answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
2 years ago
6

In 2–3 sentences, describe how you would change the background of a group of cell

Computers and Technology
2 answers:
Montano1993 [528]2 years ago
5 0
<h2>Answer:</h2>

We can do it by using the format tab

<h2>Explanation:</h2>

We can change the background of a group of cells by selecting the cell or range of cells we want to format. We should Click Home > Format Cells dialog launcher, or press Ctrl+Shift+F from the keyboard. Then on the Fill tab, under Background Color, we pick the color we want. To use a pattern with two colors, we pick a color in the Pattern Color box, and then pick a pattern in the Pattern Style box. In this tab we can also select gradient or single color.

IRISSAK [1]2 years ago
3 0

Highlight the cells you would like to change. Go up and press background color. choose the color you want. and press done.

You might be interested in
Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the elemen
Xelga [282]

Answer:

The JAVA program to implement for loop for given scenario is shown below.

public class MyProgram {

   public static void main(String args[]) {    

     int len = 5;

     int[] lowerScores = new int[len];      

     lowerScores[0] = 5;

     lowerScores[1] = 0;

     lowerScores[2] = 2;

     lowerScores[3] = -3;      

     System.out.println("The original elements of array are ");

     for(int i=0; i<len; i++)

     {

         System.out.print(lowerScores[i]+" ");

     }      

     System.out.println();

     System.out.println("The modified elements of array are ");

     for(int i=0; i<len; i++)

     {

         // if element is 0 or negative, 0 is assigned to this index

         if(lowerScores[i] <= 0)

           lowerScores[i] = 0;

       // 1 is subtracted from every non zero and positive element

         else

           lowerScores[i] = lowerScores[i] - 1;

           

       System.out.print(lowerScores[i]+" ");

     }

   }

}

OUTPUT

The original elements of array are  

5 0 2 -3 0  

The modified elements of array are  

4 0 1 0 0

Explanation:

The integer array is declared as shown.

int[] lowerScores = new int[len];

The length of the array is given by integer variable len. As per the question, we have taken four elements and size of 5 for the given array.

int len = 5;

The elements of the array are initialized inside the program with the elements given in the question.

lowerScores[0] = 5;

      lowerScores[1] = 0;

The values of the array can be changed to test the program. Also, the size of the array can be changed for testing.

As per the given scenario, if the element is greater than zero, 1 is subtracted from this element. For elements less than or equal to zero, that particular element is assigned the value of 0.

The given program implements if else statement inside for loop for this purpose.

for(int i=0; i<len; i++)

     {

         // if element is 0 or negative, 0 is assigned to this index

         if(lowerScores[i] <= 0)

           lowerScores[i] = 0;

       // 1 is subtracted from every non zero and positive element

         else

           lowerScores[i] = lowerScores[i] - 1;

     }  

5 0
1 year ago
Read 2 more answers
Create a single list that contains the following collection of data in the order provided:
ivann1987 [24]

Answer:

A code was created to single list that contains the following collection of data in the order provided

Explanation:

Solution

#list that stores employee numbers

employeee_numbers=[1121,1122,1127,1132,1137,1138,1152,1157]

#list that stores employee names

employee_name=["Jackie Grainger","Jignesh Thrakkar","Dion Green","Jacob Gerber","Sarah Sanderson","Brandon Heck","David Toma","Charles King"]

#list that stores wages per hour employee

hourly_rate=[22.22,25.25,28.75,24.32,23.45,25.84,22.65,23.75]

#list that stores salary employee

company_raises=[]

max_value=0

#list used to store total_hourly_rate

total_hourly_rate=[]

underpaid_salaries=[]

#loop used to musltiply values in hourly_wages with 1.3

#and store in new list called total_hourly_rate

#len() is used to get length of list

for i in range(0,len(hourly_rate)):

#append value to the list total_hourly_rate

total_hourly_rate.append(hourly_rate[i]*1.3)

for i in range(0,len(total_hourly_rate)):

