1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
2 years ago
6

¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee

Computers and Technology
1 answer:
dem82 [27]2 years ago
6 0

Answer:excel

Explanation:

You might be interested in
Write a program in python to make the figure:-
gregori [183]

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

5 0
3 years ago
__________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
lbvjy [14]

Answer:

Business Intelligence

Explanation:

The approach uses tools to access & analyze data sets and present analytical findings in reports, summaries, dashboards, maps, charts and graphs to provide users with detailed intelligence about the state of the business.

Business intelligence uses softwares and services to convert data into actionable insights that inform an organization’s strategic and tactical business decisions.

6 0
3 years ago
Draw a datapath that can perform the following set of register replacement and combinational operations. Assume all registers ar
Paladinen [302]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the step by step solution to the question above above.

5 0
3 years ago
Which composer below was not part of the classical period? <br> A. Beethoven B. Bach<br> C. Mozart
castortr0y [4]

Explanation:

B. Bach

Thanks for your point

3 0
3 years ago
What is the name of the virus that appears to be a legitimate program?
timurjin [86]
A virus or malware appearing/pretending to be a legitimate program is called a Trojan. 
3 0
3 years ago
Other questions:
  • Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
    6·2 answers
  • ____ is an object-oriented programming language from Sun Microsystems which allows small programs called applets to be embedded
    13·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • Design a full adder circuit using NAND gates only (input : A, B, Cin and output = S, Cout).
    5·1 answer
  • Clasifica los documentos comerciales en activo, pasivo o patrimonial para cada operacion:
    14·1 answer
  • They are correct? thank you!
    6·2 answers
  • Here is something cool
    5·2 answers
  • St. CHarles school's music community is organizing a fundraiser. They want to create a simple but attractive website. However, t
    7·1 answer
  • Which device allows users to directly hear data from a computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!