answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
2 years ago
4

Which columns and rows should Maria select to unhide or show the hidden column C and hidden row 6?

Computers and Technology
1 answer:
Readme [11.4K]2 years ago
5 0
The answer is option B
You might be interested in
You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
TEA [102]

Answer:

Set the password for user sgarcia to G20oly04.

Explanation:

<u>In the following lab, you have to complete the following tasks</u>:

  • Firstly, type the following command, su -c passwd sgarcia on the command prompt after that you have to click Enter to accomplish that task with an individual command.
  • Then, type 1worm4b8 after that you have to click Enter to login credentials for just the root user.
  • After that, type G20oly04 on command prompt after that again click Enter to allocate the new password to that of the user profile in the sgarcia.
  • Again you have to type G20oly04, then click Enter key to verify the latest sgarcia user login details.

<u>Note</u>:- Would never use the usermod -p instruction for change the password, because that will collect the unencrypted details in the following directory.

5 0
2 years ago
Write a program that asks the user to enter five test scores. The program should display a letter grade for each score and the a
viva [34]

Answer:

def calc_average(s1, s2, s3, s4, s5):

   return (s1 + s2 + s3 + s4 + s5) / 5

def determine_grade(s):

   if 90 <= s <= 100:

       return "A"

   elif 80 <= s <= 89:

       return "B"

   elif 70 <= s <= 79:

       return "C"

   elif 60 <= s <= 69:

       return "D"

   else:

       return "F"

scores = []

for i in range(5):

   scores.append(int(input("Enter a test score: ")))

   print(determine_grade(scores[i]))

print(str(calc_average(scores[0], scores[1], scores[2], scores[3], scores[4])))

Explanation:

Create a function called calc_average that takes 4 test scores, calculates their average, and returns the average

Create a function called determine_grade that takes a test score, returns the grade depending on the grading scale

Create an empty lists that will hold the test scores

Create a for loop to get test scores from the user. After getting a score, call the determine_grade function to determine the grade of the score

When the loop is done, call the calc_average function to calculate the average of the given test scores

5 0
2 years ago
Currently, there are two major techniques used to develop programs and their procedures. name and describe them. html editor key
DaniilM [7]
The answer is procedural programming and object oriented programming. Procedural programming focuses on the procedures that programmers create. This simply contain a series of computational steps to be carried out. While the object-oriented programming or oop, focuses on objects, or “things”, and describes their features, or attributes, and their behaviors.
8 0
2 years ago
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
wariber [46]

Answer:

c. honeypot

Explanation:

A honeypot is a computer or a network used to mimic the actual target of a cyberattack. It is also used to detect attacks on the network and divert them from the real network. This is used to gain insight into how cyberattacks are carried out. With such knowledge, robust security systems can be put in place.

4 0
2 years ago
9.6 Code Practice: Question 1
worty [1.4K]

Answer:

  1. import java.util.Random;
  2. import java.util.Arrays;
  3. public class Main {
  4.    public static void main(String[] args) {
  5.        int n = 10;
  6.        int [] myArray = new int[n];
  7.        buildArray(myArray, n);
  8.        System.out.println(Arrays.toString(myArray));
  9.    }
  10.    public static void buildArray(int[] arr, int n){
  11.        for(int i=0; i < arr.length; i++){
  12.            Random rand = new Random();
  13.            arr[i] = rand.nextInt(90) +10;
  14.        }
  15.    }
  16. }

Explanation:

Firstly, create a method buildArray that take two inputs, an array and an array size (Line 12). In the method, use random nextInt method to repeatedly generate a two digit random number within a for loop that will loop over array size number of times (Line 13-15). The expression rand.nextInt(90) + 10 will generate digits between 10 - 99.

In the main program, call the build array method by using an array and array size as input arguments (Line 8). At last, print the array after calling the buildArray method (Line 9).

8 0
2 years ago
Other questions:
  • In cell e5, create a formula using the vlookup function to determine the dog type for teen anna morante based on the program cod
    13·2 answers
  • Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[5]. you know th
    5·1 answer
  • Edria was faced with a situation in which she was given sensitive information about twenty different clients, including their so
    13·2 answers
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Mark T for True and F for False. No single person or government agency controls or owns the Internet. The W3C is responsible for
    5·1 answer
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equiva
    14·1 answer
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
    13·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!