1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
13

13.

Computers and Technology
1 answer:
xeze [42]3 years ago
7 0

Answer:

D. Pivot table

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

Generally, it is extremely difficult and considered to be a herculean task to understand, analyze and summarize data when they are raw and unorganized.

In order to overcome this challenge or hurdle, Microsoft inc. designed and developed Pivot tables and charts to avail end users the ability to visualize, understand, analyze and summarize data in its raw form.

Hence, Pivot table allows you to organize and summarize selected columns and rows of data in a spreadsheet to obtain a desired report. It is an in-built feature of the Microsoft Excel software application or program.

You might be interested in
The _____ approach treats process and data independently and is a sequential approach that requires completing the analysis befo
Solnce55 [7]

Answer:

C. Object Oriented

Explanation:

In Object Oriented approach to development of information systems, processes and data are handled independently and could be tested as separate modules before the actual development begin.

Hope this helps!

4 0
3 years ago
The maximum-valued element of an integer-valued array can be recursively calculated as follows: If the array has a single elemen
Tasya [4]

Solution :

#include <iostream>

using namespace std;

//Function Declaration

int max(int arr[],int size);

int main()

{

//Declaring variable

int size;

 

while(true)

{

cout<<"Enter the no of elements in the array :";

cin>>size;

if(size<=0)

{

  cout<<"Invalid.Must be greaterthan Zero"<<endl;

  continue;

  }

  else

  break;

  }

 

//Creating an array

int arr[size];

/* getting the inputs entered by

* the user and populate them into array

*/

for(int i=0;i<size;i++)

{

cout<<"Enter element#"<<i+1<<":";

cin>>arr[i];

}

//calling function

int maximum=max(arr,size);

//Displaying the output

cout<<"The maximum Element in the Array is :"<<maximum<<endl;

return 0;

}

/* Function implementation which finds

* the maximum element in the array and return it

*/

int max(int arr[],int size)

{

//Declaring the static variables

static int k=0,maximum=-999;

 

/* This if block will execute only if the value of k

* is less than the size of an array

*/

if(k==size-1)

{

   return arr[0];

  }

else if(size-1>k)

{

if(arr[k]>maximum)

maximum=arr[k];

 

//Incrementing the k value

k++;

 

//Calling the function

max(arr,size);

}

return maximum;

}

4 0
3 years ago
Which of the following is the term for software that automatically displays or downloads unwanted offers?
slega [8]
Adware. Adware displays ads and popups. The other options are completely different from each other
5 0
3 years ago
Write a program that solves the following problem:
Sedbober [7]

Answer:

def main():

   singleMarkerPrice = 0.80

   packageOfMarkersPrice = 3.50

   tax = 0.065

   shipping = 0.050

   userInput = int(input("How many markers do you want? "))

   amountOfPackages = 0

   singleMarkers = 0

   if userInput % 5 == 0:

       amountOfPackages = userInput / 5

   else:

       amountOfPackages = userInput // 5

       singleMarkers = userInput % 5

   # Just for syntax so if the single marker amount is one, it prints package instead of packages

   if amountOfPackages == 1:

       print("You have " + str(int(amountOfPackages)) + " complete package")

   else:

       print("You have " + str(int(amountOfPackages)) + " complete packages")

   # Just for syntax so if the single marker amount is one, it prints marker instead of markers

   if singleMarkers == 1:

       print("You have " + str(int(singleMarkers)) + " single marker")

   else:

       print("You have " + str(int(singleMarkers)) + " single markers")

   totalAmountBeforeTax = (amountOfPackages * packageOfMarkersPrice) + (singleMarkers * singleMarkerPrice)

   print("The total amount before tax comes out to " + str(float(totalAmountBeforeTax)))

   costOfShipping = float(round((totalAmountBeforeTax * shipping), 2))

   costOfTax = float(round((totalAmountBeforeTax * tax), 2))

   print("The cost of shipping is " + str(costOfShipping))

   print("The cost of tax is " + str(costOfTax))

   totalAmount = totalAmountBeforeTax + costOfShipping + costOfTax

   print("The total amount comes out to " + str(round(totalAmount, 2)))

main()

Explanation:

This should be correct. If it isn't let me know so I can fix the code.

6 0
3 years ago
You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
DedPeter [7]

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

8 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • What is the size of a typical business card?
    11·2 answers
  • HELPPP ASAPP
    8·2 answers
  • What feature should an administrator use to meet these requirements?
    8·1 answer
  • Which person would be the best fit for a career in the information technology field?
    14·1 answer
  • Saas provides services to an organization that requires the standard business process infrastructure such a CRM
    7·1 answer
  • Which command should you select to track changes in a document?
    9·2 answers
  • Google Analytics can collect behavioral data from which systems?
    6·1 answer
  • Study the sentence below
    13·2 answers
  • 6. By default,how the table headings are placed. (2 Points)
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!