What file format can excel save files as

Answers

Answer 1

Answer:

.xlxs

but it supports pretty much any spreadsheet format.


Related Questions

Mateo has received a Word document from a customer that contains private information and is secured with a password. However, when Mateo tries to open the
document in his browser, he gets an error message. How might he fix this problem?
a Use a secure website that starts with HTTPS
b. Open the document in the Word app installed on his computer
c Save the document in the cloud
d Ensure there's a lock icon in the browser

Answers

Answer:

open it in a different app

Explanation:

What must you do in Disk Management so that File Explorer can recognize and use a new hard disk?

Answers

Answer: Create a new Volume/Partition

Explanation:

Typically, you want to make sure your drive is formatted and create a new volume span containing your drive space. For your PC to recognize the drive, it must be connected via SATA power and data. If it doesn't detect the drive otherwise, check if it has drivers installed in Device Manager. Go through the partition wizard to format your drive and mount a letter. After that it should be usable upon completion.

When you're formatting in excel 2013 there are basically three levels of formatting, put the
three levels in order of top to bottom levels​

Answers

Answer:

The answer is "themes, styles, and direct formatting".

Explanation:

The selection of regular colors, font color, or type effects is also known as the Themes. There are many built-on Excel categories accessible mostly on page layout menu: an overview of its impact on the workbook could be accessed via a topic. You may find which various fonts will affect the design of your workbook.  The style of a column is indeed a defined collection of layout tools like font and font color, numbers, cell borders, and cell shading. The range of cell styles incorporated, that can be added or modified. It could also alter or double a cell template to build your customizable cell model. To use a customized format it includes the font, color, borders, etc. It is the direct formatting for the document at a certain time and anywhere. It selects the cell and starts changing the font from the font drop list to modify the font of its current document.

At its most basic level, data is stored as binary numbers.
O False
O True

Answers

Answer: Binary numbers

Hope this helps!

(Please mark Brainliest!)

Answer:

True

Explanation:

5. What happens when more than one keyword appears in a string? Consider the string "My mother has a dog but no cat." Explain how to prioritize responses in the reply method. Did this impact any changes you made to the getResponse method?

Answers

Answer:  

Please see below  

Explanation:  

When this is the case, the prioritizing will be done on the basis of whichever keyword came first in the string - it is that particular method that will be called. Hence, if you wish to prioritize the method available for pets over the method available for family, you will need to place it as such in the source code - and this is how the getResponse method will be impacted.

Suppose you own a travel agency in a large city. You have many corporate clients, but growth has slowed somewhat Some long-term employees are getting discouraged, but you feel that there might be a way to make technology work in your favor. Use your imagination and suggest at least one strength, weakness, opportunity, and threat that your business faces.

Answers

Explanation:

For any business or organisation, a strategic planning is a road map leading to a successful future. SWOT planning and analysis makes contribution to that strategic planning processes by identifying the various labor, technical and financial resources. SWOT stands for --

S - Strength

W - Weakness

O - Opportunity

T - Threat

One such strength of our business is we have a great and commendable employee retention.

Weakness is that we have not utilize technology properly to attract the customers. Also we need to update to our software.

An opportunity is that we can explore many technological solutions for the problems that causes growth issues. Also we can be the first in the niche market to use such technologies thus attracting customers.

And a threat is that we adapting to changing internet and as well as technology climate can lead to our business failing.

Assign searchResult with a pointer to any instance of searchChar in personName.
#include
#include
int main(void) {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = NULL;
/* Your solution goes here */
if (searchResult != NULL) {
printf("Character found.\n");
}
else {
printf("Character not found.\n");
}
return 0;
}

Answers

Answer:  

Here it the solution statement:  

searchResult = strchr(personName, searchChar);  

This statement uses strchr function which is used to find the occurrence of a character (searchChar) in a string (personName). The result is assigned to searchResult.

Headerfile cstring is included in order to use this method.

Explanation:  

Here is the complete program

#include<iostream> //to use input output functions  

#include <cstring> //to use strchr function  

using namespace std; //to access objects like cin cout  

int main() { // start of main() function body  

  char personName[100]; //char type array that holds person name  

  char searchChar; //stores character to be searched in personName

  char* searchResult = nullptr; // pointer. This statement is same as searchResult  = NULL    

  cin.getline(personName, 100); //reads the input string i.e. person name  

  cin >> searchChar;    // reads the value of searchChar which is the character to be searched in personName  

  /* Your solution goes here */  

  searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName  

  if (searchResult != nullptr) //if searchResult is not equal to nullptr  

  {cout << "Character found." << endl;} //displays character found

  else //if searchResult is equal to null  

  {cout << "Character not found." << endl;} // displays Character not found  

  return 0;}  

For example the user enters the following string as personName  

Albert Johnson  

and user enters the searchChar as:  

J

Then the strchr() searches the first occurrence of J in AlbertJohnson.  

