Alina needs to e-mail an Excel spreadsheet to a colleague. What is the best method to send the file if she does not want the colleague to easily make changes to the original file?

selecting Send Using E-mail and sending a link
selecting Send Using E-mail and sending as a PDF
selecting Send Using E-mail and sending as an attachment
selecting Send Using E-mail and sending as a published document

Answers

Answer 1

Answer:

B

Explanation:


Related Questions

PLEASE HURRY!!!
Look at the image below!

Answers

The correct answer is overweight

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Answers

Answer:

Traffic padding

Explanation:

Traffic padding is a way of inserting draw randomly in such a manner that it would be difficult to make traffic analysis by any intruder. It hides the traffic pattern through the insertion of dummy traffic into the network and then the intruder sees it as a different traffic pattern. But what the intruder observes is a cover mode which actually hides the systems real operation mode.

: process that monitors system traffic and adds resources as needed, within set limits


: process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource


: process to determine what volume a system can handle by comparing its performance to standards in the industry

Answers

Process that monitors system traffic and adds resources as needed, within set limits : Auto scaling

Process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource:  Load balancing

Process to determine what volume a system can handle by comparing its performance to standards in the industry : Benchmarking

What is performance?

Performance is the measure of how effectively a particular task is done or in other words maximum output can be obtained from the input.

The process which monitors system traffic and adds resources as needed, within set limits is called as Auto scaling.

Process that allocates tasks to resources to increase efficiency and avoid overloading any one resource is known as Load balancing.

Process to determine what volume a system can handle by comparing its performance to standards in the industry termed as Benchmarking.

Thus, all the terms are defined.

Learn more about performance.

https://brainly.com/question/15466511

#SPJ2

define operating system

Answers

Answer:

the software that supports a computer's basic scheduling tasks.

Answer:

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Explanation:

A variables _____is the part of the program that has access to the variable

Answers

Answer to this is scope

Answer:

A variable's scope is the part of the program that has access to the variable.

The Apple iPhone includes a settings menu where you can toggle various accessibility options on or off:
Bold Text
oo
Button Shapes
What is the minimum number of bits that can represent those 2 options?

Answers

The minimum amount of bits that can represent these two options is 2 bits.

The minimum amount of bits that can represent the two options is 2 bits.

What are accessibility options?

This is known to be the various accessibility features such as text-to-speech, etc. that can be found on any system or mobile phones.

Conclusively, there is the use of these features in a lot of technologies as it serves as  assistive technology. Note that lowest amount of bits that can represent these two options above is 2 bits as that is the only lowest point it can go.

Learn more about bits from

https://brainly.com/question/19667078

Suppose your user entered a weight of 115.6. What will be the result of the following code?

strWeight = input("Enter your weight in pounds: ")
weight = int(strWeight)
print (weight)

115

115.6

116

An error occurs.

Answers

The answer is 115.

An integer cannot contain decimals points and it rounds down to the nearest whole number.

Answer:

An error occurs.

Explanation:

Answer on edge 2020

Which type of competition features many firms, some variety of goods, low barriers to entry, and little control over prices?

Answers

Answer:

Monopolistic competition

Monopolistic competition is characterized by many firms, some variety in products, few barriers to entry, and little control over prices.

Explanation:

Answer: pure competition

Explanation:

write a program to find whether the given number of three digits is an integer such that the sum of the cubes of its digits is equal to the number itself. For example, 371 is since 3**3 7**3 1**3

Answers

Answer:

Written in Python

userinp = int(input("Input: "))

strinp = str(userinp)

total = 0

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

if userinp == total:

    print("True")

else:

    print("False")

Explanation:

This line prompts user for input

userinp = int(input("Input: "))

This line converts user input to string

strinp = str(userinp)

This line initializes total to 0

total = 0

The following iteration sums the cube of each digit

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

This if statement checks if the sum of the cube is equal to the user input

if userinp == total:

    print("True") This is executed if true

else:

    print("False") This is executed if false

Write a function convert (int n, int base) that uses stack to convert a positive integer n to any base between 2 and 9. You may use simple iteration continually divides the decimal number by base and keeps track of the remainder by using a stack. Please use the methods from ADT Stack below. Write a program to test your function.

