1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
11

The documents created in ms-excel is call what?​

Computers and Technology
2 answers:
rosijanka [135]3 years ago
5 0

Answer:

It is called a Spreadsheet

yulyashka [42]3 years ago
4 0

<u><em>Answer:</em></u>

its called spreadsheet

<u><em>explanation:</em></u>

spreadsheet is an electronic document in which data is arranged in the rows and columns of a grid and can be manipulated and used in calculations.

Ms excel is an example of a spreadsheet

You might be interested in
Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
dalvyx [7]

Answer:

string=""

while string not in {"Quit","quit","q"}:

   string=input("Enter line to be reversed")   #line of text will be entered

   if string!="Quit" and string!="quit" and string!="q":    #If quit is not  entered

       print("Reverse of line is : ")

       print(string[::-1])

OUTPUT :

Enter line to be reversedThis code is in python language

Reverse of line is :  

egaugnal nohtyp ni si edoc sihT

Enter line to be reversedHello world

Reverse of line is :  

dlrow olleH

Enter line to be reversedquit

Explanation:In the above program, First a while loop is executed and checked if line of text is not 'quit', 'Quit' or 'q'. If condition is true, then loop is executed and in python any string or list can be traversed from end if step is given -1. Similarly line of text is accessed from the last element. If quit is entered, then the program will be broken out of the loop.

7 0
2 years ago
E gpa(grade point average) you need to have or you get kicked out of robotics for middle school?
velikii [3]
Every school is different.  Some you have to keep above a C average.  Others you only have to be passing.  You will have to check your student handbook.
3 0
2 years ago
im past 1000 pts and it still hasnt up my rank from VIRTUOSO to EXPERT can someone explain and yes i have brainly plus
FromTheMoon [43]

Answer:

GREAT!

Explanation:

give me crown please

6 0
2 years ago
Read 2 more answers
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
3 years ago
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as
Lunna [17]

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

4 0
3 years ago
Other questions:
  • SQL a. has become the de facto standard database language b. can be used to define database systems c. both a. and b. d. none of
    10·1 answer
  • If variable x has value 2 and y has value 2, what is the value of the following Jack expression?
    9·1 answer
  • What would provide structured content that would indicate what the code is describing ?
    8·1 answer
  • A research team is studying parallel computing. They want to run parallel processes without having to use multiple processors. H
    15·2 answers
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD inclu
    7·1 answer
  • Always follow the routine "clean up while in use and clean up before keeping it".
    6·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!