1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
1 year ago
8

question 2 you are using a spreadsheet to organize a list of upcoming home repairs. column a contains the list of repairs, and c

olumn b notes the priority of each item on the list: high priority or low priority. what spreadsheet tool can you use to create a drop-down list of priorities for each cell in column b?
Computers and Technology
1 answer:
Helga [31]1 year ago
6 0

Since you are using a spreadsheet to organize a list of upcoming home repairs. The spreadsheet tool that can you use to create a drop-down list of priorities for each cell in column b is  Data validation.

<h3>What is the purpose of data validation?</h3>

The use of rows and columns of data, a spreadsheet is a type of computer program that can store, display, and manipulate data. One of the most used tools that can be used with personal computers is a spreadsheet. A spreadsheet is typically made to store numerical data and brief text passages.

Therefore, in the context of the above, before using data for a business operation, it is best to validate it to ensure its accuracy, integrity, and structure. The output of a data validation operation can be used to generate data for business intelligence, data analytics, or training a machine learning model.

Learn more about spreadsheet from

brainly.com/question/4965119
#SPJ1

You might be interested in
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
Consider the following declaration:
Mnenie [13.5K]

Answer:

cool

Explanation:

6 0
3 years ago
Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-
Ivenika [448]

Answer:

Is this coding?

Explanation:

5 0
3 years ago
Select the protocol data units.
Masja [62]

Answer: 4. Data 2. segment  7.packet 3.frame  1.bit

Explanation:

3 0
3 years ago
Read 2 more answers
Describe orderly how to save a Word document into a folder​
ivann1987 [24]
In order to do that you go onto the document you are going to save, on the top left it has the word “file”, click on that, once clicked it should say “Save as” and click on that, it will then ask you where you want it or which folder and you click the folder you want and finally click “save”
7 0
3 years ago
Other questions:
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • One day a subcontractor calls him saying that he needs a replacement check for the job he completed at 1437 Elm Street. Jonathan
    14·1 answer
  • Write a recursive method to compute the following series: 1 + 1/2 + 1/3 + 1/i ... Write a test program that displays m(i) for i
    14·1 answer
  • How can you download and install optional Windows updates?
    10·1 answer
  • Two technicians are discussing bleeding air from the brake hydraulic system. Technician A says to depress the brake pedal slowly
    10·1 answer
  • if you wanted to predict the value of the y variable when the x variable is 15, you would be _____ the data. correlating extrapo
    14·2 answers
  • What is cloud computing?
    9·1 answer
  • How to use function in python
    15·1 answer
  • D. What is the work of the following features:<br>1. Foot note​
    10·1 answer
  • Create a new Java class called AverageWeight. Create two arrays: an array to hold 3 different names and an array to hold their w
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!