Answers

Answer:

import java.util.*;

public class DemoStack {

  public static void convert(int n, int base) {

      Stack<Integer> st = new Stack<Integer>();

      int temp = n ;

      while(n !=0) {

         st.push(n % base);

         n = n / base ;

      }

      System.out.printf("The number %d in base %d : ", temp, base);

      while(!st.isEmpty()) {

          System.out.print(st.pop());

      }

  }

  public static void main(String{} args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter number : ");

      int n = sc.nextInt();

      System.out.print("Enter base : ");

      int base = sc.nextInt();

      convert(n, base);

  }

}

Explanation:

Code is written in JAVA.

This code displays:

1) Enter number : 'x'

2) Enter base : 'y'

3) The number 'x' in base 'y' : abcdefg

The stages in the testing process in order are: ___________

a. Customer testing
b. System testing
c. Component testing.

Answers

I’m pretty sure the answer is B

Answer:

The stages in the testing process in order are: ___________

c. Component testing

b. System testing

a. Customer testing .

Explanation:

The first test is the component test (unit test) when the different components of a software are tested by the system developers to measure the individual components are working properly as intended.  This is closely followed by the System testing, usually conducted by the Project Manager.  Finally, the user or customer testing is conducted to ensure that user requirements are met.  It is also called the acceptance test.

Generally, testing is the process of evaluating a system or its component(s) with the intention to finding whether it satisfies the specified user requirements or not.  Testing executes a system in order to identify any gaps, errors, or missing requirements when compared to the actual user requirements.

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways

Answers

Answer:

Access control tools

Explanation:

Access control tools are used to enforce security measures in the use of computers and computerized systems. These tools ensure that unauthorized people are not allowed to get access to systems or certain places.

Passwords, biometrics, and security tokens are some means that help to regulate access to reserved places and systems. These tools evaluate the identity of users authenticate them and either grant or deny them access to the sites they wish to gain entrance to.

How many keys are required, if you are to ensure a secret communication for every possible pair of communicating parties

Answers

Answer:

7140 pairs of key

Explanation:

In calculating the number of pairs of keys required, the formula to be used is

n * (n−1) / 2

So for example, if we're to consider 120 users. This means our n is 120, and thus applying it in the formula would yield the calculation

120 * (120-1) / 2 =

120 * 119 / 2 =

14280 / 2 =

7140 key pairs.

Therefore, we boldly state that be number of pairs of key required is 7140

Which programming language hides the complexity of data objects and provides a simplified interface?
A.
machine language
B.
assembly language
C.
procedural language
D.
object-oriented language
E.
RAD

Answers

Answer:

D. Object-Oriented Langauge

Explanation:

Answer:

Your answer is D!

Explanation:

From PLATO!

Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack.

Answers

Normally, the attack comes from an intruder who already studied the victim's behavior.

> The attacker can create a database from the history of browsing of the possible victim and then create an attack based on the victim's behavior of browsing.

> If the attacker has access to the user directory he can put the executables files in those folders.

> If the wi-fi is not secured, the attacker can check the network in order to spread a possible worm.

It is possible to see that are several ways which the attacker can use in order to obtain more information from the victims. But that depends on how deeply the attacker studied the victim.

If an  attacker had watched the behaviors of the users on the computer and has plans to attack, they can:

What is an intruder in cyber security?

The person called an Intruder is known to be a kind of online vulnerability scanner that is said to be a form of cyber security weaknesses that a person may have an exposed systems and  data breaches.

Learn more about attacker from

https://brainly.com/question/24956493

(100 Points!)
The ___ search engine is the most common in use today.
A Boolean-based
B Crawler-based
C algorithm-based
D government-based

Answers

Answer:

B

Explanation

just did it on egd 2020

Answer:

Crawler-based

Explanation:

Just took the review

Question #3
Dropdown
What type of data is the result of each of the following lines of code?

str(2.34)
O float
O this causes an error
O int
O string

int('2')
O float
O this causes an error
O int
O string

float(2)
O float
O this causes an error
O int
O string

Answers

Answer:

string, int, float

Explanation:

just took it. have a good one!

Answer: string, int, float

Explanation: got it right on edgen

Write C11 statements that accomplish the following. (6, 7) a. Declare int variables x and y. Initialize x to 25 and y to 18

Answers

Answer:

int x, y;

x = 25;

y = 18;

Explanation:

Programming language: C++

This line declares both variables

int x, y;

This line initializes x to 25

x = 25;

This line initializes y to 18

y = 18;

Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (knowledge)

Answers

Answer:

In the clarification section following, the definition of the query is mentioned.

