1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
4 years ago
5

While microsoft excel can be an efficient tool for developing a dss, compared to using a programming language like c++, a shortc

oming of excel is it cannot be used effectively for small or medium sized problems. excel is not widely understood compared to a language like c++. it is not widely available for purchase. errors can creep into formulas somewhat easily?
Computers and Technology
1 answer:
klasskru [66]4 years ago
3 0
Although Microsoft Excel isn't a language itself, nor does it come with its own built-in language, I do see what you mean regarding its ability to create functions and whatnot to make the spreadsheet more versatile and efficient.

Yeah, syntactical errors (or compile errors in a compiled language like C++), are going to be harder to spot in Excel than it would be in a programming language, surprisingly. This is because of the reason that I just said; most programming languages such as C++ are compiled languages, meaning that they are written in an IDE (such as Visual Studio, for C++), which is used for writing out, debugging, and compiling programs in to a executable format. The IDE would not let the compilation process finish successfully unless there were no syntax errors in the code itself (not to be confused with runtime errors; those are the harder ones to iron out, as the compiler will not tell you there is an error).
You might be interested in
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
windows 93 it is a website THE QUESTION IS WHAT IS THE FIRST THING THAT POPS UP WHEN YOU OPEN THE WEBSITE?
dybincka [34]

Answer:

A black screen with green text in the top left corner

Explanation:

8 0
3 years ago
How do you think calculator of a computer works? describe the procedure.
Leviafan [203]

Explanation:

calculators work by processing information in binary form. We're used to thinking of numbers in our normal base-ten system, in which there are ten digits to work with: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. The binary number system is a base-two system, which means there are only two digits to work with: 0 and 1. Thus, when you input numbers into a calculator, the integrated circuit converts those numbers to binary strings of 0s and 1s.

The integrated circuits then use those strings of 0s and 1s to turn transistors on and off with electricity to perform the desired calculations. Since there are only two options in a binary system (0 or 1), these can easily be represented by turning transistors on and off, since on and off easily represent the binary option

Once a calculation has been completed, the answer in binary form is then converted back to our normal base-ten system and displayed on the calculator's display screen.

8 0
4 years ago
Which of the following is a benefit, as well as a risk, associated with peer-to-peer networks?
Anna71 [15]
<span>Clients depend on a working main server to perform their jobs: no, p2p relies on a structure without a central server. 

</span><span>Individuals can easily add or remove devices from their network: yes, this is true.

</span><span>Requires an IT professional, but easy to add clients to server and give privileges: no, in p2p, the server doesn't play a role.
</span>
<span>Software is maintained on the server, allowing for easy access to upgrade programs for all users: this is not an aspect of p2p</span>
5 0
4 years ago
Read 2 more answers
Why does my playstation keep disconnecting from wifi?.
REY [17]

Answer:

because there might be a internet

problem

Explanation:

5 0
2 years ago
Other questions:
  • Write a function statement() that takes as input a list of floating-point numbers, with positive numbers representing deposits t
    8·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • How can the storage model assist in the design of storage networks?
    12·1 answer
  • What is Deep learning
    9·1 answer
  • What do secondary sources rely on for their analysis of events?
    6·2 answers
  • Which function can you perform on a word processor but not on a typewriter?
    11·1 answer
  • Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. S
    14·1 answer
  • ICT 10
    8·1 answer
  • True or false. A plug-in card is always required to support pc sound
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!