1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
15

Project using simple formulas

Computers and Technology
1 answer:
Mrac [35]3 years ago
7 0
Please explain more
You might be interested in
Managing your calendar and emails can be easily accomplished through ___ software
r-ruslan [8.4K]
<span>Managing your calendar and emails can be easily accomplished through personal information management software.
These types of software can deal with your personal information, such as meetings, calendar appointments, etc. 
</span>
6 0
3 years ago
In a power point a type of chart that rather than showing numerical data illustrates a relationship or logical flow between diff
allochka39001 [22]

SmartArt is the answer here.

5 0
3 years ago
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
alexira [117]

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

8 0
3 years ago
Javier develops sophisticated fashion websites. He has been asked by the owner of a leading fashion brand to create web content
saul85 [17]

Answer:

hyperlinks

Explanation:

Javier should use hyperlinks to show the users the possible choices for their clothing.  This is really a terrible question and not likely in any real world scenario.  Fashion is always forward thinking and on the cutting edge.  When was the last time you went to a fashion website and were left with only choices to click on a hyperlink?  As Tim Gun would say "Make it work."  If I were able I would include a hyperlink using the previous sentence as the clickable link with a URL reference to

https : //en.wikipedia.org/wiki/Tim_Gunn (spaces after https to make this link not get censored)

to illustrate the way to show that hyperlinks have no real application on modern fashion website.  But they would have great utility here inside the answers section.  But they also are cause for a securtity concern and may be killed by the moderators

7 0
3 years ago
The ____ function displays the highest value in a range.
Monica [59]
Max()

------------------------------------------------------------
5 0
4 years ago
Read 2 more answers
Other questions:
  • Which data type is most suitable for a password field
    12·1 answer
  • Write a python program that requests a word (with lowercase letters) as input and translates the word into pig latin. The rules
    15·2 answers
  • What is structured​ knowledge?
    10·1 answer
  • The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
    6·1 answer
  • Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
    15·1 answer
  • What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions,
    10·1 answer
  • What 2 important components are found on a motherboard? (2 points each)
    13·1 answer
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • Which of the following defines a computer program?
    14·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!