1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
7

The spreadsheet below shows the names years in office, and number of terms for five US presidents

Computers and Technology
2 answers:
lesya [120]3 years ago
8 0

Answer:

                        the spreadsheet below shows the names years in office, and number of terms for five US presidents

President

George W. Bush  

Paul [167]3 years ago
4 0

i think its filter or sort ascending

You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
The ____________________ chip handles the functions of the keyboard controller.
RoseWind [281]
I think the ROM chip handles the functions of a keyboard controller.
7 0
3 years ago
How many Little mermaid movies are there? I know there is little mermaid 1 and 2, but I am not sure how many total movies there
kupik [55]
There have only been 3 Little Mermaid movies. 

<span>1. The Little Mermaid (1989) </span>
<span>2. The Little Mermaid 2 Return to the Sea (2000) </span>
<span>3. The Little Mermaid 3 Ariel's Beginning (2008)

hope this helps you(:

if not plz let me know (:

have a good day 
-denis</span>
7 0
3 years ago
Read 2 more answers
Prompt the user to enter four numbers, each corresponding to a person's weight in pounds. Store all weights in a list. Output th
Lesechka [4]

Answer:

# FIXME (1): Prompt for four weights. Add all weights to a list. Output list.

weight_one=float(input('Enter weight 1:\n'))

weight_two=float(input('Enter weight 2:\n'))

weight_three=float(input('Enter weight 3:\n'))

weight_four=float(input('Enter weight 4:\n'))

weights=[weight_one,weight_two,weight_three,weight_four]

print(weights)

# FIXME (2): Output average of weights.

average_weight=(weight_one + weight_two + weight_three + weight_four) / 4

print('Average weight:', "%.2f" % average_weight)

# FIXME (3): Output max weight from list.

weights.sort()

max_weight= weights[3]

print('Max weight:', "%.2f" % max_weight)

# FIXME (4): Prompt the user for a list index and output that weight in pounds and kilograms.

print(input('Enter a list index location (0 - 3):'))

print('Weight in pounds:', weights)

kilograms = float(weights) * 2.2

print('Weight in kilograms:')

# FIXME (5): Sort the list and output it.

weights.sort()

print(weights)

Explanation:

6 0
3 years ago
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
Other questions:
  • A technology company only hires applicants who are under the age of 30. This company could face possibly _________ consequences
    9·2 answers
  • How do you screen shot and copy paste the screenshot from chrome book
    11·2 answers
  • Truck drivers probably cannot see your vehicle if you cannot
    6·2 answers
  • g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how ca
    7·1 answer
  • Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
    11·1 answer
  • Which of these is the most likely result if the internet download speed in your home is 25 Mbps?
    14·1 answer
  • A user complains that her computer is performing slowly. She tells you the problem started about a week ago when new database so
    12·1 answer
  • Please need help.... The system development process is called a cycle. Which of the following may be an ongoing process which su
    6·1 answer
  • Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
    11·2 answers
  • ....................................................................................................
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!