you are creating a slideshow for a client presentation. there is a pivot table in a spreadsheet that you want to include. in order for the pivot table to update whenever the spreadsheet source file changes, how should you incorporate it into your slideshow?

Answers

Answer 1

The best way to incorporate a pivot table into a slideshow is to link it to the spreadsheet source file. That way, whenever the source file changes, the pivot table will update automatically.

What is spreadsheet?
A spreadsheet is indeed a computer programme used for organising, organising, analysing, and storing tabular data. Spreadsheets were created as electronic alternatives to paper accounting worksheets. Data typed into table cells serves as the program's input. Each cell may have text, numeric information, or the output of algorithms that instantly calculate and show a value dependent on the content of other cells. One of these electronic documents is referred to by the word "spreadsheet." Users of spreadsheets can change any stored value or watch how it affects the results of calculations. Because various scenarios may be quickly studied without manual recalculation, the spreadsheet is advantageous for "what-if" analysis. Multiple sheets can interact with one another in modern spreadsheet software, and data can be shown graphically or as text and numbers.

To learn more about spreadsheet
https://brainly.com/question/26919847
#SPJ4

Answer 2

Answer: D ( to pull specific information from PivotTable to answer the question)

Explanation:

Edg 2022

You Are Creating A Slideshow For A Client Presentation. There Is A Pivot Table In A Spreadsheet That

Related Questions

is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated. business rule constraint data integrity business integrity data structure

Answers

Data integrity is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated.

What is data?

Data simply refers to a representation of factual instructions (information) in a formalized and structured manner, especially as a series of binary digits (bits) or strings that are used on computer systems in a company.

What is the C-I-A security triad?

The C-I-A security triad is an abbreviation for confidentiality, integrity, and availability. In Computer technology, the C-I-A security triad can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in a business firm, in order to effectively and efficiently protect and make their data available to all authorized end users.

In this context, we can reasonably infer and logically deduce that data integrity is an essential part of any relational data model.

Read more on C-I-A security triad here: brainly.com/question/13384270

#SPJ1

Complete Question:

________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated.

(A) Business integrity

(B) Data structure

(C) Business rule constraint

(D) Data integrity

What does the principle of least privilege state?

A. A user or program should have unrestricted access to the entire system.
B. A user or program should not have any privileges at all.
C. A user or program should be granted remote access to all programs.
D. A user or program should have the least privileges that are necessary for them to work.

Answers

Answer:

D

Explanation:

A user or program should have the least privileges that are necessary for them to work.

give the tightest asymptotic bounds you can for the following recurrences and provide a short explanation for your solution. you may assume that t(1)

Answers

We indicate that we have an asymptotically tight bound on the running time by using the notation big-. "Asymptotically" means that only big values of n n n are relevant.

"Tight bound" refers to the fact that we have tightly bound the running time to a constant factor above and below. If there is no lesser number that is an upper bound, the upper bound is said to be a tight upper bound, a least upper bound, or a supremum. If no higher number is a lower bound, a lower bound is often referred to as a tight lower bound, the maximum lower bound, or an infimum. An asymptotic bound on how well (how quickly, how efficiently, etc.) an algorithm can solve a problem in relation to the size of the input.

Learn more about Asymptotically here-

https://brainly.com/question/17767511

#SPJ4

What year was the first edition of Photoshop released?

Answers

Answer:

1990

Explanation:

Photoshop 1.0 was officially released in February 1990 and was the first time the software was made available to the public as a standalone product (rather than bundled with a Barneyscan scanner). It was also the first time the software was released commercially with the brand name Adobe Photoshop.

Answer:

February 1990

Explanation:

Photoshop 1.0 was officially released in February 1990 and was the first time the software was made available to the public as a standalone product (rather than bundled with a Barneyscan scanner). It was also the first time the software was released commercially with the brand name Adobe Photoshop.

Gerard's computer is having issues during the startup process. When troubleshooting, what part of the computer could be causing the issues with the basic input output system (BIOS)?

Answers

Answer:

I think it is (ROM) That's what I put

Explanation

Taking the test now, if it is wrong it could be SDD then.