#finds the maximum value

if(total_hourly_rate[i]>max_value):

max_value=total_hourly_rate[i] #stores the maximum value

if(max_value>37.30):

print("\nSomeone's salary may be a budget concern.\n")

for i in range(0,len(total_hourly_rate)):

#check anyone's total_hourly_rate is between 28.15 and 30.65

if(total_hourly_rate[i]>=28.15 and total_hourly_rate[i]<=28.15):

underpaid_salaries.append(total_hourly_rate[i])

for i in range(0,len(hourly_rate)):

#check anyone's hourly_rate is between 22 and 24

if(hourly_rate[i]>22 and hourly_rate[i]<24):

#adding 5%

hourly_rate[i]+=((hourly_rate[i]/100)*5)

elif(hourly_rate[i]>24 and hourly_rate[i]<26):

#adding 4%

hourly_rate[i]+=((hourly_rate[i]/100)*4)

elif(hourly_rate[i]>26 and hourly_rate[i]<28):

#adding 3%

hourly_rate[i]+=((hourly_rate[i]/100)*3)

else:

#adding 2% for all other salaries

hourly_rate[i]+=((hourly_rate[i]/100)*2)

#adding all raised value to company_raises

company_raises.extend(hourly_rate)

#The comparison in single line

for i in range(0,len(hourly_rate)):

 For this exercise i used ternary

operator hourly_rate[i]= (hourly_rate[i]+((hourly_rate[i]/100)*5)) if (hourly_rate[i]>22 and hourly_rate[i]<24) else (hourly_rate[i]+((hourly_rate[i]/100)*4)) if (hourly_rate[i]>24 and hourly_rate[i]<26) else hourly_rate[i]+((hourly_rate[i]/100)*2)

8 0
2 years ago
A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification
MrMuchimi

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

8 0
2 years ago
After deploying a large number of wireless laptop computers on the network, Taylor, the IT director at Contoso, Ltd. decides to
LenKa [72]

Answer:

Setting of short lease time for IP addresses in order to enhance quicker access from clients

6 0
2 years ago
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
gogolik [260]

Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in  or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.  

Authentication works as follows:  

Prompting the user to enter the credentials.  

Send the credentials to the authentication server.  

Match the credentials.  

Authorize the user and grants the acces

External Website security:  

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.  

Use of firewall.  

Implement the access control.  

Use of MVC (Model View Controller) to create different view for different type of user.  

Use of encryption.  

Use of SSL certificate.

Use of security plugins.  

Implement tools and techniques for backup and disaster recovery.  

Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  

Use of authorization to provide different user with the specific privileges and access.  

Encrypt or hide sensitive web pages.  

By implementing IT policies.  

Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.  

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  

Rules to prevent SQL injection and XSS.  

Allow only the specific type of traffic.  

Use access rules for IP security.  

Implement certain IT policies.  

Can implement their own rule.  

Wireless Security:  

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.  

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

In the following manner VLAN can be configured for web interface:  

Switching => VLAN => Advanced => VLAN Membership  

Switching => VLAN > Advanced => Port PVID Configuration.  

VLAN web filtering:  

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.  

Application policy recommendations:  

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.  

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.  

Use of anomaly based detection and prevention system is the better choice.

6 0
2 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • If a car's is malfunctioning, people in the car will become ill when driving long distances, especially if the windows are close
    6·2 answers
  • When creating a table in the relational database design from an entity in the extended e-r model, the attributes of the entity b
    13·1 answer
  • ____ is a program placed on a computer without the user's knowledge that secretly collects information about the user
    14·1 answer
  • The final step of the DHCP Discovery process is known as...
    8·1 answer
  • Write a fragment of code that reads in strings from standard input, until end-of-file and prints to standard output the largest
    10·1 answer
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • In below freezing conditions, keep your fuel level at least _________ full to keep moisture from freezing in your gas line.
    13·1 answer
  • [20 points] 3.3 Code Practice: Question 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!