answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
2 years ago
4

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not

Computers and Technology
1 answer:
Lunna [17]2 years ago
6 0

Answer

Access Quick Access commands using the More button.

Explanation:

If you click the more button a drop down menu will appear, click the more commands, then in the Choose commands from list, click file tab.  Then chose the command and then click add.   :-)

You might be interested in
Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or e
stira [4]

Answer:

IF(AND(Payment_Type = 'Credit', Amount >= 4000),'Flag')

Explanation:

Given

Search criterion 1: Payment Type: Credit

Search Criterion 2: Amount ≥

$4000

Given the above search criteria, the nested function is as follows;

IF(AND(Payment_Type = 'Credit', Amount >= 4000),'Flag')

The above statement will display the word 'Flag' without the quotes if and only if the two conditions in the brackets are satisfied

Condition 1: Payment_Type = 'Credit'

Here, Payment_Type is used because when naming a column, it's preferred to avoid space or blank characters.

So, if this condition is satisfied (i.e. if payment type is credit) it checks for condition 2

Condition 2: Amount>=4000

This mean the amount must be at least 4000.

Both conditions must be satisfied because of the AND clause in the statement.

8 0
2 years ago
6.4 Predicting Prices of Used Cars. The file ToyotaCorolla.csv contains data on used cars (Toyota Corolla) on sale during late s
Brums [2.3K]

Answer:

Compare the predictions in terms of the predictors that were used, the magnitude of the difference between the two predictions, and the advantages and disadvantages of the two methods.

Our predictions for the two models were very simmilar. A difference of $32.78 (less than 1% of the total price of the car) is statistically insignificant in this case. Our binned model returned a whole number while the full model returned a more “accurate” price, but ultimately it is a wash. Both models had comparable accuracy, but the full regression seemed to be better trained. If we wanted to use the binned model I would suggest creating smaller bin ranges to prevent underfitting the model. However, when considering the the overall accuracy range and the car sale market both models would be

Explanation:

8 0
2 years ago
Leena needs to manually update the TOC and would prefer not to change the styles in the document.
Lady_Fox [76]

<u>Answer:</u>

<em>Using References tab. Table of Contents group, Update Table </em>

<u>Explanation:</u>

Changes in the table of content is easy to do in word application. The changes might be only for a page number or heading or it might be anything. Based on the need, word allows you to do by using References tab.

<em>Step 1:</em><em> Goto References tab Contents group Update table </em>

<em>Step 2:</em><em> Choose Update Page number only to update only the page numbers in TOC. This would ignore the changes in headings. </em>

<em>Step 3:</em><em> Update Entire table would update the whole table. </em>

8 0
2 years ago
Read 2 more answers
Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consi
Svetlanka [38]

Answer: Vulnerability of

Explanation:

The network administrator was able to identify that virus before it led to denial of service to users. Since it has been discovered, it is no longer a threat as measures will be taken to eliminate it. But a virus that was successful uploaded shows how vulnerable the system is or how bad the security protections put in place are. Steps has to be taken to ensure it does not reoccur.

7 0
2 years ago
Read 2 more answers
#Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
gulaghasi [49]

Answer:

Here is the function replace_all:

def replace_all(target_string,find_string,replace_string):

   result_string = replace_string.join(target_string.split(find_string))  

   return result_string

#if you want to see the working of this function then you can call this function using the following statements:

target_string = "In case I don't see ya, good afternoon, good evening, and good night!"

find_string = "good"

replace_string = "bad"

print(replace_all(target_string, find_string, replace_string)

Explanation:

The above program has a function called replace_all that accepts three arguments i.e target_string, a string in which to search ,find_string, a string to search for and replace_string, a string to use to replace every instance of the value of find_string. The function has the following statement:

replace_string.join(target_string.split(find_string))  

split() method in the above statement is splits or breaks the target_string in to a list of strings based on find_string. Here find_string is passed to split() method as a parameter which works as a separator. For example above:

target_string = In case I don't see ya, good afternoon, good evening, and good night!

find_string = good

After using target_string.split(find_string) we get:

["In case I don't see ya, ", ' afternoon, ', ' evening, and ', ' night']

Next join() method is used to return a string concatenated with the elements of target_string.split(find_string). Here join takes the list ["In case I don't see ya, ", ' afternoon, ', ' evening, and ', ' night'] as parameter and joins elements of this list by 'bad'.

replace_string = bad

After using replace_string.join(target_string.split(find_string))  we get:

In case I don't see ya, bad afternoon, bad evening, and bad night!  

The program and output is attached as a screenshot.

7 0
2 years ago
Other questions:
  • Which statement best describes how the rapid prototyping model works?a) Developers create prototypes to show stakeholders how va
    11·2 answers
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • Distinguish multiple inheritance and selective inheritance in oo concepts.
    14·1 answer
  • Write a C++ program that prompt the user to enter three points (x1, y1), (x2, y2), (x3,y3) of a triangle and displays its area.
    15·1 answer
  • Consider the following code: x = 17 y = 5 print (x % y) What is output?
    10·1 answer
  • Prove that f(n) = 20n3 + 10nlogn + 5 is O(n3)
    12·1 answer
  • Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
    12·1 answer
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • . Electricians will sometimes call ______ "disconnects" or a "disconnecting means."
    12·1 answer
  • What should businesses do in order to remain competitive under the current Cloud<br> landscape?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!