What type of programming structure is a named component that stores a single value and can be updated anytime.

Answers

Answer:

A variable

Explanation:

A variable is a named "object" that can store a single value and can be updated. Hence the name "variable"

a hacker has discovered a system vulnerability and proceeds to exploit it to gain access to the system. the vulnerability is not yet known to the developer so no fix is available. what type of attack is this?

Answers

Vulnerability - This is an example of a zero-day attack.

What is vulnerability?
Vulnerabilities
are weaknesses in a computer system that reduce its overall security. Vulnerabilities might be flaws in the hardware itself or the software that uses it. A malicious actors, such as an attacker, can use vulnerabilities to breach privilege restrictions and carry out illegal actions on a computer system. An attacker needs at least one tool or technique that really can connect to a system flaw in order to exploit a vulnerability. In this context, the attack surface is another name for vulnerabilities. Discover all assets, prioritise assets, assess or do a full vulnerability scan, report on results, fix vulnerabilities, confirm remediation, and repeat are all frequent steps in the cyclical practise of vulnerability management.

To learn more about vulnerability
https://brainly.com/question/25633298
#SPJ4

you are the supervisor of a twenty-member team. your goal is to increase collaboration with the use of technology. to accomplish this goal, you would most likely use which type of program to create and edit content?

Answers

The leader of a group of twenty people. Creating new or better products, service, or procedures.

What distinguishes a programme from a programme?

The correct spelling of "programme" in American English. The much more typical spelling for the word "programme" in Australian & Canadian English. Although programme was frequently used in computing contexts, programme is the correct term for British English.

How do you define "programme"?

A computer executes a collection of instructions program is a sequence to carry out a certain task. [Computing] The larger a computer algorithm is, the more likely it is to make errors.

To know more about Program visit:

https://brainly.com/question/11023419

#SPJ4

suppose that a tcp sender is sending segments with 200 bytes of payload. it sends 5 segments with sequence number 100, 300, 500, 700, and 900. suppose the segment with sequence number 500 is lost. what are the ack values that the receiver returns to the sender after each of the 4 received segments are received?

Answers

We can record analytics data from our Python code using Segment's Python library. Segment routes our data to any analytics provider we enable on our destinations page after the requests reach its servers.

We can access this library's open-source code on GitHub. Python also has the ability to return a portion of a list starting at the end. To accomplish this, simply place a negative sign (-) before the necessary numbers in the slice command. A source is anything that can feed data into a segment, such as a website, server library, mobile SDK, or cloud application. Data segmentation is the process of taking the data you already have and breaking it up into groups of related data based on the selected parameters so you can use it more effectively in operations and marketing.

Learn more about python here-

https://brainly.com/question/13437928

#SPJ4

Write a program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total.

Hint: Change all of the inputs into feet first - remember there are 3 feet in each yard. Now that the wood is in feet, find the yards and feet similarly to the last practice, using regular and modular division.

Answers

The program will be:

yard1 = int(input("Enter the Yards: "))

feet1 = int(input("Enter the Feet: "))

yard2 = int(input("Enter the Yards: "))

feet2 = int(input("Enter the Feet: "))

#For the first step you need to convert the yard to feet.

wood1 = (yard1 * 3) + feet1

print(wood1)

wood2 = (yard2 * 3) + feet2

print(wood2)

yard3 = ((wood1+wood2) // 3) #total feet converted to Yards

feet3 = ((wood1+wood2) % 3)#This is the remainder of feet.

print("Yards: " + str(yard3) + " Feet: " + str(feet3))

What is a program?

A computer program is a set of instructions written using a programming language and executable by a computer. Software contains computer program as well as documentation and other intangible components.

To learn more about program

https://brainly.com/question/23275071

#SPJ13

how can data be organized when electronic note-taking tools are used? check all that apply. exclude all publication information. highlight found material you want to record. copy and paste it into a document in the appropriate folder. record all major ideas from various sources in one folder. set up a folder on your hard drive with subfolders for major sections.

Answers

The way that data can be organized when electronic note-taking tools are used is option C and D:

Record all major ideas from various sources in one folderSet up a folder on your hard drive with subfolders for major sections.