Explanation:

I acknowledge with maybe some opponents that patent security has gone too far. As tech manufacturers say, they already lost a lot of money in future sales in developed countries owing to software piracy. In reality, most consumers living in developed countries also couldn't manage to spend the rates set by certain tech firms, so firms did not lose any actual sales because, even in some developing countries, their pricey tech would essentially not sell mostly on the free market.So then, due to the extremely insufficient need for individuals, the consequences for creativity and competitiveness in the computing industry are restricted. Only the owners of copyright as well as the users with the resources to manage to offer for the pricey software have the opportunity to use it, as both a consequence of increasingly innovating, the market is restricted and weak.We ought to defined as the tendency doctrines: equal use as well as the first sale, to reach an acceptable compromise between someone who has legitimate rights to confidential information against common people who want to view, distribute, and interact the information. The first selling happens after the artist's concept has indeed been purchased out during the first occasion, during which stage the rightful owner loses ownership of the act's work.

In recent times, innovators including adversaries have focused on the use of reverse engineering, supported either by the reasonable-use doctrine of both the copyright Act.

write a function that will prompt the user for his/her age, // weight, and midicholrean count. Then calculate and return their // jedi level (returns a double). Remember to assign the retuned value // to the variable 'jedi_level'.

Answers

Answer:

Explanation:

Assuming that the jedi_level is calculated by adding the age and weight of the individual and then dividing by the midicholrean count we can use the following Java function to grab all the required info from the user and calculate and return the jedi_level.

public static double JediLevel () {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter age: ");

           double age = in.nextDouble();

           System.out.println("Enter weight: ");

           double weight = in.nextDouble();

           System.out.println("Enter midicholrean count: ");

           double midi = in.nextDouble();

           double jedi_level = (age + weight) / midi;

           return jedi_level;

       }

Suppose there are two links between a source and a destination. The first link has transmission rate 50 Mbps and the second link has transmission rate 10 Mbps. If the only traffic in the network comes from the source, what is the throughput for a large file transfer?

Answers

Answer:

10 Mbps

Explanation:

In this situation, the throughput for a large file transfer would be 10 Mbps. This is because in situations where there are more than one entries going into a single destination the throughput will be the lowest transmission rate as this rate would be the one that is bottlenecking the entire transfer. That is because the other links would be able to handle the speed of the lowest transmission rate but the lowest rate cannot handle the speeds of the other links, thus limiting the throughput.

Which feature transfers a slide show into a word-processing document?
O Video from Website
O Broadcast Slide Show
O Create Handouts
O Format Painter
Hurry
I need help

Answers

Answer:

Create Handouts

Explanation:

Answer:

C    Create Handouts

Explanation:

IM JUST BUILT DIFFRENT

When Nico di Angelo met Mr. D he talked on and on about what?

Answers

Answer:

his mythologic game

Explanation: idk i think

Answer:

The first time he met Mr. D, he called him "The Wine Dude", which irritated the god, but he forgot about it soon after as Nico complimented him.

