1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
2 years ago
9

What considerations should you make when deciding on the size of a table?

Computers and Technology
1 answer:
Kisachek [45]2 years ago
4 0

Answer:

You should consider the number of cells needed for data, labels, titles, and formulas.

Explanation:

You might be interested in
What is Application Software ??
Paraphin [41]


Hi Pupil Here's Your Answer ::



➡➡➡➡➡➡➡➡➡➡➡➡➡


Application software and software that are created to facilitate/perform a specific type of real life application directly for the end user. These are available in the market as single readymade software or as an integrated package like MS Office, Visual Studio or Adobe integrated suite.


There are three types of application software which you would know about ::

# General Purpose Application Software.

# Special Purpose Application Software.

# Customized or Bespoke Purpose Application Software.


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps .........
6 0
2 years ago
Read 2 more answers
What is the importance of data validation, and how can user data entry errors be reduced or eliminated?
lisabon 2012 [21]

Incorrect data can lead to unexpected program execution results. Data entry errors can be reduced by only accepting valid input, e.g., if a number must be entered, alphabetic characters are ignored. After data validation, error messages can be prompted to the user, requiring him to enter the data again.

5 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of
oksano4ka [1.4K]

Answer:

please can you make this question make sence so i can at least try to help by answering this question for you

5 0
2 years ago
If a binary search is applied to an array with 1024 elements, in the worst case, the main loop executes, approximately, _____.
trasher [3.6K]

Answer:

10.

Explanation:

Binary search divides the array to be search each in half according to the value of the element.

The worst case time complexity of binary search is O(logN).

In this case the time complexity will come out to be log₂(1024)=10.

So the binary search can divide this array in half maximum of 10 times.

Hence the main loop will executes 10 times.

7 0
3 years ago
Other questions:
  • 2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them. In one particular jurisdict
    7·1 answer
  • Identify the data link trailer blocker
    14·1 answer
  • What is the most powerful gpu or known as the graphics card in the world?
    8·2 answers
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • Is science fiction always set in the future
    14·1 answer
  • What is the inverse function of d(x ) = -2x - 6?
    11·1 answer
  • Communication is the transmission of messages to large audiences.
    14·1 answer
  • PLZZZ HELP!!! I’ll give brainliest
    12·1 answer
  • One reason it is important to write code that is readable is that
    8·2 answers
  • Simple Java programming
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!