. It can be placed above or below the chart.
Explanation:
The answer choice which describes what is charted and can be placed above or below the chart is:
A. Chart areaAccording to the given question, we are asked to show the answer choice which describes what is charted and can be placed above or below the chart
As a result of this, we can see that a chart area is an area in a graph which shows the quantitative data in a graphical form and it is based on the concept of line chart and can be placed either above or below the chart.
Therefore, the correct answer is option A
Read more here:
https://brainly.com/question/18524966
What classes should I take in high-school for majoring in computer science?
Answer:
Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.
Explanation:
Maria is writing a program to design t-shirts. Which of the following correctly retrieves the values for a t-shirt object's pattern?
newStyle.pattern
newStyle + pattern
newStyle = pattern
newStyle(Pattern):
Answer:
newStyle.pattern
Explanation:
example:
class Style:
def __init__(self, pattern=""):
def design():
newStyle = Style (this allows the user to user newStyle to access all values in the class Style)
now that you have this, you can call the pattern attribute
newStyle.pattern
you can also set this equal to a new value here but for the sake of this question your answer is newStyle.pattern
hope this made sense and helped you out! :)
Hurry I’m timed
What is one purpose of an algorithm?
to reduce error
to show how to use a computer
to eliminate step-by-step instructions
to eliminate smaller tasks
Answer:
an algorithm completes step by step tasks
Explanation:
the last option could work too but step-by-step is more accurate to what an algorithm is.
Jason would like to add visual representations to a table that will be used to easily show comparison data. Which option should he use?
conditional formatting
data bars
expression builder
field criteria
Answer:
a. conditional formatting
Explanation:
Sometimes it is necessary to_ after installing a new software program and before using it the first time.
Answer:
The answer is "restart your computer".
Explanation:
Installing the new software programs with system drivers and plug-ins would be the ready-to-execute software. It refers to a particular installation of a device or hardware to enable its computer functional. Since downloading a new software program and using it first, you often have to restart your computer.
Answer: restart your computer
Explanation: took the quiz
WHAT DOES THE SCRATCH CODE BELOW DO?
Answer:
the first one
Explanation:
What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digital cameras C. A game like Marco Polo on the Internet D. A way of tracking criminals using GPS
Answer:
C. A game like Marco Polo on the Internet
Explanation:
A digital scavenger hunt is a name for a scavenger hunt game originally made for mobile phones and works on any operating system or mobile platforms such as Android or iOS.
The game comprises of different missions in which players are expected to complete one after the other.
Hence, in this case, the correct answer is "A game like Marco Polo on the Internet."
After you create a pie chart, you can move it to its own chart sheet.
True or False.
(Microsoft Excel)
Answer:
I think it's either true or false
Explanation:
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is known as: А social collaboration. B media sharing. С a blog D a tweet.
What is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
PopWhat is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
Pop
Answer:
Remove
Explanation:
A method that deletes an item from a list using the item’s value is "Remove"
The "remove () function in python language indicates the specific element or character to be that needs to be removed.
For example
myList = ["Jane",16,34,52,"Lamar",13,27,20]
myList.remove(34)
myList
OUTPUT : ["Jane",16,52,"Lamar", 13,27,20]
Therefore, by printing the list using the print(), we can observe that the element 34 has been removed from myList.
Hence, the correct answer, in this case, is " Remove."
The____
mode is generally used when delivering a presentation to an audience.
Slide
Auto
Default
Window.
Answer:
Default
Explanation:
The four modes of delivery— memorized, impromptu, manuscript, and extemporaneous—are all valuable in group presentations. However, the most common mode of delivery is extemporaneous.
Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations
Create a function called biggestNum that returns the largest number in an array of integers. The function is passed only one parameter, an array. In main, ask the user the input eight integers. Each integer should be added to an array called nums. Then, call the function and output the largest number in the array.
This is for Python
def biggestNum():
array = []
for i in range(8):
number = int(input('Enter number: '))
array.append(number)
return max(array)
print(biggestNum())
A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he was starts up his laptop and logs into Windows to show his PowerPoint presentation to the customer. During his second appointment, his laptop lost power and shut itself off abruptly. He arrives at his third appointment and plugs in his laptop to recharge it. When he powers on his laptop, he sees a very low resolution version of his normal desktop. He attempts to change the resolution from 800 x 600 to 1920 x 1080 (his normal resolution), but cannot find it in the Display Settings options inside of Windows. Which of the following could be the cause of this error?
A. Corrupted or missing display driver
B. Graphic card failure
C. Corrupted motherboard firmware
D. Corrupted memory module
Answer:
A. Corrupted or missing display driver
Explanation:
The most likely reason for this problem would be a corrupted or missing display driver. The display driver is in charge of grabbing the information from the graphic card and adjusting all the necessary settings so that all of the graphic card's power is able to be utilized. Missing or corrupt drivers can cause errors such as laggy display, wrong resolution/minimum resolution, missing display settings, etc. A graphic card failure on the other hand would show no image on the screen whatsoever when turning on the computer.
what is web technology?
Answer:
Web technology refers to the means by which computers communicate with each other using markup languages and multimedia packages. It gives us a way to interact with hosted information, like websites.