What is data organization about?

The process of arranging raw data in a form that makes sense is known as data organization. Classification, frequency distribution charts, image and graphical representations, among other methods, are used to organize data. Data organization enables us to arrange the information so that it is simple to read and use.

The "Big 3" note-taking and file-everything tools are Evernote, Microsoft OneNote, and Go ogle Keep. Each one has unique advantages and disadvantages. However, all three can assist you in quickly capturing and organizing your thoughts, notes, site information, and more.

Therefore, Organizations can more efficiently identify the root of issues thanks to data. Organizations can use data to visualize connections between events occurring in various places, departments, and systems.

Learn more about electronic note-taking tools from

https://brainly.com/question/18546670
#SPJ1

programming challenge description: when data is imported into any software environment, there is a risk of introducing bad or invalid data. an essential step before doing any data analysis is to first validate the data to be used. this can save time and avoid problems later. imagine a data science team investigating forest fires in the tropical forests of the amazon. they have two datasets in csv format: the first dataset represents the gathered statistics of forest fires by the month and year for different states in brazil the second dataset has a summary of the total number of fires per year across the entire country write a program to validate the first dataset using the summary data from the second. input: two datasets in csv format separated by one empty line. the first dataset has the following columns: year - the year when forest fires happened state - brazilian state month - the month when forest fires happened number - the number of reported fires in that year, state, and month the second dataset has the following columns: year - the year when forest fires happened number - the total number of reported fires in that year

Answers

In this one-day competition, teams of up to two students must work together to solve a number of tasks throughout the course of the two-hour tournament.

For each task that is correctly solved, points will be given to each team. Writing computer program source code that can solve given issues is the goal of competitive programming. The great majority of the issues that arise in programming competitions are logical or mathematical in character. The main difficulties include distraction, debugging, and a variety of capabilities. First of all, everyone who teaches programming will tell you that the most commonly used statement in the classroom is "my program is not working." Yes, our work becomes more effective the more code problems you solve.

Learn more about program here-

https://brainly.com/question/3224396

#SPJ4

a(n) document contains the text for a web page interspersed with coding for how to display text and any additional visual or auditory elements.

Answers

A source document contains the text for a web page interperse with coding for how to display text and other additional visual or auditory elements.  Hence, the correct fill-in-the-blank option to this question is "Source".

The source document contains the text for a web page and also has coding for displaying that text and other visual or auditory elements of a web page in the web browser. The source document of a web page contains the coding text mostly in HTML form that is interpreted by a web browser. And, the web browser displays what has been written in that source document to the client. Source documents not only contain HTML code but also contain other scripting language code such as PHP,  Javascript, Bootstrap etc.

The correction question is given below:

"a(n) _____________ document contains the text for a web page interspersed with coding for how to display text and any additional visual or auditory elements."

You can learn more about source document at

https://brainly.com/question/4593389

#SPJ4

Which of these statements about Vecteezy is accurate?

Question 12 options:

A) It is used for raster-based images.


B) Its purpose is rasterization.


C) It is a cropping tool.


D) It is used to create and edit vector-based images.

Answers

Answer:

A

Explanation:

a company sends out a broadcast email to its entire email list informing the list about black friday deals. at 6:00 pm on black friday, the company sends out an email only to members of its email list that (1) clicked on the previous email and (2) did not make a purchase. this second email is an example of

Answers

This second email is an example of a triggered email

A triggered email is one that is sent to website visitors as a reminder or to alert them to impending events. Automated triggered emails are typically delivered to website users who fit into a certain group.

What exactly are triggered emails?

Automated emails called "triggered emails" are sent out when a subscriber takes a specific action, exhibits a certain pattern of behavior, or when a specific update occurs in the product catalog.

A trigger email is an automatic message that marketers send to consumers to inform them and demonstrate that the business they have subscribed to is a reputable one. A trigger email is a prompt sent in response to a subscriber's specific activity or pattern of behavior.

