1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
8

Ben uses a table that has few columns. He knows about a particular value in the first column and wants to find the corresponding

value of the row. What data organization technique can Ben use?
Computers and Technology
2 answers:
erastovalidia [21]3 years ago
8 0

on plato the answer is lookup function

igor_vitrenko [27]3 years ago
4 0
I'd suggest he uses LOOKUP Function.

You can use the LOOKUP function when you need to look in a single column or row and find a value from the same position in a corresponding column or row. We have a much improved VLOOKUP that can also be used to search one row or column or multiple rows and columns.



You might be interested in
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
You are testing the user experience.
Crazy boy [7]

Answer:

You can answer this very easily by considering which of the circumstances affect the end user and which affect the developer:

1) Didn't use comments in the code

- affects developers

2) User complaints about language used in the program

- affects users

3) The variables have meaningless names

- affects developers

4) The program should have used a loop

- affects developers

5) The numeric results are incorrect

- affects users

Your answers then are 2 and 5, spoken languages and incorrect output will very much affect the user experience.

5 0
3 years ago
Read 2 more answers
Match the characteristics to the mobile operating system that it describes.
mel-nik [20]

Answer:

1. is Apple's iOS

2. is Android

3. is Microsoft

8 0
3 years ago
Explain steps in creating a main document for from letter. <br>​
Paladinen [302]

Answer:

To create a new database, follow these steps:

1.In the Mail Merge task pane, click Next: Select Recipients.

2.Click Type a new list.

3.Click Create. ...

4.After you type the information for a record, click New Entry to move to the next record. ...

5.In the New Address List dialog box, click OK

4 0
3 years ago
As Jason walks down the street, a large raven starts squawking at him and flapping its wings. Jason thinks to himself ‘That bird
UNO [17]

Answer:

Answer to the following question is anthropomorphism.

Explanation:

Anthropomorphism is considered as the error in the following context of the scientific reductionism. Anthropomorphize is the source of an error that needs to reconsider.

Anthropomorphism is an attribute of the human qualities, emotions, thoughts, motivation, intentions, and characteristics to the non-living beings or the nonhuman beings, things or objects.

8 0
3 years ago
Other questions:
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
    8·1 answer
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • How to search for the largest files on my computer vista?
    5·1 answer
  • Someone plz answer
    8·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • If userNum1 is less than 0, put "userNum1 is negative.\n" to output. If userNum2 is greater than 10, assign userNum2 with 0. Els
    12·1 answer
  • which responses would you use for a computer or electronic medical record outage? (select all that apply)
    8·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!