Within the the Assignment05.java file, you must define the following static methods. In the main method, you may program any code that wish to test the methods you have been asked to define.
1) Write (define) a static method named displayGreeting, that takes no arguments and returns no value. When this function is called, it should print the text "Hello, and welcome!".
Example:
displayGreeting() will print Hello, and welcome!
2) Write (define) a static method named displayText, that takes a single String argument and returns no value. When this function is called, it should print the value of the argument that was passed to it.
Examples:
displayText("Hello") will print Hello
displayText("123") will print 123
displayText("abc" + "123") will print abc123
3) Write (define) a static method named printTotal, that takes three int arguments. When this function is called, it should print the sum of the three arguments passed to it. This function should return no value.
Examples:
printTotal(0, 0, 0) will print 0
printTotal(0, 1, 3) will print 4
printTotal(100, 23, 2) will print 125
4) Write (define) a static method named getTotal, that takes three int arguments. When this function is called, it should return the sum of the three arguments passed to it as an int.
Examples:
getTotal(0, 0, 0) will return 0
getTotal(0, 1, 3) will return 4
getTotal(100, 23, 2) will return 125
5) Write (define) a static method named getAverage, that takes three int arguments. When this function is called, it should return the average of the three arguments passed to it as a double.
Examples:
getAverage(0, 0, 0) will return 0.0
getAverage(0, 1, 3) will return 1.33333...
getAverage(100, 13, 7) will return 40.0
6) Write (define) a static method named averageLength, that takes three String arguments. When this function is called, it should return the average length (number of characters) of the String arguments passed to it as a double.
Examples:
averageLength("a", "abc", "ab") will return 2.0
averageLength("hello", "goodbye", "monday") will return 6.0
averageLength("wednesday", "tuesday", "monday") will return 7.33
7) Write (define) a static method named lengthOfShortest, that takes two String arguments. When this function is called, it should return the length (number of characters) of the shortest String argument passed to it as an int.
Examples:
lengthOfShortest("abc", "ab") will return 2
lengthOfShortest("hello", "goodbye") will return 5
lengthOfShortest("thursday", "friday") will return 6
8) Write (define) a static method named stringOfStars, that takes one String argument. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument passed to it.
Examples:
stringOfStars("abc") will return "***"
stringOfStars("Hello, world!") will return "*************"
stringOfStars("0123456789") will return "**********"
9) Write (define) a static method named maxStringOfStars, that takes two String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the longest string argument passed to it.
Examples:
maxStringOfStars("a", "abc") will return "***"
maxStringOfStars("hello", "goodbye") will return "*******"
maxStringOfStars("thursday", "friday") will return "********"
10) Write (define) a static method named midStringOfStars, that takes three String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument with the length that would be in the middle if the lengths of the arguments were arranged in ascending order.
Examples:
midStringOfStars("a", "abc", "ab") will return "**"
midStringOfStars("hello", "goodbye", "yes") will return "*****"
midStringOfStars("123456", "12", "1234") will return "****"

Answers

import java.util.Arrays;

public class Assignment05{

   public static void displayGreeting(){

       System.out.println("Hello, and welcome!");

   }

   public static void displayText(String txt){

       System.out.println(txt);

   }

   public static void printTotal(int a, int b, int c){

       System.out.println(a+b+c);

   }

   public static int getTotal(int a, int b, int c){

       return a+b+c;

   }

   public static double averageLength(String a, String b, String c){

       return (a.length() + b.length() + c.length())/3;

   }

   public static double getAverage(int a, int b, int c){

       return (a + b + c)/3;

   }

   public static int lengthOfShortest(String a, String b){

       if (a.length() > b.length()){

           return b.length();

       }

       else{

           return a.length();

       }

   }

   public static String stringOfStars(String txt){

       String newTxt = "";

       while (newTxt.length() < txt.length()){

           newTxt += "*";

       }

       return newTxt;

   }

   public static String maxStringOfStars(String txt, String txt1){

        String newTxt = "";

       if (txt.length() >= txt1.length()){

         

           while (newTxt.length() < txt.length()){

               newTxt += "*";

       }

           return newTxt;

       }

       else{

             while (newTxt.length() < txt1.length()){

           newTxt += "*";

       }

           return newTxt;

       }

   }

   public static String midStringOfStars(String a, String b, String c){

       String arr[] = {a, b, c};

       Arrays.sort(arr);

       String txt = "";

       while (txt.length() <  arr[1].length()){

           txt += "*";

       }

       return txt;

   }

   public static void main(String[] args){

       displayGreeting();

       displayText("hello");

       printTotal(1,2,3);

       System.out.println(getTotal(2,2,43));

       System.out.println(getAverage(100,13,7));

       System.out.println(averageLength("a", "abc", "ab"));

       System.out.println(lengthOfShortest("abc", "ab"));

       System.out.println(stringOfStars("abcd"));

       System.out.println(maxStringOfStars("a", "bbbbb"));

       System.out.println(midStringOfStars("aaa","aa", "abcedas"));

       

       

   }

}

I hope this helps!

What's the minimal number of checking bits that are required for the detection and correction of all single-bit errors for 1024 data bits

Answers

Answer:

n>10

Explanation:

In other to get the minimal number of checking bits that are required for the detection and correction of all single-bit errors for 1024 data bits, we will use the expression

2^n - 1 ≥ 1024 + n where:

n is the minimal number of checking bits needed

Let's assume n = 10 to check whether the inequality will be true for the value

Left hand side:

2^n-1

= 2^10-1

= 1024-1

= 1023

For the right Hand of the equation

1024+n

= 1024+10

= 1034

We can see that 2^n - 1 ≥ 1024 is not true for value of n = 10, since 1023<1034.