To learn more about triggered emails refer to:

https://brainly.com/question/15072408

#SPJ4

Select ALL the benefits of using RGB color mode:

Easy to manipulate color on a computer screen


Offset printing processors


Offers the widest range of colors


Can easily be converted to CMYK

Answers

Answer:

Explanation:

1) Easy to manipulate color on a computer screen

2) Offers the widest range of colors

3) Can easily be converted to CMYK

please write an assembly program to do following operations. you need to submit a *.asm file for this question. (30 points): (1) put the bit pattern 0xa5a5 in register $7. (2) $8 gets the bits in $7 shifted left logical by 2 positions (3) reflect each bit of the pattern in $8 and put the result into register $9 (4) move the bit pattern in register $9 to register $10

Answers

By converting combinations of mnemonics and syntax for operations and addressing modes into their numerical representations, an assembler program generates object code. This representation typically consists of data, various control bits, and an operation code (or "opcode").

A low-level programming language called assembly language is made for a particular kind of machine. It can be created either by starting from scratch or by compiling source code from a high-level programming language (like C or C++). An assembler can transform assembly code into machine code. A line of text that converts to a single machine instruction is called an assembly language statement. Instead of using binary instructions, assembly language allows names to be used for memory locations, registers, actions, etc.

Learn more about assembly language here-

https://brainly.com/question/14728681

#SPJ4

a virtual team is a team consisting of people from different locations that communicate on projects through technology such as e-mail, videoconferencing, faxing, and other forms of digital communication. true or false

Answers

Yes the statement is true. A virtual team is a team consisting of people from different locations that communicate on projects through technology such as e-mail, videoconferencing, faxing, and other forms of digital communication.

A virtual team, sometimes referred to as a geographically dispersed team or a remote team, is a collection of individuals who communicate with one another online. A virtual team typically consists of individuals from various locations. The term "virtual team" refers to a group of people who are physically separated from one another but are joined by a common objective, as opposed to "traditional teams," also known as conventional, co-located, or collocated teams, which are made up of people who work in close proximity. Affordable expertise (especially in HR, finance, and marketing), flexible support, and access to a wide range of services are all advantages. The disadvantages of virtual teams can include communication problems, poor management and leadership, and ineffective team members.

Learn more about virtual team here-

https://brainly.com/question/28498553

#SPJ4

if compilation of a computer program produces error messages, then the program is not correct. the program is not correct. compilation of the computer program produces error messages. which one of the following statements is true for this argument?

Answers

The compilation of a computer program produces error messages, then the program is still correct.

A software bug is a mistake, flaw, or fault in the conception, creation, or use of computer software that results in inaccurate or unexpected outcomes or leads it to act in ways that weren't intended. Runtime errors, logic mistakes, and syntax errors are the three sorts of problems that might arise when writing programs. Computer programs may contain a variety of flaws, or bugs, which might prevent them from operating as intended. Runtime, syntactic, and semantic errors are three of the main error categories. In general, a bug is an unforeseen flaw or imperfection that may be permanent, whereas an error typically happens when there is an incorrect input and is transient in nature.

Learn more about Software here-

https://brainly.com/question/985406

#SPJ4

What is this line called that appears and disappears in the search box

WILL MARK BRAINLIEST

Answers

Answer:

that is called the cursor.

Explanation:

A cursor is the position indicator on a computer display screen where a user can enter text.

Hope this helped!

which event takes place in the most basic client/server configuration? group of answer choices a. the results of a query are sent to the server. b. the server sends a request to the client over a network. c. the client receives and processes a query. d. the user creates a query by running client software.

Answers

The  event that takes place in the most basic client/server configuration is option d: the user creates a query by running client software.

What does client-server mean?

Clients are computer hardware or server software that make some form of requests for resources and services that a server makes available. Clients are often referred to as service requesters. The three types of client computing are thick, thin, and hybrid.

Therefore, In a client/server arrangement, you may manage which servers your clients utilize and target particular servers for particular data or tasks by grouping servers into logical member groups.

Learn more about client/server configuration from

https://brainly.com/question/3520803
#SPJ1

rozalia installs the windows deployment services (wds) role on serverx. she intends to use serverx to enable rapid server deployment across her organization’s network. she opens the windows deployment services tool and notices a yellow warning icon on the serverx server object in the navigation pane.

