1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
6

1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word

Computers and Technology
1 answer:
Gemiola [76]3 years ago
3 0

i think excel is the best program


You might be interested in
Knowing what you know now about frequency analysis, would you feel comfortable sending your password over the Internet using a s
Vikki [24]
According to my opinion, NO, I'd not feel comfortable.

Substitution ciphers in the world of encryption can be cracked very easily. By looking for patterns like one letter words, double letter patterns, and knowing rules such as all words must contain at least an a, e, i, o, u or y, you are probably able to decipher this with so much ease. While this information and the frequency of letters used in the encrypted message might be helpful, it might not be a perfect process.


8 0
3 years ago
Read 2 more answers
Define an iterative function named append_ordered; it is passed two arguments: a linked list (ll) whose values are ordered from
enot [183]

Answer:

A python programming language (code) was used for this exercise.

The code is shown below in the explanation section

Explanation:

Solution

Python code:

class LN:

def __init__(self,value,next=None):

self.value = value

self.next = next

  def list_to_ll(self,l):

if l == []:

return None

front = rear = LN(l[0])

for v in l[1:]:

rear.next = LN(v)

rear = rear.next

return front

  def str_ll(self,ll):

answer = ''

while ll != None:

answer += str(ll.value)+'->'

ll = ll.next

return answer + 'None'

def append_ordered(self,ll,v):

ln1=LN(v); #create a node with the new value by creating an instance of the LN class

if ll is None: #if the linked list is empty

ll=ln1 #return the new created node

elif(ll.value >= ln1.value): #if the value to be add is smallest, append the linked list to it

ln1.next=ll

ll=ln1

else:

current=ll; #crate a temporary pointer to iterate over linked list

#iterate till the next node value is smaller than the new value and list is not over

while (current.next is not None and current.next.value < ln1.value):

current=current.next

ln1.next=current.next #save the current node in the next of the new node

current.next=ln1 #save new node in the next of current node

return ll

ln=LN(0); #create an instance of class LN

ll1=ln.list_to_ll([1,2,4,5]); #create a linked list of the list

answer=ln.str_ll(ll1);    

print(answer); #print the linked list

ll2=ln.append_ordered(ll1,3); #append the value 3 in the linked list

answer=ln.str_ll(ll2)

print(answer); #print the new linked list

Now,

  • If Linked list is empty then make the node as head and return it.
  • If value of the node to be inserted is smaller than value of head node, then insert the node at start and make it head.
  • In a loop, find the appropriate node after which the input node ( 10 ) is to be inserted.To find the appropriate node start from head,keep moving until you reach a node GN (12 ) who's value is greater than the input node. The node just before GN is the appropriate node (8).
  • Insert the node (10) after the appropriate node (8) found in step 3.

Note: Kindly find the output python code attached to the question below.

3 0
3 years ago
Differentiate the threat to a computer from electrical surges and spikes versus the threat from viruses
musickatia [10]
Electrical surges can overload a computer (or really any plugged in device) and the instant jump in power can fry the computer, ruining the hardware.  viruses are made to invade youre computer through software and some viruses have the goal of finding personal information or trying to get money.  this can be done by a virus locking down your computer until you send $_____ to an account or buy something.
8 0
4 years ago
Read 2 more answers
What is the definition of Technology?
Rashid [163]

Answer:

The first one A.

Explanation:

7 0
3 years ago
Public abstract class Playerpublic class ComputerPlayer extends Player;public class SmartComputerPlayer extends ComputerPlayer;C
ZanzabumX [31]

Here's the full question;

<em>Assume the following partial declarations have been made, with default (no parameter) constructors for the classes.</em>

<em />

<em>public abstract class Player</em>

<em>public class ComputerPlayer extends Player;</em>

<em>public class SmartComputerPlayer extends ComputerPlayer;</em>

<em />

<em>Consider the following declarations.</em>

<em />

<em>I. ComputerPlayer playerA = new SmartComputerPlayer();</em>

<em>II. Player playerB = new SmartComputerPlayer();</em>

<em>III. Player playerC = new Player();</em>

<em />

<em>Which of these declarations will compile correctly?</em>

A.) I only

B.) II only

C.) III only

D.) I and II

E.) II and III

<u>Answer:</u>

<u>C)</u>

Explanation:

One of the rules of Java programming is that it must have a class which is a blueprint that informs about the behavior that the object of that class support.

If we go by the strict rules of Java programming only the class declaration;

Player playerC = new Player();

would compile correctly.

All other options would result in compiler error.

6 0
3 years ago
Other questions:
  • What kind of information can be found in a ROM:
    14·1 answer
  • When an Item is base lined, it becomes frozen, here frozenmeans that only creating an old version can change the item
    9·1 answer
  • ____________________ parameters are useful in three situations: • When the value of the actual parameter needs to be changed • W
    5·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • Write the SQL query that would search a table called Movies and return the titles of movies that were made in 1975.
    7·1 answer
  • Strange<br><br> String<br><br> Striated<br><br> Stop
    13·1 answer
  • Custom Offers empower Sellers to upsell even higher than their Premium Packages—but when should a Custom Offer be used?
    12·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    10·1 answer
  • Select the correct answer
    15·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!