The above program gives the following output:  

Character found.

how many bits do you need to count up to 30 help please

Answers

Answer:

5

Explanation:

2⁵ = 32, so that fits.

In general, to calculate the number of bits without guessing, you can take the 2 log of the number and then round up:

[tex]\log_2 30 \approx 4.9[/tex]

rounded up gives 5.

In real-world environments, once the domains that are affected by the risks are identified, subsequent next steps would include:______.

Answers

Answer:

Explanation:

In real-world environments, once the domains that are affected by the risks are identified, subsequent next steps would include selecting, implementing, and testing controls to minimize or eliminate those risks.

Write an algorithm to settle the following question:
A bank account starts out with $10,000. Interest is compounded monthly at 6 percent per year (0.5 percent per month). Every month, $500 is withdrawn to meet college expenses. After how many years is the account depleted?

Here is what I got so far. Can you tell if I am on the right track.

Step 1 Start with the table:
Month Balance
0 $10,000.00


Step 2 Repeat steps 2a, 2b, 2c while the balance is greater than $0.00
Step 2a. Add a new row to the table.
Step 2b. In column 1 of the new row, labeled "Month", put one more than the preceding month value.
Step 2c. In column 2 of the new row, labeled "Balance", place the value of this formula
b * (1 + 0.005) - 500
where b is the preceding balance value.


Step 3 Read the last number in the month column (let's call it months). Report that the account will be depleted in (months / 12) years and (months % 12) months.

Answers

Answer:

algorithm

original = float(raw_input("Enter initial balance: "))

interest = float(raw_input("Enter promised return: "))

expenses = float(raw_input("Enter monthly expenses: "))

interest = interest / 100 / 12

month = 0

balance = original

if balance * interest - expenses >= 0:

print "You don't need to worry."

else:

while balance + balance * interest - expenses >= 0: # negation of the if condition

balance = balance + interest * balance # in one month

balance = balance - expenses

month = month + 1

print month, balance

print month / 12, "years and", month % 12, "months"

what connects data center to your device?

Answers

My answer to the question is ISP(Internet Service Provider).

Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safety?
O A database software
OB
presentation software
OC. anti-virus software
OD
graphics software

Answers

Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safety?

O A database software

OB

presentation software

OC. anti-virus software

OD

graphics software

Answer: OC

Screenwriters would be least involved in planning which type of film?

Answers

This question is incomplete; here is the complete question:

Screenwriters would be least involved in planning which type of film?

A. Mystery

B. Historical fiction

C. Documentary

D. Adventure

The answer to this question is C. Documentary

Explanation:

The role of screenwriters is to create different elements in a film including the dialogues between the characters, the actions or events that occur, and even the general story that is told. Due to this, screenwriters play an essential role in fiction based films which include genres such as historical fiction, adventure, science fiction, etc.

However, screenwriters are less involved in genres such as documentaries because the purpose of documentaries is to show reality, this implies there are no fictional characters or one fictional story playwriters should create.

Answer:

b: documentary

Explanation:

edg2021

Which guidelines should be used to make formatting tasks more efficient?

Answers

Answer:

Use pasted text only; this does not keep the original formatting.

Explanation:

______was developed as an interim management protocol with OSI as the ultimate network management protocol.

Answers

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

A(n) _____ is a common output device for hard copy.
a. laser printer
b. optical character reader
c. plasma display
d. compact disc

Answers

The answer is d it is d it is d I think I think, I’m not sure though

How many fixes are available for Adobe Photoshop CS4 (64 Bit)?

Answers

Answer:

There are three (3) fixes in adobe cs4.

Explanation:

Adobe photoshop cs4 is a version of the creative cloud's professional graphic applications used to edit pictures, design interfaces, make graphical illustrations, draw and animate the drawings, etc.

It can be installed in several computer operating system platforms like linux, mac and windows. The adobe photoshop cs4 doesn't support the windows installation and might run into several issues. There are other issues in other supported platforms, but unlike for windows, there are three fixes for these problems.

Image below please help

Answers

Answer:

Open original documentPlace cursorHighlight textCtrl+CSwitch to new documentCtrl+V

Where do today's computers store almost all motherboard configuration data?A) BIOS ROMB) CMOS RAMC) DIMM RAMD) Solid State Disk

Answers

Answer:

In the CMOS RAM

Explanation:

It's the only answer that is available. New computer's store the data in TPM (Trusted Platform Module) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

Today's computers store almost all motherboard configuration data in CMOS RAM (Complementary Metal-Oxide-Semiconductor Random Access Memory). (Option B)

How  is this so?

CMOS RAM is a type of non-volatile memory that retains data even when the computer is powered off. It is typically powered by a small battery on the motherboard.

