1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
9

When creating an input/output table, where do you enter the formula?

Computers and Technology
1 answer:
balu736 [363]3 years ago
4 0

When creating an input/output table, where do you enter the formula?  

A. In the input cell

B. In the output cell

C. In the title cell

D. In the table of contents


<u>ans. (B) In the output cell</u>

You might be interested in
When the continue statement is encountered in a loop, all the statements in the body of the loop that appear after it are ignore
kati45 [8]

Answer:

True

Explanation:

While looping through, there can be times that you do not want your code to do anything in some situations. Let's say you loop through an array consists of four numbers (1, 2, 3, and 4). You want to print all the values except 2. Check the code written in Java below.

     int [] numbers = {1, 2, 3, 4};

     for(int number : numbers) {

        if(number == 2) {

           continue;

        }

        System.out.println(number);

     }

3 0
3 years ago
"In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number."
natita [175]

Answer:

ASCII is the correct answer for the above question.

Explanation:

  • ASCII is used to encode any character which is understood and used by the computer system.
  • It is also known as the American standard code for information interchange. It is used to represent any character in the form of 7 bit-binary number which can be used for the computer system.
  • It is designed for computers. It is in the binary language because the computer can understand only binary language.
  • The above question asked about the file which holds the special character and presented in the form of binary. This file is known as the ASCII file which is described above.
4 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Concept about borderless classroom because of technology​
Elan Coil [88]

Answer:

With Borderless Classroom Technology, every student remains a part of the classroom. ... That is to be 'as simple as a light switch' and as effective in lighting the learning experience as educators focused on students, not on technology." Borderless Classroom Technology is an extension of that philosophy.

HAS TO BE RIGHT- GOOGLE TOLD ME

5 0
3 years ago
Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
viva [34]

Answer:

Approved in 2009, Wi-Fi 4 enables operation in both the 2.4 and 5 GHz frequencies, a game changer at the time. It was the first standard to use MIMO (Multiple In, Multiple Out) and offered better speed, 300 Mbps, better range, more resistance to interference and backward compatibility with Wi-Fi 2 and

Hope this is helpful to you.......

7 0
3 years ago
Other questions:
  • An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every
    7·1 answer
  • All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
    6·1 answer
  • Before installing any software, it's always important to back up your system and to create a BLANK, which enables you to go back
    6·2 answers
  • What appears in the document after you have inserted a video?
    14·2 answers
  • What is the name of the interface that uses graphics as compared to a command-driven interface?
    11·1 answer
  • What is the purpose of a register in a CPU? Describe three types of registers.
    12·1 answer
  • Windows XPProfessional and Windows Vista Both have same devicedrivers.<br> True<br> False
    5·1 answer
  • int sequence[10] = { 3, 4, 5, 6, 7, 8, 9, 10, 1, 2 }; Write a C++ program to ask the user to enter a number, if the number can b
    10·1 answer
  • Which of the following views hides the ribbon and shows text on the screen in an easy-to-read format?: *
    11·1 answer
  • Write a basic notation for
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!