1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
12

Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp

any's payroll expense reports. Sidney will be using Excel spreadsheets to calculate the company's payroll expense reports. In Excel, what does Sidney need to consider when creating formulas? A. Excel has predefined formulas, so you don't have to create any formulas from scratch. B. Excel performs operations based on the order of precedence. C. Excel has third-party formulas you can purchase from Microsoft. D. Excel has limited capabilities, so it would be easier to use payroll software for this application.
Computers and Technology
1 answer:
madreJ [45]3 years ago
6 0
In excel spreadsheets, Sidney need to consider specifying relationships between the information you have stored in your spreadsheets when creating formulas. The elements that will help you understand using spreadsheet are the constants, operators, references and functions. This will enable her to use the formulas, without hassle in spreadsheets.
You might be interested in
Will mark brainliest
Romashka [77]

Answer:

1 a

2 d

3 c

4 a

Explanation:

4 0
3 years ago
CASE II AziTech is considering the design of a new CPU for its new model of computer systems for 2021. It is considering choosin
34kurt

Answer:

(a)The CPU B should be  selected for the new computer as it has a low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A.

(b) The CPU B is faster because it executes the same number of instruction in a lesser time than the CPU A .

Explanation:

Solution

(a)With regards to  the MIPS performance metric the CPU B should be chosen for the new computer as it low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A and when we look at the amount of process done by the system , the CPU B is faster when compared to other CPU and carries out same number of instruction in time.

The metric of response time for CPU B is lower than the CPU A and it has advantage over the other CPU and it has better amount as compared to CPU A, as CPU B is carrying out more execution is particular amount of time.

(b) The execution can be computed as follows:

Clock cycles taken for a program to finish * increased by the clock cycle time = the Clock cycles for a program * Clock cycle time

Thus

CPU A= 5*10^6 * 60*10^-9 →300*10^-3 →0.3 second (1 nano seconds =10^-9 second)

CPU B= 3 *10^6 * 75*10^-9 → 225*10^-3 → 0.225 second

Therefore,The CPU B is faster as it is executing the same number of instruction in a lesser time than the CPU A

6 0
3 years ago
your application is using kinesis to ingest data from a number of environmental sensors which continuously monitor for pollution
Lilit [14]

My response to this suggestion would be that the number of shards exceeds the number of instances because a single worker can process an infinite number of shards.

<h3>What is AWS?</h3>

AWS is an acronym for Amazon Web Service and it can be defined as a web-based service that is saddled with the responsibility of providing on-demand cloud computing and application programming interface (API) to individuals, governments, and business firms on a metered basis.

<h3>What is Amazon Kinesis?</h3>

Amazon Kinesis can be defined as an Amazon Web Service (AWS) which is designed and developed to enable an end user to ingest, buffer, and process large-scale data streams from multiple services in real-time.

In this scenario, my response to this suggestion would be that the number of shards exceeds the number of instances because a single worker can process an infinite number of shards.

Read more on Amazon Kinesis here: brainly.com/question/28115685

#SPJ4

5 0
2 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
To restart a device without powering it down
MariettaO [177]

Answer:

No possibly way of doing this

If the device isn't functioning but is turned on

On android: Hold the power button and either the volume up or down keys at the same time till the screen goes black

On IPhone/IPad/Ipod: hold down the home key and the power button till the screen goes blank

On Newer Apples with no home button, just hold down the power key till the screen goes blank

On PC: Hold the power button on the pc thill the screen goes black

On tablet: Use the steps for android listed above.

5 0
2 years ago
Other questions:
  • Which method call converts the value in variable stringVariable to an integer?
    8·1 answer
  • What is a Limited Purpose credit card
    11·2 answers
  • (a) Explain the term formatting a disk for storage.​
    11·1 answer
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.
    6·1 answer
  • Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • IF YOU GET 5/5 RIGHT YOU WILL GET BRAINLIEST AND 50 [POINTS
    15·2 answers
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​
    10·1 answer
  • How to get to meters to kilometer
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!