Answer:
D. Fill handle
Explanation:
Required
Which can be used to copy from cell to cell
(a); Means the current cell being selected in the spreadsheet program
(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.
(c): The vertical and horizontal lines that separate cells.
(d): This is used to copy from one cell to another, especially adjacent cells.
The formula =average(B1:B2) displays the value____(see the picture down)
9514 1404 393
Answer:
(a) 10
Explanation:
The formula displays the average of the values 8 and 12. That average is ...
(8+12)/2 = 10
dash is a collection of sequentially arranged slides put together in the from of a file
Answer: Presentation
Explanation:
A presentation refers to the collection of sequentially arranged slides that are put together in the from of a file.
Presentations are used by businesses and professional firms to inform, educate, and persuade the audiences. Companies use presentations to train their employees, and communicate with their clients by using words and images to engage them.
The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag
3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting
due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported
Answer:
The answer of number three is pyrography.
how can the government protect human rights
Answer:
governments can: Create constitutional guarantees of human rights. Provide ways for people who have suffered human rights violations by the government to seek legal remedies from domestic and international courts. Sign international human rights treaties.
list = [1,2,3,'a','b','c'] ... write a code to output b * (python)
Answer:
please tell me if you find the answer i have the same q for my IT med term
Answer:
print(list[4])
Explanation:
Complete breakdown:
The command 'print' shows what command is displayed on the screen
The 'list' shows that Python should print something inside a list
The '4' is the index number of list. Index numbers start from 0 so
'1' - 0
'2'- 1
'3' - 2
'a' - 3
'b' - 4
'c' - 5
list the three sources of naturally occurring materials
Answer:
Flint
granite
sandstone
A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time. Group of answer choices dual-core bimodal all-in-one dual-mode Flag question: Question 79 Question 791 pts ________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. Group of answer choices Repetitive strain prevention Ergonomics Positioning Occupational safety
Answer:
A dual CPU has two processing paths, allowing it to process more than one instruction at a time.
Ergonomics is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.
One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.
Answer:
connectionist
Explanation:
One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.
Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.
Answer:
Premises
On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.
pls help me pass my finals!!
Answer:
(a): power(2&-2)
The code is as follows:
power = 2**-2
print(power)
(b): Largest and smallest in a list
The code is as follows:
num = [33,6,11,100,456,109,-4,366]
smallest= min(num)
largest= max(num)
print(smallest)
print(largest)
(c): Loop in Python
(i) Loop are instructions that are repeated until a certain condition is met;
(ii) For loop, in python are used to iterate over a sequence or through a certain range;
The syntax is:
for loop_element in range(iterating_range):
The following is an illustration of for loop that iterates 5 times
for i in range(5):
Explanation:
(a): power(2&-2)
The ** is used to calculate power.
So, 2**-2 represents 2 raise to power -2
power = 2**-2
This prints the calculated power
print(power)
(b): Largest and smallest in a list
This initializes the list
num = [33,6,11,100,456,109,-4,366]
This calculates the smallest using min() function
smallest= min(num)
This calculates the largest using max() function
largest= max(num)
This prints the smallest and the largest
print(smallest)
print(largest)
(c): See answer section
Dana frequently joins people in online discussion boards and forums. Which of her habits should she change to maintain proper netiquette?
Answer:
The correct option is a. correcting others’ spelling and grammar.
Explanation:
Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:
Dana frequently joins people in online discussion boards and forums. Which of her habits should she change to maintain proper netiquette?
a. correcting others’ spelling and grammar
b. using a conversational tone
c . breaking large comments into readable paragraphs
d. typing whole sentences with capital letters
The explanation of the answer is now given as follows:
Grammar lessons should not be given in a casual conversation unless the person is a language teacher or has been specifically asked to assist. This indicates that correcting others' spelling and grammar in a normal conversation is often considered impolite. It's simply not polite and a sign of lack of etiquette to criticize the actions of other people when you have not been specifically appointed or when you are not in a position to do so.
