answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
1 year ago
9

Although it is not a term Excel uses, how do most people think of Excel?

Computers and Technology
1 answer:
lbvjy [14]1 year ago
7 0

Answer:

People think of Excel as a Spreadsheet.

You might be interested in
For an 18 Mbps LTE data stream with a symbol time of 66.67 μs, how many subcarriers are created?
vampirchik [111]
<span>1/.0000667 = 14,992.5;
18,000,000/14,992 = 1,200 subcarriers
</span><span>For an 18 Mbps LTE data stream with a symbol time of 66.67 μs, 1,200 subcarriers are created.</span>
8 0
2 years ago
Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru
Liula [17]

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

8 0
1 year ago
Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
matrenka [14]

Answer:

Algorithm:

1. Declare and initialize variable one_dog_year=7.

2.Ask user to give dog age.

   2.1 Read the dog age and assign it to variable "dog_age".

3.Create a variable "human_age" to store the equivalent human age.

   3.1 Calculate equivalent human age as "human_age=one_dog_year*dog_age".

4.Print the equivalent human age of dog age.

7. End the program.

// here is algorithm implemented in c++

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // initialize one dog year

   int one_dog_year=7;

   int dog_age;

   int equi_h_age;

   cout<<"Enter the dog age:";

   // read the dog age

   cin>>dog_age;

   

   //calculate the equivalent human age

   equi_h_age=dog_age*one_dog_year;

   cout<<"equivalent human age is : "<<equi_h_age<<endl;

return 0;

}

Output:

Enter the dog age:2                                                                                                                                            

equivalent human age is : 14

4 0
1 year ago
You have merged onto a limited access highway. limited acces highways can have posted speed limits as high as
torisob [31]
It is B 70 you have to go meduim to be safe and go through the traffic if ur talking about cars dont judge me
6 0
2 years ago
Read 2 more answers
Cloud Kicks is undergoing a GDPR-focused implementation to ensure access to personal information data is limited to only users w
bija089 [108]

Answer:

Option A.

Explanation:

It is experiencing a GDPR-focused execution to assure only users who require full rights to a corporation's account have access to sensitive information and data. It has a design of their personal account.

So, the Consultant allows particular Account privileges to the sustainable and Sales Procedure teams through which they create Renewals and Sales Operation Account team membership roles and has sales team members allocated to the suitable customers.

5 0
1 year ago
Other questions:
  • A cybercrime: Select one: a. Is the act of defaulting on a properly signed agreement entered into upon the internet. b. Can be c
    5·1 answer
  • Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
    8·1 answer
  • Write the addReview method, which adds a single product review, represented by a ProductReview object, to the ReviewCollector ob
    6·1 answer
  • 1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web a
    12·1 answer
  • If the object instance is created in a user program, then the object instance can access both the public and private members of
    9·1 answer
  • Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is
    14·1 answer
  • When should a developer begin thinking about scalability? 1 during the design phase 2during testing 3when traffic increases by 2
    14·1 answer
  • Write a code segment to change the name of the Thing object something such that the new name consists of the old name with one c
    12·1 answer
  • Help me! I’ll make you brainly and give extra points!
    6·1 answer
  • Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!