1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
2 years ago
6

you have a column of dog breeds that are in all capital letters. what function would you use to convert those dog breeds so that

only the first letter of each word is capitalized?
Computers and Technology
1 answer:
topjm [15]2 years ago
3 0

The function  that would help you use to convert those dog breeds so that only the first letter of each word is capitalized is  upper() function.

<h3>What are Excel functions for changing text case?</h3>

There are some 3 main functions which are:

  • UPPER
  • LOWER
  • PROPER.

Note that the upper() function helps one to to convert all lowercase letters in a text string to a case that is uppercase and as such, The function  that would help you use to convert those dog breeds so that only the first letter of each word is capitalized is  upper() function.

Learn more about   function from

brainly.com/question/23459086

#SPJ2

You might be interested in
All of the following items could be too expensive for someone with only a high school degree to afford except
Papessa [141]
This sounds like a multiple choice answer can I have 4 choices to pick?
7 0
3 years ago
Write an expression that computes the difference of the variables x and y on Python.
yulyashka [42]

Answer:

x times y

Explanation: because adding the fractions would ecvlate a different b     fraction

7 0
3 years ago
Kerrri uses a database file many time a day. To increase her productivity, she should___.
Dmitriy789 [7]

Answer:

D

Explanation:

A shortcut will make it easier for her to access the database file

4 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require go
schepotkina [342]

Answer:

The U.S. Government has put in place an IPv6 mandate that comes into affect on September 30th. That new mandate requires all government agencies to have their public facing websites and email services available over IPv6.

At this point, it’s not likely that every government website will meet the deadline, though a large number of them will. Christine Schweickert, senior engagement manager for public sector at Akamai, told EnterpriseNetworkingPlanet that she expects over 1,800 U.S Government websites will be on IPv6 by the mandate deadline.

From an Akamai perspective, the company has a large number of U.S. Government customers that it is enabling for IPv6 with dual-stack servers. In a dual-stack implementation, a site is available natively over both IPv4 and IPv6. Akamai’s Content Delivery Network has a mapping technology that optimizes traffic around the Internet. Getting the government websites to run on IPv6 is just a matter of putting the site configuration on the Akamai dual-stack server maps.

“So if a request comes in to a government website from an IPv6 client, we will go ahead and route them to the best performing Akamai Edge server that can speak IPv6 back to that request,” Schweickert explained.

Another approach that some network administrators have tried for IPv6 support has been to tunnel the IPv6 traffic over an IPv4 network, or vice-versa. In Schweickert’s view, that’s not an ideal solution as it tends to break things.“When you’re tunneling, you’re routing through IPv4 packets and that’s not in the spirit that we have to operate in globally,” Schweickert said.

In contrast, Schweickert noted that with dual-stack, the server will respond to IPv4 requests with IPv4 content and to IPv6 requests with IPv6 content. “If you’re using tunneling, you’re really just doing a workaround,” Schweickert said.

To make it even easier for the U.S. Government websites, Akamai isn’t actually charging more money for the dual-stack service either. Schweickert noted that the dual-stack capability is a feature that is already part of the delivery service that Akamai is providing to its U.S Government customers.

David Helms, Vice President, Cyber Security Center of Excellence at Salient Federal Solutions is among those that are backers of the Akamai approach to meeting the September 30th IPv6 mandate. In his view, it’s all about enabling interesting services and locations over IPv6 in order to spur adoption.

8 0
3 years ago
Other questions:
  • What happened to Henry at the end of Chapter 4 in Bendy and the ink machine?
    9·2 answers
  • Let A be an array of n numbers. Recall that a pair of indices i, j is said to be under an inversion if A[i] &gt; A[j] and i &lt;
    11·1 answer
  • Cual es la definición de grouded ​
    7·2 answers
  • This is more opinionated than question-based.
    7·1 answer
  • In addition to MLA, what are some other widely used style guides? Check all that apply.
    5·1 answer
  • Write a program that prompts the user to enter the center and a point on the circle. The program should then output the circle’s
    9·1 answer
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • Software that uses signature-based detection contains a library of signatures of known _____?
    11·2 answers
  • Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHIN
    7·1 answer
  • Is nanotechnology is good or bad? and why?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!