A new, empty workbook that contains three worksheets (sheets).
a.Clear Worksheet
b.Blank Worksheet
c.Standard Worksheet
d.Unformatted Worksheet

Answers

Answer 1
D unformatted worksheet

Related Questions

raman will perform in pune tomorrow(simple past)​

Answers

Answer:

Raman performed in Pune yesterday

Answer:

Raman had performed in Pune

Which tab of the ribbon should you go to for removing gridlines on a worksheet?​

Answers

Answer:

just click on the option gridline

You should go to the Page Layout tab of the ribbon to remove gridlines on a worksheet.

This tab hold all the features and options that can enable you to arrange your documents as you want them to appear.

It can help you to do the following:

set marginstake control of the page orientationDisplay line breaksAdd sectionsSet paragraphs and also indent.

Read more on: https://brainly.com/question/11874395?referrer=searchResults

1) Who invented C Language.?
A) Charles Babbage
B) Grahambel
C) Dennis Ritchie
D) Steve Jobs​

Answers

Answer:

Dennis Ritchie is the answer

20.

Meter is to Kilometer as Gigabyte is to

?

... PINGULAR

A. Byte

B. Terabyte

C. Kilobyte

O D. Pedabyte

E. Megabyte

Previous

Answers

Answer:

Megabyte

Explanation:

Megabytes come before Gigabytes like how Gigabytes come before Terrabytes

While the Internet is used to share many useful services and information, there are growing concerns about the way that the Internet can be used to spread damaging information ranging from national secrets to calls for violence. Censoring this information may provide some people with increased security, but potentially risks free speech and the safety of social and political activists.

a. True
b. False

Answers

Answer:

A true!

Explanation:

Top-level domain identifies the type of organization. Which one does NOT belong?
Question 4 options:

.gov

.mil

.org

.cn

Answers

Answer:

.cn does Not belong the rest of them do belong

the answer is “.mil”.

Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1. How many check bits are necessary?2. Assuming we are using the Hamming algorithm presented to design our error-correcting code, find the code word to represent the 12-bit information word: 100100011010

Answers

Answer:

15

Explanation:

01234567891011121314

How many digits are there in a decimal system

Answers

Answer:

10

Explanation:

Answer:

4

Explanation:

Tenth , hundredth , thousandths , tenthousanths

Java Programming Using nested if statement For a student to be accepted in XYZ College, the student must meet the following requirements: GPA must be 3.75 or higher. Family income must be more than $60,000 Applicant must be a New Jersey resident. XYZ college asked you to write a program to implement the above requirements. Write the program using (nested if) Submit: Source code for the program (java file) Output word or pdf or jpg Design pseudocode pdf or word or jpg

Answers

Answer:

Follows are the solution to this question:

import java.util.*;//import package  

public class Main//defining a class

{

       public static void main(String[] ags)//main method  

       {

       float GPA;//defining floating point variable  

       int annual_income;//defining integer variable

       Scanner ga = new Scanner(System.in);//creating Scanner class object

       System.out.println("Enter GPA of student family : ");//print message

       GPA= ga.nextFloat();//input value from user-end

       System.out.println("Enter annual income of student family : ");//print message

       annual_income= ga.nextInt();//input value from user-end

      System.out.println("Is student resident of New Jersey(y/n) :");//print message

       char a=ga.next().charAt(0);//defining char variable to input char value

if(GPA>=3.75) //use if block to check GPA value

       {

        if(annual_income>60000) // use if to check annual income value

         {

            if((a == 'y'|| a== 'Y')) //use if to check char value

   System.out.println("Student accepted in college");//print message

            else//defining else block

             System.out.println("Student is not accepted in college because he/she not resident of New Jersey ");//print message

         }

        else//defining else block

          System.out.println("Student is not accepted in college because annual income is less than $60000 ");//print message

    }

   else//defining else block

    System.out.println("Student is not accepted in college because GPA is less than 3.75 ");//print message

       }

}

Output:

Please find the attached file.

Explanation:

Please find the attached file of the pseudocode.

In this code one integer, one float, and char variable "GPA, annual_income, and a" is declared, that uses the scanner class for accept value from the user-end, and in the next step, nested if the statement is used that checks the GPA value, annual_income, and a value and use the print method to print a value with the message.

what are layers in Photoshop ​

Answers

Answer:

Photoshop layers are like stacked pieces of stacked acetate. You can see through some parts because they are transparent. You can use layers to add on to your picture easily like adding extra images, text, or colors.

