1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
4 years ago
5

Why are advanced features helpful when businesses use spreadsheets

Computers and Technology
1 answer:
tankabanditka [31]4 years ago
5 0

Companies use spreadsheets to model and manipulate data sets, create graphical visualizations, and inform future planning, and decision making. With popular spreadsheet programs such as Microsoft Excel and alternatives from LibreOffice and GoogleDocs, businesses of any size can put spreadsheets to good use.

How Do Companies Use Spreadsheets? - Small Business - Chron.com

You might be interested in
Distinguish between engineering and architecture​
Liula [17]

difference between engineering and architecture are.

A engineer is a person whose job involves designing and building engines, machines, roads, bridges ,etc .

While architect design buildings only.

3 0
3 years ago
Write Python code to save the data to a MongoDB collection:Import json module to parse JSON dataImport MongoClient from pymongo
Zigmanuir [339]

Answer:

Explanation:

The objective of this task is to compute a program that involves the usage of Python code to save the data to MongoDB and to query  the database.

Due to the error that occur which makes me to be unable to submit this answer, I've created a word document instead and the attached file can be found below.

Thanks!

Download docx
8 0
3 years ago
A _____________ is designed for a individual user.
pishuonlain [190]

Answer:

i don't know it sorry

Explanation:

7 0
3 years ago
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
4 years ago
Read 2 more answers
What command line utility can be used to repair the bcd on a windows installation?
Afina-wow [57]
You can use the following command Bootrec /rebuildbcd
8 0
3 years ago
Other questions:
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • Select all that apply. Hyperlinks can appear as: words pictures symbols trademarks
    12·2 answers
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • Where can the Ease of Access and Speech Recognition centers be found?
    8·2 answers
  • Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
    15·2 answers
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • Which statement describes the relationship between science and technology?
    13·2 answers
  • Complete the sentence
    6·2 answers
  • Characteristics of RAM​
    5·1 answer
  • What is the main circuit board inside the computer called?CD-ROMY
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!