Therefore, the correct option is a. correcting others’ spelling and grammar.
What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard
Answer:
private
Explanation:
which structure does a web page normally use to define an area of focus
Answer:
Grid structure
Explanation:
Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using
Answer:
breakpoints.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Debugging and maintenance.
In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.
Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.
At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.
Answer:
C for Edge
Explanation:
A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files
Answer:
A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files? The user's device is rooted or jailbroken.
Is 10 teraflops good? How much does the best PC in the world have?
What is Sleep mode? Check all of the boxes that apply.
It is a power-saving mode for a computer.
It puts your work and computer settings in memory while using little power.
It is a power-saving mode designed for laptops.
It is the same thing as Hibernate mode.
The supreme court's ruling in Marbury v. Madison was important because it
It is a power-saving mode for a computer.
It is a power-saving mode designed for laptops.
A two-dimensional array is essentially?
A primitive date type
A looped data structure
Answer:
A looped data structure
Explanation:
A two-dimensional array is an array of another array. You can traverse it using nested loops, one to traverse row and one to traverse columns.
write a program to calculate the volume of a cylinder
Answer:
program by READ DATA statement
Explanation:
CLS
REm to find the volume of a cylinder
READ π , [tex]r^{2}[/tex] , h
PRINT " pie =";P
PRINT "radius =";r
PRINT "height";h
PRINT "V=";π*[tex]r^{2}[/tex]*h
DATA = 22/7 , 4, 6
END
write a program to calculate the area of rectangle
Answer:
program by LET statement
Explanation:
CLS
REM to find the area of rectangle
LET L=40
LET B=20
LET AOR=L*B
PRINT "AOR=";AOR
END
Press F5
output
AOR=800
Which of the following devices might be used to transmit electronic mail? *
1 point
(A) Printer
(B) Monitor
(C) Fax machine
(D) Smartphone
A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices
Answer:
Private.
Explanation:
The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.
Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.
Thus, a private cloud is a correct answer.
Select the correct answer from each drop-down menu.
Kawika is a math teacher. His students recently took a test. He has recorded their scores in a spreadsheet, using functions to analyze the scores. Which functions should he use to determine the top and mean scores?
Kawika can use the ____ function to find the top score and the ____ function to find the mean score.
First blank:
1. MIN
2. COUNT
3. MAX
Second blank:
1. AVERAGE
2. ROUND
3. SUM
Answer:
First blank: MAX
Second blank: AVERAGE
Explanation:
Required
Complete the blanks
The first blank is to be filled with a function that calculates the highest score from a given range of scores (cells).
To do this, we make use of the MAX function, and the syntax is:
=MAX(cell_range)
The second blank is to be filled with a function that calculates the mean score from a given range of scores (cells).
To do this, we make use of the AVERAGE function, and the syntax is:
=AVERAGE(cell_range)
Answer:
MAX
AVERAGE
Explanation:
I got it right on the Edmentum test.
11. Find the output of the following programs:
CLS
X= 7
FOR I = 1 to 10
PRINT X
IF X MOD 2 = 0 THEN
X= X/2
ELSE
X=X* 3+1
END IF
Next I
END
Answer:
See picture.
Explanation:
Ran it on repl it.
what is file management?can please help me
What is a blank workbook?
What are some signs that could help you determine that a date and time was inserted as a special object instead of
typed as normal text? Check all that apply.
Answer:
i) It is difficult to put the mouse pointer's insertion point in the text
ii) A gray border appear around the time and date when you point to it
Explanation:
When the date and time is pointed to or hovered using the mouse pointer, we have, that the background of the text changes to a grey border around the text when the date and time is inserted as a special object using the insert date and time button on the insert menu in the word processing application
The mouse pointer behaves different when working with some applications, and it could be difficult to place the insertion point of the mouse pointer in the text
Therefore, the correct options are;
It is difficult to put the mouse pointer's insertion point in the text and
A gray border appear around the time and date when you point to it.
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.