1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
7

Lotus 1-2-3 allows the user to record, compare, and organize data. It is often used for creating budgets, tracking sales, and ma

naging bank accounts. What kind of software is Lotus 1-2-3?
Computers and Technology
1 answer:
Anvisha [2.4K]3 years ago
5 0
It is a spreadsheet document or software
You might be interested in
Write a loop to output the word EXAM 99 times
worty [1.4K]

Answer:

Following are the answer for the given question

for(int i=1;i<=99;++i) // for loop

{

cout<<"EXAM"<<endl; // display the word EXAM

}

Explanation:

In this question we using for loop which is iterating 99 times and print the

word "EXAM  " 99 times.

The variable i is initialized by 1 and check the condition if the condition in loop  is true it will execute the loop and print "EXAM" .The loop will executed 99 times when the condition in loop is false then loop become terminated.

Following are the program in c++

#include<iostream>// header file

using namespace std;

int main() // main method

{

for(int i=1;i<=99;++i) // for loop

{

cout<<"EXAM"<<endl; // display the word EXAM

}

   return 0;

}

3 0
3 years ago
You're an administrator for a large corporation and you are responsible for deploying computers often and quickly. What server d
fomenos

Answer: it used the keyboard and apps

6 0
3 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
A case competitions database:You work for a firm that has decided to sponsor case competitions between teams of college business
Strike441 [17]

Answer:

We will ned (4) four tables.

Explanation:

For the given scenario we will have to build a relational database. The database will have four tables i.e. Competation, Collage, Team and student.

For each table the database fields are mention below. Note that foreign keys are mentioned in itallic.

Competition:

Competition_ID, Competition_Name, Competition_Data, Competition_Name _of_Branch, <em>College_ID</em>

<em />

Collage:

Collage_ID, Collage_Name, Collage_Contact, Collage_address

Team:

Name, Color, <em>Team_ID, College_ID, Competition_ID</em>

<em />

College:

Student_ID, First_Name, Last_Name, Date_of_Birth, Major, Expected_Gradiuation_Date, <em>Collage_ID, Team_ID, Competation_ID</em>

3 0
3 years ago
Question of Computer science​
PtichkaEL [24]

Answer:

a)None

b)All

this is ur answer from my opinion

5 0
3 years ago
Other questions:
  • Mike is reading about machine-dependent programming languages. Which languages are machine-dependent programming languages?
    11·1 answer
  • A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through
    13·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • A lottery ticket contains five unique numbers. A set of unique numbers does not contain repeated elements. The winning combinati
    10·1 answer
  • The process of identifying and eliminating bugs in a software program is most generally called
    5·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • O O O O O O O
    9·1 answer
  • Your task is to implement a function replace_once(t, d), that takes a text t and a replacement dictionary d, and returns the res
    10·1 answer
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • Hardware is found outside the system unit.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!