1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
2 years ago
13

Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a

n impact?
Computers and Technology
1 answer:
Paladinen [302]2 years ago
8 0

Spreadsheets is known to be an credited tool with legitimizing the personal computer as a business tool. Spreadsheets have a lot of impact in business world because:

  • It has low technical requirement. Here, spreadsheet does not need a complex installation and it is easy to understand.
  • Data Sifting and Cleanup is very easy to do.
  • It is a quick way to Generate Reports and Charts for business.

<h3>What is Spreadsheets?</h3>

Spreadsheets is known to be a key  business and accounting tool. They are known to have different complexity and are used for a lot of reasons.

The primary aim of this is that it helps us  to organize and categorize data into a kind of logical format and thus helps us to grow our business.

Learn more about Spreadsheets from

brainly.com/question/4965119

You might be interested in
Can someone help me write an algorithm and a flow chart pls for question 3
emmainna [20.7K]

for i in range(20, 51, 2):

      print(i)

6 0
3 years ago
What Linux services can pose a problem when attempting to reach remote host on a network?
nekit [7.7K]

Answer:

NFS configuration

Explanation:

The Linux server runs the Linus open source operating system that provides a stable, secure and more flexible environment to carry out more challenging jobs like network and system administration, database management and web hosting.

The NFS or Network file system configured on the Linux server only supports Linux servers communication. It mounts the storage of the server on the network for central access.

4 0
3 years ago
Read 2 more answers
Which of the following is a way to prevent wastes from contaminating the environment? A) Use absorbent pads to collect floor was
Firlakuza [10]

Answer

Dispose of absorbents as hazardous waste in its own hazardous waste container

Explanation

Hazardous waste is a waste that has chemical composition and properties which makes it capable of causing illness, death  or harm to humans and other life forms when released to the environment without proper management. The characteristics of such wastes include: toxic, ecotoxic, infectious substance, poisonous, explosive and flammability. Hazardous wastes can be destroyed by incineration, chemical process, and temporary on-site waste storage facilities such as waste piles and lagoons/ponds



8 0
3 years ago
Read 2 more answers
Which of the following describes a Trojan horse?
HACTEHA [7]

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

7 0
3 years ago
Audience centered public speakers are inherently sensitive to the
DanielleElmas [232]
Diversity of their audiences
7 0
2 years ago
Read 2 more answers
Other questions:
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • The term "Big Data" is relative as it depends on the size of the using organization.
    14·1 answer
  • Componets of computer
    5·1 answer
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • Self contained sequences of actions to be performed are?
    6·1 answer
  • New Top Level Domains (TLDs) are coordinated by:_______.
    10·1 answer
  • What will be the output of the following code? &lt;?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
    8·2 answers
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • An application's certificate indicates the application -
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!