What is IP address ?explain​

Answers

Answer:

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.

Explanation:

IP addresses provide a way of doing so and form an essential part of how the internet works.

Answer: An Internet Protocol address is a number which is unique to. each device connected to the label. It is used for identification and location.  

Explanation:

a technique for printing text images or pattern which originated in china as a method for printing on paper​

Answers

Answer:

Woodblock printing or block printing is a technique for printing text, images or patterns used widely throughout East Asia and originating in China in antiquity as a method of printing on textiles and later paper. As a method of printing on cloth, the earliest surviving examples from China date to before 220 AD.

Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices. Online banking servers and their public Internet hosting would fall within which domains of security responsibility?

Answers

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

What is the major difference between the intranet and extranet?
Question 36 options:

Intranets hold more importance

The major difference between the two, however, is that an intranet is typically used internally.

Extranets improve internal communications

None of the above

Answers

Explanation:

The major difference between the two, however, is that an intranet is typically used internally.

The major difference between the intranet and extranet is that The major difference between the two, however, is that an intranet is typically used internally.

What is an Intranet?

Traditionally, an intranet is the concept of as a non-public and confined inner Web-primarily based totally web website online and/or community this is best handy to customers inside an organization.

An intranet is a non-public community contained inside an agency this is used to soundly proportion business enterprise facts and computing assets amongst employees. An intranet also can be used for operating in corporations and teleconferences. Intranets inspire communique inside an organization.

Read more about the communications:

https://brainly.com/question/26152499

#SPJ2

45. Our goals are a reflection of our:
O values
O standards
O obstacles
O resources
beliefs
values and beliefs

Answers

Values hope it helps you

HELPOO ILL GIVE BRAINLIEST

Answers

Answer:

e

Explanation:

giv brainilest :D

How many digits are in the binary number system? Explain why.

Answers

Answer:

Since there are only two digits in binary, there are only two possible outcomes of each partial multiplication: If the digit in B is 0, the partial product is also 0. If the digit in B is 1, the partial product is equal to A.

Explanation:

Answer:

two digits

Explanation:

Binary – The binary numbering system has a base of 2 (MOD-2) and uses only two digits a “0” and a “1” to represent a binary number value.

Say you have 3 computers. Compare the cost of replacing the modem with a router/modem. Include the brand as well as price. I can't answer questions about this as I don't know what to do

Answers

Answer:

Comparing the cost of replacing the modem with a router/modem and its need in day today changing life.

Explanation:

As you known modem devices develop at a very gradual pace, you can normally use a modem for months, until it breakdown, but you might need to substitute a router because you require a more reachable area. After all, you've joined more computers to your web and your old router isn't holding up, or because you need to take the support of the latest development.

Consider the following code segment, which is intended to simulate a random process. The code is intended to set the value of the variable event to exactly one of the values 1, 2, or 3, depending on the probability of an event occurring. The value of event should be set to 1 if the probability is 70 percent or less. The value of event should be set to 2 if the probability is greater than 70 percent but no more than 80 percent. The value of event should be set to 3 if the probability is greater than 80 percent. The variable randomNumber is used to simulate the probability of the event occurring.
int event = 0;
if (randomNumber <= 0.70)
{
event = 1;
}
if (randomNumber <= 0.80)
{
event = 2;
}
else
{
event = 3;
}
The code does not work as intended. Assume that the variable randomNumber has been properly declared and initialized. Which of the following initializations for randomNumber will demonstrate that the code segment will not work as intended?
A) randomNumber = 0.70;
B) randomNumber = 0.80;
C) randomNumber = 0.85;
D) randomNumber = 0.90;
E) randomNumber = 1.00;

Answers

Answer:

A) randomNumber = 0.70;

Explanation:

The code works perfectly for all values of randomNumber given in the options except option (a)

This is so because:

The first condition

if (randomNumber <= 0.70)  {  event = 1;  }

It checks if randomNumber is less than or equal to 0.70. This is true, so event is set to 1.

However, the next condition after it will also be executed because it is a different conditional to be executed.

So, we have:

if (randomNumber <= 0.80)  {  event = 2;  }

This condition is also true, so event is set to 2.

From the question randomNumber is meant to be event 1. However, this is different from the result of executing the code.

Hence, (a) is true

A header is printed in the _____ margin
(1)Top
(2)Bottom
(3)Side
(4)both a and b ​

Answers

Answer:

(1)Top

Explanation:

Bcoz it is header

A header can be printed on the top margin.