Answers

After opening the Windows Deployment Services tool, Rozalia notices a yellow warning icon on the SERVERX server object in the navigation pane and this indicate that: B. the WDS service is not yet configured.

What is an operating system?

An operating system (OS) refers to a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, servers, computer hardware and all user processes.

In Computer technology, some examples of an operating system used on various computers include the following:

QNX OSLinux OSIBMOpenVMSMacOSSolarisVirtual Machine (VM)Microsoft Windows OS

What is WDS?

WDS is an abbreviation for Windows Deployment Services and it can be defined as a server technology that is designed and developed by Microsoft Inc., in order to enable its end users perform a network-based installation of Windows operating systems.

Read more on Windows Deployment Services here: https://brainly.com/question/24111452

#SPJ1

Complete Question:

Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate?

The WDS role was not installed successfully.

The WDS service is not yet configured.

The Deployment Server service is not running.

The Transport Server service is not running.

a video conferencing application isn't working due to a domain name system (dns) port error. which record requires modification to fix the issue? multiple choice, shuffle

Answers

A record which requires modification to fix the issue is: d) Service Record (SRV).

What is a DNS server?

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that is typically used in computer networking to translate requests for domain names into IP addresses, by pointing a domain name to a web server.

What is SRV?

SRV is an abbreviation for Service Record and it can be defined as a series of data records which is designed and developed to stipulate specifications of the DNS server (DNS) of well-defined (cataloged) services servers such as the following:

Port numbersServersInternet protocol (IP) addresses.Host namePriority and weight.

Read more on a Service Record here: https://brainly.com/question/17233082

#SPJ1

Complete Question:

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

a) Host(A)

b) Text(TXT)

c) Canonical Name(CNAME)

d) Service Record(SRV)

write a python program that has the function "draw_hexagon()" that draws a hexagon. use loops in your function and remember to call it

Answers

In this exercise we have to use the knowledge of computational language in python to write a code that program that has the function "draw_hexagon()" that draws a hexagon.

Writting the code:

import turtle as t

def how_many():

   while True:  

       print "  How many of then do you want to draw?"

       print "  -Range is from 1 to 5-"

       global shape_no

       shape_no = raw_input('  Enter your choice: ')

       try:

           shape_no = int(shape_no)

           if (1 <= shape_no <= 5):

               print "Your number is ok"

               break

           else:

               print

               print "from 1 to 5 only"

       except:

           print "Only numbers allowed - Please try again"

   return True

def start_point():

   t.penup()

   t.setpos(-240,0)

   t.pendown()

def draw_hexagon(howmanyof):

   start_point()

   for a in range(howmanyof):

       for a in range(6):

           t.forward(50)

           t.left(60)

       t.penup()

       t.forward(110)

       t.pendown()

def main():

   while True:

       print

       print "  Draw a Shape"

       print "  ============"

       print

       print "   Draw a hexagon"

       print

       print "  X - Exit"

       print

       choice = raw_input('  Enter your choice: ')

       if (choice == 'x') or (choice == 'X'):

           break

       elif choice == '1':

           how_many()

           draw_square(shape_no)

       elif choice == '2':

           how_many()

           draw_triangle(shape_no)

       elif choice == '3':

           how_many()

           draw_rectangle(shape_no)

       elif choice == '4':

           how_many()

           draw_hexagon(shape_no)

       elif choice == '5':

           how_many()

           draw_octagon(shape_no)

       elif choice == '6':

           how_many()

           draw_circle(shape_no)

       else:

           print

           print '  Try again'

           print

See more about python at brainly.com/question/13208346

#SPJ1

which of the following statements is true about firmware? which of the following statements is true about firmware? firmware is the same as cache memory. firmware cannot be changed or upgraded. firmware is another name for linux. the software is not coded like other software. users do not need to load firmware into a device's memory.

Answers

The true statement about firmware is that users do not need to load firmware into a device's memory.

Firmware is a particular type of computer software that in computers controls the hardware at the lowest level. The basic functionalities of a device may be contained in firmware, such as the BIOS of a personal computer, which may also offer hardware abstraction services to higher-level software, such operating systems.

