1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
2 years ago
7

Please list ten things that you have learned an Excel Spreadsheet can do.

Computers and Technology
1 answer:
Furkat [3]2 years ago
6 0

Certain things that MS excel can do are Tools, Calculators and Simulations, Dashboards and Reports with Charts, Automate Jobs with VBA macros, Solver Add-in & Statistical Analysis, Data Entry and Lists, Games in Excel

<u>Explanation:</u>

Microsoft Excel is a spreadsheet created by Microsoft for Windows, mac-OS, Android and iOS. It highlights computation, diagramming instruments, rotate tables, and a large scale programming language called Visual Basic for Applications.

Microsoft Excel is a spreadsheet program remembered for the Microsoft Office suite of utilization. Spreadsheets present tables of qualities orchestrated in lines and segments that can be controlled scientifically utilizing both essential and complex number-crunching tasks and capacities.

You might be interested in
Which major and minor keys have no sharps or flats apex?
9966 [12]
C major and A minor have no sharps or flats.
5 0
2 years ago
Read 2 more answers
How would I CAST this variable to a STRING?<br> teeth = 32
maria [59]

Answer:

By using the str() function.

teeth = 32

print(str(teeth))

Explanation:

The str() function returns the string version of the given object.

4 0
3 years ago
A small program that sends itself to other computers, rather than relying on user actions, is a
PSYCHO15rus [73]

Virus.

A virus is a malicious program or script that Spreads. 

Malware, however, will not spread. 

Viruses can spread without a victim's permission because it is automated to do so. 

For example, the Melissa virus would look like a file attachment that used reverse psychology to make you open it. From there, it goes through the first 50 email contacts stored on your computer and sends the virus to them from your computer. 
8 0
3 years ago
HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
nasty-shy [4]

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

4 0
2 years ago
Part 3:<br> Please answer
Levart [38]

Answer:

a) 4 processes

b) 2 resources

c) R1: 2 instances

   R2: 2 instances

d) R2

e) R1

f) R1

g) No resource

h)  R1

i) R2

j) R2

k) No

l)No deadlock

Explanation:

You need to know that the resources that are required by the processes for completion are shown by the request edge and the resources allocated are shown by the allocation edge. And thus, we can find what resources are allocated to the process, and required for the completion accordingly. And here again, the cycle is created, and hence deadlock may or may not occur. However, we see that resources have multiple instances and get freed on time. And hence, deadlock does not occur.

Like,

P4 uses R2 and free one instance of R2.

P3 then uses one instance of R2 and free R2.

P3 then uses one instance of R3 and free R3.

P1 uses one instance of R1 and free R1 one instance

P1 then uses R2 and free R2.

P2 uses R1 and free R1.

Hence, all the processes are complete and deadlock does not occur.

3 0
2 years ago
Other questions:
  • Write an interactive Python calculator program. The program should allow the user to type a mathematical expression, and then pr
    13·1 answer
  • In regards to storing folders the computer can be described as a ________________.
    7·1 answer
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • Which of the following illustrates an example of a Boolean data type?
    15·1 answer
  • Can Word Processing (WP) programs be used for DTP? Explain your answer
    7·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • What is the best definition of the 7x7 rule for maximizing audience comprehension
    13·1 answer
  • I'm trying to network two laptops together using ethernet cable but it isn't working. Why isn't it working
    9·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Explain the term creating in word processing​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!