Hence for the inequality to be true, n must be values greater than 10 i.e n>10 e.g 11 checking bits, etc.

Hence the minimal amount of checking bit required is 11, n>10 means we can also have other values greater than 10.

Discuss briefly the history of ccomputer hardware​

Answers

Answer:

The history of computing hardware covers the developments from early simple devices to aid calculation to modern day computers. ... Early mechanical tools to help humans with digital calculations, like the abacus, were referred to as calculating machines or calculators (and other proprietary names).

Explanation:

Explanation:

Brief History Of Computer. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. ... Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built

Question 3 (1 point)
What function would you use to find the average rating I gave a video?
Count
Max
Sum
Min
Average
I think it's average but I want to double check

Answers

It says average in the question so it’s most likely not that, and is probably min.

Write a program that accepts the names of three political parties and the number of votes each received in the last mayoral election. Display the percentage of the vote each party received.

Answers

Answer:

Written in Python

parties = []

votes = []

total = 0

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

    total = total + vote

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Explanation:

This declares an empty list for parties

parties = []

This declares an empty list for votes

votes = []

This initializes total votes to 0

total = 0

The following iteration allows user to enter details for party and corresponding votes

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

This calculates the total vote

    total = total + vote

The following iteration prints the required details

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Anna is a high school senior who plans to go to UT in the fall. Her parents have saved up some money
for her college education, but it will not be enough to pay for her tuition all four years. She does not
believe she will qualify for need based assistance. What advice would you give Anna?

Answers

Since Anna  does not believe she will qualify for need based assistance, the  advice that I would  give Anna is that she should be hopeful and not worry and then I will tell her also that since her parents cannot afford the fees, then she is more than qualified for it.

What is a need-based aid?

If you have a financial need and meet other eligibility requirements, you may be eligible for need-based funding. More need-based aid than what you actually need is not permitted.

Therefore,   the best advice one can give a person who is having financial issues is that they need to be confidence and also have the courage to believe that when they source for college funds, they will get it.

Learn more about assistance from

https://brainly.com/question/26641539
#SPJ1

A ____ database is a storage model in which common entities are stored within separate tables that use unique key identifiers to build relationships among these entities. a.network b.hierarchical c.flat d.relational

Answers

Answer:

Relational Database

Explanation:

The above description explains the relational database. Hence, from the list of given options, option D answers the question.

Analyzing each options:

Flat database makes use of text files to store data

Hierarchical database makes use of tree like structure

Network database makes use of nodes

Only the relational database database organize data in form of table

Other Questions
2. Julio is playing a trivia game. On his first turn, he lost 100points. On his second turn, he lost 75 points. On his third turn, helost 85 points. Write a sum of three negative integers that modelsthe change to Julio's score after his first three turns. In how many ways can 12 people be seated on stage: a) using all 12 peopleb) using only 7 peopleplease help! i will give best answers braniliest! Explain how technology has affected people's activity levels.. 3. An object accelerates from rest, with a constant acceleration of 4.5 m/s, what will itsvelocity be after 30 s? Using the formula for circumference, =, choose the answer that most accurately represents the circumference of the circle. Use 3.14 for pi. 5.6 cm 5.652 cm 5.7 cm 5.65 cm __________________________ 1.8 cm How does the water in the wet foam affect its density? HELP ME PLEASE Which of the following is the title of the flowchart?A) Checks and BalancesB) Balance of PowerC) Amending the United States ConstitutionD) How a Bill Becomes Law Identify the graph of the point G(0, 1, 3) in three-dimensional space. Simplify -|-5+2| -737-3 What is the slope of the line passing through (-8, 7) and (5, -2)? What is the major accounting difference between interest incurred during a period and cash dividends declared during the same period Clarence is 42 inches tall. His brother Charlie is 37 inches tall. How much taller is Clarence? Describe what the ! means in n! The half-life of carbon-14 is about 7000 years. Assume that a tree died and became a fossil 14,000 years ago. How much of the original carbon-14 would you find in the wood today? What are all the ways that organisms can interact in a community |4t+n| if t = -2 and n = 5 for algebra 1 True or False: The pressure of gas cannot vary directly with temperature are perfect squares closed under subtraction PLEASE HELP What type of literary device is being used in the following quote? LADY MACDUFF: "Father'd he is, and yet he's fatherless." understatement hyperbole tone irony Marlee and Gavin brought Gracie a taco from her favorite restaurant