Firmware can serve as the entire operating system for simpler devices, handling all control, monitoring, and data manipulation tasks. Embedded systems (running embedded software), home and personal appliances, computers, and computer peripherals are typical examples of gadgets that contain firmware.

Non-volatile memory systems like ROM, EPROM, EEPROM, and Flash memory store firmware. Firmware updates necessitate the actual replacement of ROM integrated circuits or the reprogramming of EPROM or flash memory using a unique technique.

To know more about firmware click on the link:

https://brainly.com/question/14542785

#SPJ4

What are some of the ways in which you can prevent personal identity theft?
Here are some guidelines that will help keep your online interactions secure from identity theft.
1.Never divulge your
social security number
to anyone.

2.Change passwords for Internet or mobile banking
-regularly
-monthly
-bi-annually
.3. Refrain from replying to
-inbox
-junk
-mails that promise gifts or ask for your bank account details.

Answers

The ways in which you can prevent personal identity theft are all of the above options.

1.Never divulge your social security number to anyone.

2.Change passwords for Internet or mobile banking regularly

.3. Refrain from replying messages from junk,  mails that promise gifts or ask for your bank account details.

What is personal information theft?

Identity theft occurs when cybercriminals or con artists steal your personal information and use it to pose as you.

Therefore, In essence, your credentials can be used to access various aspects of your digital life, such as your bank accounts, social networking accounts, and that of your credit card information.

Learn more about personal identity theft from

https://brainly.com/question/28081665
#SPJ1

Complete the sentence.
The opportunity to meet like-minded friends who share similar career interests with you and establish professional relationships is called

Answers

The opportunity to meet like-minded friends who share similar career interests with you and establish professional relationships is called "Networking"

What is the importance of Networking?

The goal of networking is to meet new people, create industry contacts, and perhaps find commercial partners. You may swiftly advance in your job by forming new ties. When you look at it this way, it's easy to see why networking is such a powerful tool – even for introverts.

Your network may provide you with new insights and ideas to aid you in your career. The ability to exchange information on issues, experiences, and objectives is a crucial benefit of networking since it helps you to learn fresh ideas that you would not have considered otherwise.

Learn more about Networking:
https://brainly.com/question/1027666
#SPJ1

When game designers begin to deconstruct a game, they begin to understand the design process a bit more thoroughly. Which of the following is not part of the game deconstruction process? Question 1 options: Evaluating how the audience interacts with the game Experimenting with the game by testing it first Finding out what elements are present Learning how the elements work together inside the game

Answers

When game designers begin to deconstruct a game, the option that is not part of the game deconstruction process is option B: Experimenting with the game by testing it first.

What is a Game Deconstruction?

Deconstruction doesn't technically mean "demolition"; rather, it refers to "breaking down" or "analyzing" something (particularly the words in a work of fiction or nonfiction) to determine its ultimate significance, which is allegedly nearly never exactly what the creator intended.

A typical deconstruction procedure starts by removing the building's windows, doors, appliances, and finishes, many of which can be recycled or sold again. The building is then taken apart, typically starting at the top and working down to the foundations.

Therefore, A "deconstruction" in games is a process that broadly refers to applying a rigorous, critical, and analytical examination to a work of media or art, frequently by disassembling it to better understand its constituent elements and how they interact.

Learn more about deconstruction process  from

https://brainly.com/question/26087397
#SPJ1

question 10 which aspect of a comprehensive approach to cybersecurity includes these items: evaluate, create teams, establish baselines, identify and model threats, identify use cases, identify risks, establish monitoring and control requirements?

Answers

Security Program is the aspect of a comprehensive approach to cybersecurity.

What do you mean by cybersecurity?

Cybersecurity is the technique of guarding against digital attacks on systems, networks, and programmes. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt normal corporate activities. Implementing effective cybersecurity measures is especially difficult today due to the fact that there are more devices than people, and attackers are becoming more creative.

A cyber security programme is a written record of your company's information security policies, processes, guidelines, and standards. Your security programme should lay out a strategy for implementing effective security management procedures and controls.

