1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
7

Lotus 1-2-3 allows the user to record, compare, and organize data. It is often used for creating budgets, tracking sales, and ma

naging bank accounts. What kind of software is Lotus 1-2-3?
Computers and Technology
1 answer:
Anvisha [2.4K]3 years ago
5 0
It is a spreadsheet document or software
You might be interested in
Negative numbers are encoded using the __________ technique. a. two’s complement b. floating point c. ASCII d. Unicode
OLEGan [10]

Negative numbers are encoded using the two’s complement technique. Two's complement is used to encode negative numbers.

Option  A is correct .

<h3>What method does the in data type use to store negative numbers?</h3>

Most implementations you're likely to encounter store negative signed integers in a form known as two's complement. Another important way of storing negative signed numbers is called one's complement. The one's complement of an N-bit number x is basically defined as x with all bits inverted.

<h3>What is encoding method?</h3>

An encoding technique is the application of established industry conventions to a coded character set to create a coded character scheme. Such rules determine the number of bits required to store the numeric representation of a given character and its code position in the encoding.

Learn more about two complement technique encoding :

brainly.com/question/26668609

#SPJ4

5 0
1 year ago
Which of the following is true of equilibrium? *
SashulF [63]
B, it’s when the supply and demand are equal
7 0
3 years ago
What type of address do computers use to find something on a network?
Leona [35]
An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions host or network interface identification and location addressing which can help you a lot.
6 0
3 years ago
Select the answer that best describes the activity
Anastasy [175]

Answer:

software piracy

Explanation:

8 0
3 years ago
Read 2 more answers
Microsoft edge A. Is a newer version of internet explorer B. Works well with safari C. Was designed for apple products D. Is a s
Natali5045456 [20]

Answer: A

Microsoft Edge is a replacement of IE, which is exclusively for Windows 10. Originally named Trident when in development, it was changed to Edge.

It is not for mac, so cross off b and c.

D is definitely wrong, so cross it off.

6 0
4 years ago
Read 2 more answers
Other questions:
  • HELP ASAP!! Ohms law homework
    11·1 answer
  • A standard science experiment is to drop a ball and see how high it bounces. Once the bounciness of the ball has been determined
    10·1 answer
  • A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100; Course IS​ 101,
    15·1 answer
  • An application server is used to communicate between a Web server and an organization's back-end systems.
    6·1 answer
  • A plaintiff can bring a claim for intentional infliction of emotional distress when all but which of the following takes place:
    9·2 answers
  • Alisa Miller claims that today's college graduates:
    7·1 answer
  • The index used by the OS to manage computer files is called _____.
    13·2 answers
  • For what specific purpose is the TM9400 P25 Mobile designed? What is the benefit of having a mobile communications device that a
    10·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    14·1 answer
  • Select the correct answer.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!