The configuration data stored in CMOS RAM includes settings such as system date and time, boot order, hardware settings, and other BIOS (Basic Input/Output System) configurations.

Thus the correct answer is Option B - Complementary Metal-Oxide-Semiconductor Random Access Memory

Learn more about motherboard  at:

https://brainly.com/question/12795887

#SPJ6

What are some options available when inserting an address block? Check all that apply. previewing postal code full address label margins matching fields company name paragraph formatting

Answers

Answer:

A. previewing

B. postal code

C. full address

E. matching fields

F. company name

Answer: A, B, C, E, F

Explanation:

Your welcome :)

Students enrolled in a digital classroom participate in discussions and take field trips with classmates. watch instructional videos and turn in assignments online. take notes online but take tests in front of a teacher at school. listen to lectures online but make presentations at school.

Answers

Answer:b

Explanation:gszrxewzgdtxherhzre

Students enrolled in a digital classroom participate in discussions and take field trips with classmates turn in assignments online.

What is assignment?

Assignment is defined as a duty that you have been tasked with by a higher authority. The verb "to assign" is used to assign duties or jobs to other people, while the word "assignment" is essentially the verb's noun form. The opportunity to learn, practice, and demonstrate mastery of the learning objectives is provided to the students. It gives the teacher proof that the students have met their objectives.

Keep an eye on how the students are using the technology. Examine how students are collaborating and what websites or apps they are using by moving around the classroom. Give pupils detailed instructions on the school's policies and practices for using technology in the classroom.

Thus, students enrolled in a digital classroom participate in discussions and take field trips with classmates turn in assignments online.

To learn more about assignment, refer to the link below:

https://brainly.com/question/29585963

#SPJ2

Check
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
changing the size of the page
changing the case of a word
changing the spelling of a word
changing the margins of the page
changing a word to another word

Answers

Answer:

B,C,E :)

Explanation:

Answer:

B, C, E is the correct answer

Explanation:

edge2021

Hope wants to add a third use at the end of her
nitrogen list.
What should Hope do first?
f
What is Hope's next step?

Answers

Answer:

Put her insertion point at the end of the item 2b.

Press the enter key.

Explanation:

Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natural language processing c. Word processing d. Logical operations

Answers

Answer:

The answer is "Option d".

Explanation:

The performing function into the computer is made up of three basic functions, that are: logical, arithmetical, and memory processes, in which the logical process or function is a particular symbol or expression, that links two or more knowledge sentences, and the incorrect choices can be explained  as follows:

In Option a, It is wrong because it can't provide the basic tasks.In Option b, It an algorithm, that's why it is incorrect.In Option c, It is a software, which is used to provide editing on text, that's why it is incorrect.

A task which is considered as a basic task in the context of computer operations is: D. Logical operations.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

In Computer technology, the basic task in the context of computer operations are broadly classified into three (3) categories and these include the following:

Arithmetical operations.Memory processes.Logical operations.

Read more on computer here: brainly.com/question/959479

Which of the following is usually used to connect a monitor to a computer?
O DVI cable
O USB cable
O Ethernet cable
O SATA cable

Answers

Answer:

Ethernet cable

Explanation:

this is because you usually use a ethernet cable at schools , offices and even at home so ya tell me if im wrong

The DVI cable is usually used to connect a monitor to a computer option (A) DVI cable is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

The Digital Display Working Group created the digital video interface known as DVI (Digital Visual Interface) (DDWG).

It is frequently found on computers, LCD monitors, projectors, and other digital display devices.

It supports both digital and analog video signals via a single DVI connection.

Thus, the DVI cable is usually used to connect a monitor to a computer option (A) DVI cable is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2

Which XP practice prescribes that "the code [always be] written by two programmers at one machine"?.

Answers

Answer:

Pair Programming

Explanation:

In Extreme Programming XP, pair programming is a practice in which two programmers work together in a pair at one machine, when writing a code.

One of the two programmers is called the "driver" or developer who writes the code and supervises all the changes made to the program.

The other one is called an "navigator" or observer who provides ideas on how the program should be written, observes or reviews it the program, identify the issues or errors in the code, help in code simplifications.

The two developers implements the program, do coding, review the program and check each other's work. They both are required to be equally skilled in order to implement and test the code. This improves the process of the software development. By working in a pair and reviewing and testing the code together, they develop a better code.

Changing the appearance of the text in your document, is to _________________ it.

Answers

Answer:

Format

Explanation:

I dont really know what the explanation would be but hope this helps.

Which type of input peripheral is most prevalent in a Point of Sale system?A. External USB storage.
B. Card reader.
C. Thermal receipt printer.
D. Projector.