What is a header?

A part of a text in the line that is generally used to describe the title or the topic of the text contained below such line is known as a header. It is represented in the top margin, as a title can be written on the bottom side.

Hence, option A holds true regarding a header.

Learn more about a header here:

https://brainly.com/question/15163026

#SPJ2

If Mark has a read-write permission to the share \\fileserver\securefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform which action?

a. Rename the file.
b. Read the file.
c. Change the contents of the file.
d. Delete the file.

Answers

Answer:

I don't know  you should figure that out good luck

Explanation:

good luck

7 steps in infographic design​

Answers

Answer:

Step 1: Choose your topic and research your audience. Before looking at your data, think about a topic and an audience with whom it can resonate.  

Step 2: Take a look at your data and consolidate it.  

Step 3: Craft the copy.  

Step 4: Design!  

Step 5: Review, review, review.

Step 6: Publish and promote.  

Conclusion.

Explanation:

Process infographics are a specific type of infographic, designed to visualize, summarize and simplify processes. They're perfect for visualizing marketing strategies, new employee onboarding, customer journey maps, product guides, recipes and more.

how can you best explain server side caching with web pages​

Answers

Answer:

Server side web caching typically involves utilizing a web proxy which retains web responses from the web servers it sits in front of, effectively reducing their load and latency.

Explanation:

Write a program that uses while loops to perform the following steps:

a. prompt the user to input two integers: firstNum and secondNum
b. Output all odd numbers between firstNum and secondNum.
c. Output the sum of all even numbers between firstNum and secondNum.
d. Output the number and their squares between 1 and 10
e. Output the sum of the square of the odd numbers between firstNum and secondNum.
f. Output all uppercase letters.

Answers

Answer:

Explanation:

//Include the required header files.

#include<iostream>

using namespace std;

//Define the main function.

int main()

{

//Define the variables.

int i, sum = 0, sqSum = 0, firstNum = 1, secondNum = 0;

char ch;

//Check for valid input.

while (!(firstNum < secondNum))

{

cout << "Enter starting number: ";

cin >> firstNum;

cout<<"Enter ending number(must be > startingNumber): ";

cin >> secondNum;

}

//Store first number in i

i = firstNum;

//Dispaly the number.

cout << "The odd numbers between " << firstNum

<< " and " << secondNum << " are:\n";

//Iterate between first and second number.

while (i <= secondNum)

{

//Check for even numbers.

//Store the sum

if (i % 2 == 0)

sum = sum + i;

//Print the odd numbers

//Evaluate the square of sum of odd number.

else

{

cout << i << " ";

sqSum = sqSum + i * i;

}

//Increase the value of i.

i++;

}

//Dispaly the sum of even numbers.

cout << "\n\nThe sum of the even numbers is:"

<< sum << endl << endl;

//Dispaly the sum of square of odd number.

cout << "The sum of squares the odd numbers is:"

<< sqSum << endl;

//Set i to 1.

i = 1;

//Dispaly the message.

cout << "\nNumber Square\n";

//Iterate and print number between 1 andd 10

//along with the sum.

while (i <= 10)

{

cout << " " << i << "\t " << i * i << endl;

i++;

}

//USe for visual studio.

system("pause");

//Return the value 0.

return 0;

}

Explanation:

The program code will perform the function listed below using loop.

Prompt the user to input two integers: firstNum and secondNum (firstNum must be less than secondNum). Output all odd numbers between firstNum and secondNum. Output the sum of all even numbers between firstNum and secondNum. Output the numbers and their squares between 1 and 10. Separate the numbers using any amount of spaces. Output the sum of the square of the odd numbers between firstNum and secondNum. Output all uppercase letters.

Hope this helps!

Word processing package allow users to?

Answers

Explanation:

allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it. 

What is a boot sector

Answers

Explanation:

A boot sector is the sector of a persistent data storage device which contains machine code to be loaded into random-access memory and then executed by a computer system's built-in firmware. Usually, the very first sector of the hard disk is the boot sector, regardless of sector size and partitioning flavor.

1. ERICUS Company sells Ghacem cement at 30.0 Ghana Cedis per bag. The company however gives discount of 15% for customers that buy 100 or more bags, and 0% for customers that buy less than 100 bags. Write a pseudocode.