Answer:
Web technology are the various tools and techniques that are utilized in the process of communication between different types of devices over the internet.
HOW DO YOU RUN YOUR SCRATCH PROGRAM?
Answer:
By clicking on the green flag, it starts up the program and if you want to stop it use the stop sign.
To run your scratch program you have to click the green flag, and it will run your program.
Hope that helps.
help plz its do today
Answer:
It is a good idea to consider supply and demand when considering your future career. This will give us an idea of how easy or difficult it is to enter the area and make a living from it.
Explanation:
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.
people make unintentional mistakes
people do not know about cybersecurity protocols
workplaces tend to have too strict cybersecurity protocols
cybersecurity specialists do not really help
people deliberately try to hack into the network
Answer:
people make unintentional mistakes
people do not know about cybersecurity protocols
people deliberately try to hack into the network
Explanation:
Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;
1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.
2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.
3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.
what is the goal of keyboardding technique
Answer:
to get faster at typing
Explanation:
System where energy is used to move people is a what system
Which wizard is a tool provided by Access that is used to scan the table’s structure for duplicate data?
Query Design Wizard
Table Design Wizard
Table Analyzer Wizard
Performance Analyzer Wizard
Answer:
Table Analyzer Wizard
Explanation:
Choose the correct line of code.
To overload exponentiation, use
•def_power__(self, b):
•def_power_(self, a, b):
•def_pow_(self, b):
•def_pow_(self, a, b);
Answer: def_pow_(self,b)
Explanation: got it right on edgen
Using the information below, answer the question to the right. Which function should you use to extract shipping values from the Lookup Table?
Answer: HLookup
Explanation:
HLookup is a function in Microsoft Excel that is part of the Lookup functions, that is, it is used to lookup a value from another table or cell so that it reflects in the desired table.
The “H” in the HLookup stands for Horizontal, that is Horizontal Lookup.
The HLookup function works by looking for a value in the top row of a table or array of values and returning the value in the same column from a row that is specified.
The function is;
=HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])
So, to extract our shipping value from the lookup table, we use the formula;
=HLOOKUP(C2,$B$11:$E$12,2)
Which three phrases describe a wireframe?
Tracy uses a pictorial summary of an entire website in her team meeting. It is a two-dimensional illustration of how each web page on a website will look. Known as a workflow diagram, this explains how pages in a website connect to one another. It is a design tool, and it shows the overall framework of a website. It is a visual representation of how much space each element on a page should take.
Answer:
A wireframe is best described by the phrase;
It is a design tool, and it shows the overall framework of a website
Explanation:
A wireframe is meant to provide a visualization for a page in a form of blue print that defines a websites structure thereby aiding the communication and thought process among those concerned in the website development process, including the programmers, developers and website designers
The wireframe is a depiction of the website, that points out the intended location of content, the layout and how navigation and functions that are to be included on a page in a way that is easily adjustable
The wireframe is therefore a representation of the skeletal framework of the website
Answer:
i only know two and they are design tool and shows the overall frame work of a website
Explanation:
plato
Choose the best function for the purpose.
___ You need a collection to grow. Once you have all the data values, you will pass the collection to a function for
processing.
___ You will store a set of data that will not change.
Answer:
LIST: You need a collection to grow. Once you have all the data values, you will pass the collection to a function for processing.
TUPLE: You will store a set of data that will not change.
Explanation:
EDGE 2021 answers came from the actual reading. Here's the definition Edge provides for a list: "Lists are probably the most commonly used type of collection. A list can grow as you add values to it. You could use a list to quickly save those values and then pass the list to a function for processing."
With all those bolded words, you see list is the answer for that first blank.
Here's the definition Edge provides for tuple and how it proves deque is the WRONG answer: "Lists and deques are mutable—you can change them. "Tuples are immutable (can't change). Tuples are a good choice when you know that, once created, you will not need to change the values in a tuple. The only way to change the values in a tuple is to create a new tuple with the new values. "
Use the drop-down menus to complete the steps for filtering records in a form.
1. Open the (1) tab.
3. In the Sort & Filter group, click (2), and click Filter by Form.
4. Enter or select a value to set the filter.
5. On the Home tab, in the Sort & Filter group, click the (3) button to toggle the filter.
1= create, database tools, file, home
2= advanced, filtering, find, new
3= ascending, descending, apply filter, toggle filter
Answer:
Home, advanced, apply filter
Explanation:
edge 2021
In the completion of the steps for filtering records, one can:
Open the Home tab.click (advanced), and click Filter by Form.click the (apply filter ) button to toggle the filter. What is filtering of records?Filtering is know to be a very vital methods that is used to see only the data that a person want to be shown in Access databases.
Conclusively, By following the steps above, one can achieving the filtering of the records that they desires.
Learn more about filtering records from
https://brainly.com/question/22238933
#SPJ1
What can help you take better animal photographs?
Use a lower ISO.
Focus on the animal's nose.
Be ready to catch the shot.
All of the above
Answer:
All of the above
Explanation:
i think i may be wrong.
Answer:
be ready to take the shot
Explanation:
I made a fish emoji what do you think >{'_'}< should I change anything
Answer: It is beautiful
Explanation:
☁️ Answer ☁️
666/69 I like it. : )