To learn more about cybersecurity

https://brainly.com/question/20408946

#SPJ4

Java is used in web applications, network programming, and Android devices. true or false

Answers

Answer:

true

Explanation:

I think is true.
Java is widely used programming language expressly designed for use distribute environment of the internet. It was the most popular programming language for Android smartphone application.
Other Questions
Which expression is equivalent to 3(4x + 3y)?3y(4x 3) 4x(3 + 3y) 12x + 3y 12x 9y What is the slope of the line passing through (5, 0) and (2, 0)A) 2/5B) 0C) 5/2D) Undefined the model of the skateboard you want to buy is available in 9 different colors and 3 different styles. in how many ways can you order the board? 1. Using the Universal Genetic Code Chart, fill in the missing amino acids in the amino acidsequence for species A in the chart on the next page.2. Using the Information given, fill in the missing mRNA bases in the mRNA strand for speciesB In the chart on the next page. What is galaxy? Do you think another galaxy contains a planet similar to Earth Describe what you see in the foreground of this painting 3. When 'listing the set requirements' what are themajor factors that go into planning this? What are the'do's' and 'don'ts'? frito lay introduced electric vehicles and compressed natural gas semi-trucks to their fleet. this is an effort to improve their company's: group of answer choices complexity analysis bottom-line performance sustainability Blue light has a frequency of 6.46 x 10^14 s-1. What is the energy of one quantum of blue light? which team member is not involved in game development A bar of steel is 300 cm long. amin cuts two 45 cm lengths off the bar. he then cuts the rest of the bar into as many 50 cm lengths as possible. work out how many 50 cm lengths of bar amin cuts. The art teacher has 1 gallon of paint, which is enough for \frac{2}{3} of the class to complete a project. How many gallons does she need for the whole class? Which action might have been undertaken by a woman with a loyalist viewpoint during the american revolution? (1 point) a. spying on soldiers stationed in her home b. buying british goods c. taking up arms on the front lines d. boycotting british goods Click the word(s) you want to edit in the sentence below and type your changes. While the direct contact was unexpected, villagers had reported seeing tribesman on multiple occasions around the town inthe weeks approaching the interaction. My very last resistance broken, i let myself be pulled, pushed, and kicked, like a deaf and mute sleepwalker. i could see everything, grasp it and register it, but only later would i try to put in order all the sensations and all the memories. how stunned i was, for example, to discover another time outside time, a universe parallel to this one, a creation within creation, with its own laws, customs structures, and language. click on the inference that is most logical, based on the information in the passage.Passage(1) People interrupt for various reasons. (2) One is believing that what they have to say is more important than what the other person is saying. (3) Another reason people interrupt is that they believe they know what the other person is going to say and want the person to know that they already know. (4) People may also interrupt when they are not paying close attention. (5) The interruption communicates a lack of sensitivity, a superior attitude, or both. (6) People need to be able to verbalize their ideas and feelings fully; inappropriate interruptions are bound to damage their self-concepts or make them hostileand possibly both. (7) Simply stated, whatever you have to say is seldom so important that it requires you to interrupt a person. (8) When you do interrupt, you should realize that you may be perceived as putting a person down. (9) The more frequent the interruptions, the greater the potential harm.Question 1. The author of the above passage suggests that peoplea. feel good if others listen carefully to their ideas.b. who interrupt dont mind being interrupted themselves.c. should learn not to feel insulted when they are interrupted. 4. How did the War Industries Board (WIB), led by Bernard Baruch, prepare the United States for war? The WIB handled the recruitment of men for the armed forces. The WIB regulated agricultural output. The WIB took control of the U.S. defense budget. The WIB regulated all industrial output. complete it for me please urgent Each year, the red lobster restaurant chain awards the lighthouse award to store managers who demonstrate outstanding leadership and live the firms core values. The lighthouse award is an example of. What is the smallest number of molecules of atp and gtp consumed in the synthesis of a protein with 200 residues after mrna synthesis, starting from amino acids? assume that the hydrolysis of ppi is equivalent to the hydrolysis of atp for this calculation.