Answers

See Comment for complete question

Answer:

Input Bags

Discount = 0%

If Bags >= 100 Then

Discount = 15%

End If

Print Discount

Stop

Explanation:

This gets the number of bags bought

Input Bags

This initializes the discount to 0%

Discount = 0%

If the bags of cement bought is 100 or above

If Bags >= 100 Then

This discount becomes 15%

Discount = 15%

This ends the if statment

End If

This prints the discount percentage

Print Discount

This ends the pseudocode

Stop

What can you use to make sure that you have no errors in Word Online?

Answers

Answer:

You can use grammarly. It woks amazingly!

Explanation:

8.11 LAB: Contact list (C++)









A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name.


Ex: If the input is:


3 Joe 123-5432 Linda 983-4123 Frank 867-5309

Frank

the output is:


867-5309


Your program must define and call the following function. The return value of GetPhoneNumber is the phone number associated with the specific contact name.

string GetPhoneNumber(vector nameVec, vector phoneNumberVec, string contactName)


Hint: Use two vectors: One for the string names, and the other for the string phone numbers.

Answers

Answer:

The vectors and phone numbers are 123-5432-983-4123-867-5309

Explanation:

Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​

Answers

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

Answer:

system and information integrity

Explanation:

i got a 100 on the test

Other Questions
A(n) ____________________ has a rectangular shape and contains a cell wall, chloroplasts, and one large vacuole. A small container, typically cylindrical and made of glass, used especially for holding liquid medicines PromptTortillas Read through the following paragraph about tortillas. Although it is in Spanish, try to get the main idea of the paragraph. Finally, answer the questions below. Always do your best!La tortilla de maz es considerada una de las comidas principales de Mxico y unos pases de Amrica Central. Se hace la masa para tortillas por mezclar la harina de maz, agua, aceite y sal. De ah, la masa es aplanada y se le da forma a mano o usando una tortillera elctrica o manual. La masa es cocida despus en un comal caliente (disco de barro o de metal) o a la plancha. Se comen tpicamente en cada comida. flour oil flattened cooking plate grill1. Cierto o Falso- Tortillas are popular in Mexico and various countries of Central America.2. Cierto o Falso- Tortillas can be made by hand or with a tortilla press.3. Cierto o Falso- Tortillas are eaten for special occasions only. Connections: Have you ever eaten corn tortillas? If so, did you like them? What did you eat them with? If not, do you think you would like to try some? Do you know of other types of tortillas? What kinds? Do you have a special food that is eaten commonly in your country or culture? What is it? The point (2, 18) is an ordered pair in a proportional relationship. What equations represents this relationship?y = 1/9xy = 18xy = 9xy = 2x The Chinese had a toy helicopter some 1000 years ago. True Or False ? PLS HELP WILL GIVE BRAINLIEST!! Identify this set of lines as parallel, perpendicular, or neither. The political affiliation of Chiles president in 1970, Salvador Allende, is best described as liberal. conservative.communist.socialist. 0.05 is blank of 0.5 Maria bought 14 oranges. Each orange weighed 0.44 pound.How many pounds of oranges did Maria buy? M technician a says a sway bar is used to control body lean when cornering. Technician b says that adding additional leafs to a leaf spring increases its capacity 3t + 7 = 2 +5t , then find the value of t. This also came with it :Complete the table for the following function:Y = 8x - 5Please help me and dont mind my work I did on the side im pretty sure I got it wrong. A pizzeria charges $8 for a large cheese pizza plus $2 for each additional topping.m = ______ b = ______ cmo se expresa en notacin cientfica 1254 Solve the following inequality 20 Which graph shows the correct solution? 27 28 29 30 31 32 33 34 35 36 37 + + + 27 28 29 30 31 32 33 34 35 36 37 1 5 8 9 10 11 12 13 + 3 1 + + 6 7 L. 8 9 10 11 12 13 WILL GIVE BRAINLIEST Choose the best revision of this sentence without changing its original meaning.Acuzena made an absolute guarantee to complete her project by the due date.A) Luckily, Acuzena finished her project on time. B) Acuzena guaranteed to complete her project by the due date. C) Acuzena made an absolute guarantee to complete her project by the deadline. D) Acuzena absolutely guaranteed completion of her project by the stated due date. In OPQ, o = 5.2 inches, p = 8.4 inches and q=8.7 inches. Find the measure of Q to the nearest 10th of a degree. sec^-1(1) find exact value Se le llama as a las sustancias que se ionizan al disolverlas en agua: What is the best approach to safety? (i.e. It is easier to _____ than to treat)(Body Mechanics and Safety Review) (Health Science)