1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
13

Although it is not a term Excel uses, how do most people think of Excel?

Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
3 0

They think of it as a spreadsheet

You might be interested in
import java.util.Scanner; public class TeenagerDetector { public static void main (String [] args) { Scanner scnr = new Scanner(
Sonja [21]

Answer:

import java.util.Scanner;

public class TeenagerDetector {

   public static void main (String [] args) {

       Scanner scnr = new Scanner(System.in);

       boolean isTeenager;

       int kidAge;

       kidAge = scnr.nextInt();

       

       /* Your solution goes here */

       isTeenager = (kidAge >= 13) && (kidAge <= 19);

       if (isTeenager) {

           System.out.println("Teen");

           

       } else { System.out.println("Not teen"); } } }

Explanation:

A condition which check for the teenager age and return a boolean is assigned to isTeenager.

isTeenager = (kidAge >=13) && (kidAge <= 19);

So, if the kidAge is greater than/equal to 13 and less than/19, the boolean isTeenager will be true and the program will output "Teen" else "false" will be output.

The range of age for a teenager is 13 - 19.

5 0
4 years ago
Read 2 more answers
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
SIZIF [17.4K]

lst = input().split()

lst.pop(0)

w = lst[-1]

lst.pop(-1)

newlst = [int(x) for x in lst if int(x) <= int(w)]

print(newlst)

This works for me. Best of luck.

6 0
3 years ago
If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on
Llana [10]
You must have an administrator password before you can access the drive <span />
5 0
4 years ago
A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.
RideAnS [48]

Answer:

Application Programming Interface.

Explanation:

Application Programming Interface(API) is a collection of function, routines, procedures and the protocol which are used create a software application.The main role of API is that it defined or specified how the components of software will interact.

The objective of the Application Programming Interface that it the manufacturer or develop software that is running on system or device. The advantage of using the Application Programming Interface is that we can develop a better program in a very manner by using the API.

5 0
4 years ago
You are the IT security administrator for a small corporate network. Due to some recent restructuring, Corey Flynn (flynn) no lo
astra-53 [7]

Explanation:

The said action sof removing cflynn from HR group and keeping in other can be done by following;

First open the command prompt, type user group name of cflynn. Upon pressing enter a list of all group in which cflynn belongs would be displayed.

We see that Cflynn belong sto mgmt1 group

Now to change its status in this group; Type usermod -G mgmt1,it cflynn and press Enter to take out cflynn from this group

To keep him in other groups, type the usermod -G command enlisting all groups to which cflynn must belong.

5 0
4 years ago
Other questions:
  • Fibre channel switched networks rely on the concept of a ___________________which is a fundamental concept in how the network wo
    10·1 answer
  • At what two layers of the osi model are lan and wan protocols likely to differ??
    7·1 answer
  • Which of the following is a bad password? Select one: a. The acronym for the title of your favorite song plus the year it came o
    11·1 answer
  • What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over
    7·1 answer
  • __________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
    6·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • 1. Build and test D-type Flip-Flop using a built-in SR flip-flop.
    12·1 answer
  • p25: File Write and Read1) User enters a file name (such as "myMovies.txt").2) User enters the titles of 4 of their favorite mov
    12·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    6·1 answer
  • I neeed help pleaseeee
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!