1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
6

1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word

Computers and Technology
1 answer:
Gemiola [76]3 years ago
3 0

i think excel is the best program


You might be interested in
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
Varvara68 [4.7K]

Answer: True

Explanation:

An hacking activity usually deal with the unauthorized access to ones system.

Similarly this technique of Drive by hacking by which the attacker release wireless networks. Then a computer user of an organization finding a wireless network tries to connect to the open network and it is this process when the computer or system user falls easy prey to the hacker. The attacker uses the wireless network as a medium to  intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

It is often accompanied with the SqL injection packets into the network.

This attack is also popular by the name hotspot attack.

5 0
3 years ago
You are tasked with setting up an employee’s computer.Instead of a new computer,she will be using a computer with an older opera
Rudiy27
A. A clean installation. 

A clean installation erases all the information on the drive and installs a fresh, new OS right off the boot device.
6 0
3 years ago
Read 2 more answers
WHO WANT P O I N T S.................................................
borishaifa [10]

Answer:

Thank youuuu !

Explanation:

8 0
2 years ago
Certain medications can increase risk of obtaining a sunburn true or false
Angelina_Jolie [31]

true

Both types of photosensitivity occur after exposure to ultraviolet light – either natural sunlight or artificial light, such as a tanning booth. There are certain types of medicines that can cause sensitivity to the sun. ... Cholesterol lowering drugs (simvastatin, atorvastatin, lovastatin, pravastatin)

5 0
4 years ago
Create a dictionary named letter_counts that contains each letter and the number of times it occurs in string1. Challenge: Lette
Amanda [17]

Answer:

  1. letter_counts = {}
  2. string1 = "I have a dream"
  3. string1 = string1.lower()
  4. for x in string1:
  5.    if(x == " "):
  6.        continue  
  7.    if x not in letter_counts:
  8.        letter_counts[x] = 1
  9.    else:
  10.        letter_counts[x] += 1
  11. print(letter_counts)

Explanation:

The solution is written in Python 3.

Firstly create a letter_count dictionary (Line 1)

Next, create a sample string and assign it to string1 variable and convert all the characters to lowercase using lower method (Line 4).

Create a for loop to traverse through each character in string1 and check if the current character is a single space, just skip to the next iteration (Line 7 -8). If the current character is not found in letter_counts dictionary, set the initial count value 1 to x property of letter_counts. Otherwise increment the x property value by one (Line 9 -12).

After completion of loop, print the letter_count dictionary. We shall get the sample output {'i': 1, 'h': 1, 'a': 3, 'v': 1, 'e': 2, 'd': 1, 'r': 1, 'm': 1}

4 0
3 years ago
Other questions:
  • Typing a ____________ at the beginning of a word will exclude that word when doing a search.
    8·2 answers
  • An administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server
    12·1 answer
  • Which of the following is true regarding packaged software and custom software? Group of answer choices Packaged software are ap
    13·1 answer
  • Go online and research the computer topic
    6·1 answer
  • A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the developm
    11·1 answer
  • What is output? Select all that apply.
    15·1 answer
  • HELP ASAP!!!
    7·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • What makes a recipe for a meal an example of an algorithm?
    6·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!