1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
5

Spreadsheet software can be used to do all the following except _____.

Computers and Technology
2 answers:
jenyasd209 [6]3 years ago
6 0
Open a savings account
Rom4ik [11]3 years ago
5 0

Answer

open a savings account

Explanation

A spreadsheet is a software that is designed for the purpose of making calculations, organizing information and making comparisons and it contains rows and columns. This software can also be used to create a budget ,calculate your net worth  and create a graphs. It also helps in helping to sort data,arrange it easily and in calculation of numerical data.

You might be interested in
What X coordinate does the center of a game begin at?
kotegsom [21]

A. 0

I am not entirely sure, I am not much of a coder(well I am but I don’t code often) so I hope this helps!

5 0
3 years ago
Create a timeline of the evolution of computers.<br><br> Doesn’t have to be extra or super detailed
dalvyx [7]

Answer:

The computer was born not for entertainment or email but out of a need to solve a serious number-crunching crisis. By 1880, the U.S. population had grown so large that it took more than seven years to tabulate the U.S. Census results.1937: J.V. Atanasoff, a professor of physics and mathematics at Iowa State University, attempts to build the first computer without gears, cams, belts or shafts.1943-1944: Two University of Pennsylvania professors, John Mauchly and J. Presper Eckert, build the Electronic Numerical Integrator and Calculator (ENIAC). Considered the grandfather of digital computers, it fills a 20-foot by 40-foot room and has 18,000 vacuum tubes.1985: Microsoft announces Windows, according to Encyclopedia Britannica. This was the company's response to Apple's GUI. Commodore unveils the Amiga 1000, which features advanced audio and video capabilities.2006: Apple introduces the MacBook Pro, its first Intel-based, dual-core mobile computer, as well as an Intel-based iMac. Nintendo's Wii game console hits the marke

Explanation:

8 0
3 years ago
Read 2 more answers
Select the true statement from those listed below. Java applets may be contained in files with the .class extension Java applets
tiny-mole [99]

Answer:

The correct option of the following question is the Java applets may be contained in the files with .class extension.

Explanation:

JAVA is the Programming Language that can used to create the complete applications which may be run on the single computer or can be distributed among the servers and the clients in the network.

An applet is Internet-based programs that are written in the Java programming language, which is the programming language for Web and it can be downloaded by any of the computers. An applet is also run in the HTML. It is usually embedded in the HTML page on the Website and it can be executed from the browser.

5 0
3 years ago
Here is the list of problems to choose from:
olya-2409 [2.1K]

Answer:

There's a parking lot that is 600m² big. The lot must be able to hold at least 3 buses and 10 cars.

Each car takes up 6m² and each bus takes up 30m².

However, there can only be 60 vehicles in the lot at any given time.

The cost to park in the lot is $2.50 per day for cars and $7.50 per day for buses. The lot must make at least $75 each day to break even.

What is a possible car to bus ratio that would allow the lot to make profit?

3 0
3 years ago
TCO B) Which of the following is a correct statement? (Points : 8)
melamori03 [73]
The first one, "<span>A </span>SYN flood<span> is a form of denial-of-service attack in which an attacker sends a succession of </span>SYN<span> requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic." </span>
5 0
3 years ago
Other questions:
  • The method of transferring data one word at a time from the CPU to a device is called
    7·1 answer
  • Which keyboard command can be used to delete an image from one slide while adding it to the clipboard so that it can be added in
    5·2 answers
  • How much do taxis coast?
    14·2 answers
  • Write a method called evenBeforeOdd that accepts an array of integers and rearranges its elements so that all even values appear
    15·1 answer
  • Assignment 1 silly sentences
    12·1 answer
  • Write a method that returns the sum of all the elements of an array of ints that have an odd index.
    5·1 answer
  • During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
    9·1 answer
  • How much money did Uta initially invest?$180.00$320.00$352.48$471.70
    14·1 answer
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
  • You're asked to recommend potential data structures to use as the backing for implementing Kruskal's algorithm. Which of the fol
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!