1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
2 years ago
9

Write a macro to change a decimal degrees (e.g. 245.678) to degrees, minutes, seconds (e.g. 245° 40' 40.8"). Input and output us

ing message boxes and round the seconds value to one digit to the right of the decimal. Validate with a block of statements the input data to assure that the input is not less than zero or greater than 360 degrees. Place a "RUN" button on the spreadsheet.

Computers and Technology
1 answer:
Brut [27]2 years ago
4 0

Answer:

All the procedure is explained below step-by-step

  1. Press alt+F11 to open VBA in excel.
  2. Create a module and start entering the subroutine.
  3. The coding of subroutine is attached in the image.

For adding "RUN" button:

  1. Select a shape on the sheet for the button.(Insert > Shapes > Rectangle).
  2. Double click on the shape to add text and write "RUN".
  3. The button can be styled by adding colors and shadows.
  4. Now Assign macro to the button (Right click  > Assign macro).
  5. A window pane will appear, select the macro from This workbook list so that it may work properly when shared with others.
  6. Press OK.
  7. "RUN" button has been created and by pressing it the subroutine will work as required.

You might be interested in
A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. A
nikitadnepr [17]

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.

255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.

Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255

7 0
3 years ago
Software, also called a(n) ____________________, consists of a series of related instructions, organized for a common purpose, t
Naddika [18.5K]
Software is also called a program or an application.
8 0
3 years ago
while investigating the settings on your SOHO router, you find two IP address reported on the devices's routing table, which is
DochEvi [55]

Answer:

From the two IP addresses, 192.168.2.1 can be listed as the default gateway in local network devices.

The reason is that we are allocated with the ranges that are reserved for the local networks by RFC 1918.

These ranges are given as follows:

  • For (10/8 prefix)  

                            10.0.0.0 - 10.255.255.255

  • (172.16/12 prefix)

                            172.16.0.0 - 172.31.255.255

  • (192.168/16 prefix)

                            192.168.0.0 - 192.168.255.255

Moreover the default gateway for a device can also be known by the commands ipconfig or  ipconfig/all on the command prompt.

<h3>I hope it will help you!</h3>
7 0
2 years ago
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
1 year ago
What did Bill Gates invent?
Viktor [21]
He invented microsoft.
8 0
3 years ago
Read 2 more answers
Other questions:
  • 5. Are you more honest in your online communication? Explain your response.
    6·1 answer
  • Yet another variation: A better packet switched network employs the concept of acknowledgment. When the end user’s device receiv
    11·1 answer
  • 12. In 2009, __________ of all pedestrian fatalities were caused by impaired drivers
    9·2 answers
  • The INC and Dec instruction do not effect the__________ flag
    6·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in
    6·1 answer
  • Question # 7
    11·1 answer
  • Who is responsible for the actions of autonomous systems? (please help me :C)
    14·2 answers
  • 3 uses of a computer ​
    12·2 answers
  • Which type of GUI control would be best to use if you wanted the user to select one date from a list of three possible dates to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!