Answers

Answer:

B. Card reader.

Explanation:

The point of sale system is the point where the customer purchased the product and at the same time they given the money so here the time and place should be recorded also the retail transaction is also completed. Here it represents the amount in an invoice prepared by the store and also presents the varies of options for payment through which the customer could choose it

basically it is the place where the products is purchased and the payment is made along with it the taxes are also applicable

So in the given situation, the option B is correct as it derives the input peripheral

The type of input peripheral that is most prevalent in a Point of Sale (POS) system is a: B. Card reader.

What is an input peripheral?

An input peripheral can be defined as an electronic device that is typically designed and developed for sending data to a computer system such as a Point of Sale (POS). Thus, it is used for entering data (information) into a computer system.

The examples of input peripherals.

In Computer technology, some examples of input peripherals include the following:

MouseScannerMicrophoneKeyboardCard reader

A card reader is a type of input peripheral that is used in a Point of Sale (POS) system to receive payments in e-commerce stores or markets, especially by inserting or swiping a credit card in the Point of Sale (POS) system.

Read more on input peripheral here: https://brainly.com/question/5430107

In a C++ program, one and two are double variables and input values are 10.5 and 30.6. After statement cin >> one >> two; executes________ a) one = 10.5, two = 10.5 b) one = 11, two = 31 c) one = 30.6, two = 30.6 d) one = 10.5, two = 30.6

Answers

Answer:

The answer is "Option d"

Explanation:

In the given C++ program code, It is defined, that two double type variable "one and two" is defined, that holds the two double value that is "10.5 and 30.6".

In this code, it uses the "cin" method for input values from the user ends, when we execute this code, it provides the console screen, that inputs the double type value from the user side, and other given choices were wrong because it holds different values.

What is the full form of computer ​

Answers

Answer:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. Some people say that COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research.

Other Questions
Why do you think there are so few cases of private water supply in the world?please give 2-3 line answer Hydrogen reacts with nitrogen monoxide to form dinitrogen monoxide (laughing gas) according to the equation: H2O(g) + 2NO(g) rightarrow O + H2O(g)NO (M) 0.30 0.60 0.60H2 (M) 0.35 0.35 0.70Rate (M/L/s) 3.822 x 103 1.529 x 10-2 3.058 x 10-2 A) Determine the rate law according to the following data. B) Determine the rate constant (in mol-2. L2. s-1).C) Determine the orders with respect to each reactant. After Margaret Thatcher was elected prime minister of Great Britain, women became heads of state in numerouscountries around the world. Women rarely served in national leadership roles before Thatcher's election in1959196919791989. In a honeybee colony the queen stores sperm from male bees, or drones. She then lays thousands of eggs and uses the stored sperm to fertilize them and create offspring. Even when the stored sperm runs out, offspring drones are born in the hive. How is this possible? A) The unfertilized eggs became drones through regeneration. B) The unfertilized eggs became drones through fragmentation. C) The unfertilized eggs became drones through binary fission. D) The unfertilized eggs became drones through parthenogenesis Briefly explain how the colonists justified separating from Great Britain which was governed a King. how many pennies fit in a 22-inch circle? Factor 6x^2+28x+16 Thank you so much for your help! 2x+3y=12 complete the missing value in the solution to the equation Simplify. 2 x (3-1) + 3 4+-6 evaluate dnjdjdjsjsjsnsnnsnssnsnsnsnsnsnsnnsnsn While traveling to Europe, Phelan exchanged 250 US dollars for euros. He spent 150 euros on his trip. After returning to the United States he converts his money back to US dollars. How much of the original 250 US dollars does Phelan now have? Round to the nearest cent. 1 European euro = 1.3687 US dollars If you are facing north, then east is to your the slope of (-2,3) and (4,-5) The greater of 2 consecutive odd integers is 8more than 3 times the lesser. Find the integers. Purple flowers are dominant over the white flowers. The parent generation includes two heterozygous parents. What are the possible phenotypes of these parent offspring Evaluate 8 - 12 divided by 2 + 3 what caused American Indians to relocate in the late 1600's, causeing a decline in missions? What are common chemicals and hazardous materials often found in a kitchen environment? Identify and briefly describe at least five common chemicals or hazardous materials found in most kitchens HELP FAST!!!As a roller coaster car travels down a hill, which type of change in energy allowsit to speed up?a) potential energy changing into heat energyb) potential energy changing into kinetic energyc) kinetic energy changing into heat energyd) kinetic energy changing into potential energy When comparing contracts in common law and civil law systems, it can be said that:________ a. contracts drafted under a civil law system tend to be more specific than those drafted under a civil law system. b. resolving contract disputes tends to be less adversarial in common law systems than in civil law systems. c. civil law systems allow for judges to interpret a contract dispute, but this feature is absent in common law systems. d. contracts drafted under a common law system tend to be longer than those drafted under a civil law system. e. it is more expensive to draw up contracts in a civil law system than in a common law system