1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
8

Which file formats are used for importing and exporting data from OpenOffice Base?

Computers and Technology
2 answers:
Gennadij [26K]3 years ago
5 0

Answer:

Examples of The file formats used for importing and exporting data from open office are:

  • Open Document formats (.ods and .ots )
  • Impress
  • star-writer formats ( .sdw,.sgl and .vor)

In open-office base you can import data from a Database file ( C )

you can export to a spreadsheet ( A )

Explanation:

An open-office base is a fully designed desktop database management system. it is designed to serve a very large number of users especially in a firm. it can be used to track personal CD's and even used to produce monthly/yearly sales report for any department in the firm.

It is designed with JAVA as the programming language and it can run on most operating systems like: Linux windows and Mac    

marta [7]3 years ago
3 0

Answer:

spreadsheet, database

Explanation:

With Base, you can quickly extract information from your raw data by creating queries and reports. If your data was initially saved in a spreadsheet, you can use a wizard to quickly import it into an OpenOffice.org database. Launch Base, the database component of OpenOffice.org. Click "Connect to an existing database."

You might be interested in
A is a way for students to keep track of information during research
Ilya [14]
The choices are a) credible website B)search log c) Boolean operator d) online database.

The answer is, d. Online database. There are already numerous online digital tools that can aid research. Examples are readcube, mendeley, google scholar. It helps you save and organize researches as well as automatically give bibliographies according to your need like APA and MLA. These tools can hold and save different information that researchers need.
6 0
3 years ago
What is a problem? Give an example of abusiness problem and discuss how acomputer-based information system couldsolve it.
Naily [24]

Answer:

A problem is a challenging task or process that needs resources not available to the individual or group responsible for the task.

An example of a business problem is data analysis.

Explanation:

A business enterprise is driven by profit making. Investing in a business opportunity requires or demands for feasibility study. Without the right computer skills, a company dives into various physical forms of survey like giving questionnaires to potential clients.

This form of survey requires a lot of time and money that should be invested in other assets in the company and the data acquired, sometimes  is not enough to make long term business decisions.

On the other hand, when a spreed sheet application is used (like microsoft excel) by a business data analyst with big data and data visualization skills, large data could be accessed online and analysed of a fast and efficient descriptive and predictive analysis for long term business decisions.

7 0
3 years ago
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the
FinnZ [79.3K]
True they had to be developed in a special way in a dark room with several chemicals. 
3 0
4 years ago
Read 2 more answers
Which type of visual aid should students use to track small changes over time?
xenn [34]
Line graphs are used to graph change in time
7 0
3 years ago
Read 2 more answers
Other questions:
  • Universal Containers are using Salesforce for Order Management and has integrated with an in-house ERP system for order fulfilme
    5·1 answer
  • The part of the computer that contains the brain, or the central processing unit, also knows as the
    5·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • Please check my answer! (Java)
    7·1 answer
  • Rutherford concluded from his calculations that the volume of an atom is filled with protons, neutrons and electrons. is mostly
    14·1 answer
  • How does the post process alert the user if it detects a hardware problem during the post process?
    6·1 answer
  • Pls Help need it before 1pm PLS.
    15·2 answers
  • Determine the factors using computer failures and defects​
    8·1 answer
  • ______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide dec
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!