1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
3 years ago
8

One of the most common uses of spreadsheet programs are communicating with others. O editing images and photos. O tracking and m

anipulating data. O creating meeting agenda notes.​
Computers and Technology
2 answers:
Mama L [17]3 years ago
8 0

Answer:        tracking and manipulating data.

Explanation: A spreadsheet is nothing more than a large ledger like the ones accountants and office workers used years ago. It was a ruled paper that data and information was entered on in order to keep track of money, inventory, and other information.  Adding or subtracting from one column would change the totals and values overall. Now, with computers we have the electronic version and store the data on disc, flash drive or other connected media.

SVEN [57.7K]3 years ago
3 0

Answer:

 tracking and manipulating data.

Explanation:

You might be interested in
1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
GaryK [48]

Answer: C) Canonicalization error

Explanation:

Canonicalization error is the error or fault that occurs when data is changed into canonical form or standard form that persist different representation.This can create fault when different filenames or structure is assigned to data and canonization cannot take place as it works for simple data representation.

  • Other options are incorrect because static buffer flow is stable writing or reading of data that reaches outside the buffer boundary.Index error is accessing of index by any user that is found beyond the index's list boundary.
  • Heap overflow is the stack gets overlowed outside the boundary while overwriting heap.Thus, the correct option is option(C).
4 0
3 years ago
An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
sweet [91]

Answer:

Answer D is correct :

Explanation:

Configure an autoresponder email to send as a completion action when the \Request a Demo\ form has been submitted.

6 0
3 years ago
Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
xz_007 [3.2K]

The question given is incomplete and by finding it on internet i found the complete question as follows:

Direct Mapped Cache.

Memory is byte addressable

Fill in the missing fields based upon the properties of a direct-mapped cache. Click on "Select" to access the list of possible answers Main Memory Size Cache Size Block Size Number of Tag Bits 3 1) 16 KiB 128 KiB 256 B 20 2) 32 GiB 32 KiB 1 KiB 3) 64 MiB 512 KiB 1 KiB Select] 4 KiB 4) 16 GiB 10 Select ] Select ] 5) 10 64 MiB [ Select ] 6) Select] 512 KiB 7

For convenience, the table form of the question is attached in the image below.

Answers of blanks:

1.  3 bits

2. 20 bits

3. 64 MB

4. 16 MB

5. 64 KB

6. 64 MB

Explanation:

Following is the solution for question step-by-step:

<u>Part 1:</u>

No. of Tag bits = No. of bits to represent

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 128 KB = 2^7 * 2^{10} = 2^{17}

Cache Memory  = 16 KB = 2^4 * 2^{10}= 2^{14}

Putting values in A:

Tag bits = 17 - 14 = 3 bits

<u>Part 2:</u>

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 32 GB = 2^5 * 2^{30} = 2^{35}

Cache Memory  = 16 KB = 2^5 * 2^{10}= 2^{15}

Putting values in A:

Tag bits = 35 - 15 = 20 bits

<u>Part 3:</u>

Given:

Tag bits = 7

Cache Memory = 512 KB = 2^9 * 2^{10}  = 2^{19}

So from equation A

7 = Main Memory size - 19

Main Memory = 7 + 19

Main memory = 26

OR

Main Memory = 2^6 * 2^{20} = 64 MB

<u>Part 4:</u>

Given that:

Main Memory Size = 2^4 * 2^{30} = 2^{34}

Tag bits = 10

Cache Memory Bits = 34 - 10 = 24

Cache Memory Size = 2^4 * 2^{20} = 16 MB

<u>Part 5:</u>

Given that:

Main Memory Size  = 64 MB = 2^6 * 2^{20}

Tag bits = 10

Cache Memory Bits = 26 - 10 = 16

Cache Memory Size = 2^{16} = 2^6 * 2^{10} = 64 KB

<u>Part 6:</u>

Cache Memory = 512 KB = 2^9 * 2^{10} = 2^{19}

Tag Bits = 7

Main Memory Bits = 19 + 7 = 26

Main Memory size = 2^{26} = 2^6 * 2^20 = 64 MB

i hope it will help you!

6 0
3 years ago
Which Backstage view feature helps you to specifically remove customized information from a document? Protect Document Feedback
harina [27]

Answer:

properties

Explanation:

4 0
2 years ago
Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
lara [203]

Answer:  

"Option b and Option d" is the correct option for this question.

Explanation:

In the database, datatype belongs to the information storage medium, which can hold a specific type of value. There are several data types, which is used in database like integer, character, series, floating-point and array numbers, and the rules, that give levels of security to information are known as a security constraints. It may be either developed as rules on integrity, mathematical formalism rules or schematic rules, and other choices were wrong which can be described as follows:

  • In option a, The asserts, which is in any exchange in a database, should only modify the information, that is effected in acceptable ways is called consistency, that's why it is wrong.
  • In option c, The validity and accuracy of the data in the database can not be ensured, that's why it is wrong.
3 0
3 years ago
Other questions:
  • ____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other
    9·1 answer
  • Consider the provided C++ code in the main.cpp file: The function func2 has three parameters of type int, int, and double, say a
    8·1 answer
  • The sun produces energy by the process of nuclear: <br><br> A.fission <br> B.fusion
    7·2 answers
  • A ____ appears at the bottom of your e-mail messages and contains standard information about yourself that the recipient can use
    5·1 answer
  • 6. According to camp policy, staff members need to be at least 23 years old to transport students. Dean now wants to determine h
    9·1 answer
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • A social cause is: O A. when one person protests without the support of others. B. something that not many citizens think or car
    8·1 answer
  • The Python language uses a compiler which is a program that both translates and executes the instructions in a high-level langua
    15·1 answer
  • Here is something cool
    5·2 answers
  • Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolut
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!