Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.

Answers

Answer 1

Main Answer:

Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.Program flowchart

sub heading:

what is program flowchart?

Explanation:

1.flowchart is a graphical representation of an algorithm.

2.programmers often use it as a program planning tool to solve a problem

Reference link:

https://brainly.com

Hashtag ;

#SPJ4


Related Questions

The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts where it operates. calculates the expected expenditure for the federal government every year. outlines expected revenue that is due from the collection of taxes and fees.

Answers

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

Autodesk, Inc. is a leader in three-dimensional design, engineering, and entertainment software for customers in manufacturing, architecture, building, construction, and the entertainment industries. (In fact, most Academy Award winners for Best Visual Effects used Autodesk software.)

Traditionally, Autodesk used to hold two annual training events for its partners in the United States and Canada. These events were attended by more than 300 salespeople, who learned about new product features and the customer base, and more than 700 engineers, who learned how to support the products. The high cost, planning demands, and logistical support needed for the annual training events motivated Autodesk to redesign the training.

Autodesk decided to convert the face-to-face, instructor-led training event to a virtual, instructor-led training event. To develop the virtual classroom, the program’s core content (which included Microsoft PowerPoint presentations and product demonstrations) was reviewed. Quality content was kept, and other materials were either revised or eliminated from the program. To make the content more engaging and interactive and to keep participants motivated, polls, questions and answers, and quizzes were developed. Questions, exercises, and polls kept learners’ attention and provided insight into whether learning was occurring. The instructional designers created "rooms" in which each class was held. They also developed pods that delivered a specific learning activity, such as conducting an exercise. Session maps were created for instructors to use as outlines for their presentations. This helped the instructors organize content, plan interactions, and identify necessary technical support. All roles and responsibilities for the virtual learning event were carefully defined. To help facilitate the instruction and aid the instructor, each event had a producer, host, and moderator. The producer facilitated the learning event, loaded files for sharing, was responsible for rehearsing and kept the session running on time. The host presented an overview of the session, reviewed tools, and provided closing comments. The moderator was responsible for answering learner questions and solving technical issues. The entire crew held practice sessions to help the instructor become comfortable with giving the class and keep the pace fast to maintain the learners’ interest.

Analysis Prompts

Regarding Autodesk's redesign, which design elements do you believe helped to ensure that participants learned and then put it into practice? Why do you believe those elements were effective? Explain. Be specific with your answer.
Explain how the design elements you identified in the first question encouraged both learning and transfer.
What suggestions do you have for Autodesk to measure the effectiveness of the new program?

Answers

Design elements such as the creation of interactive content including polls, questions, and exercises significantly contributed to effective learning in Autodesk's virtual training. These elements ensured engagement and real-time feedback.

In-depth, the interactive content like polls and exercises kept learners engaged, and their responses provided insights into their understanding, enhancing learning. The roles of the producer, host, and moderator ensured the smooth flow of the training session, alleviating technical glitches, and maintaining learner focus. This design encouraged learning transfer as participants could immediately apply the knowledge gained during interactive sessions. To measure the program's effectiveness, Autodesk could utilize feedback surveys, monitor the application of learned skills in job performance, and observe improvements in productivity or quality of work.

Learn more about virtual training here:

https://brainly.com/question/31661980

#SPJ11

6. Describe an algorithm that takes as input a list of n in- tegers and finds the number of negative integers in the list.

Answers

This algorithm has a time complexity of O(n) since it iterates through each element in the list once. The space complexity is O(1) as it only uses a single variable to store the count.

Here is a simple algorithm that takes a list of n integers as input and finds the number of negative integers in the list:

Initialize a variable, let's call it count, to 0. This variable will keep track of the number of negative integers.

Iterate through each element in the list:

a. Check if the current element is less than 0.

b. If it is, increment the count variable by 1.

After iterating through all the elements in the list, the count variable will contain the number of negative integers.

Output the value of the count variable as the result.

Know more about space complexity here:

https://brainly.com/question/814829

#SPJ11

Consider a simple implementation of des with 16-bit plaintext input and 16-bit key. it has 2 rounds with swap step. both initial permutation and final permutation (inverse initial permutation) are included. the f-function in feistel network is including 4 steps, expansion, key mixing, substitution and permutation. please refer to slides and textbook for detailed des structure. we assume the plaintext is 1100 0111 1010 0011 and the key input is 0011 1111 1100 0101.

required:
a. what is the key for the first round?
b. what is the ciphertext after the first round?
c. what is the key for the second round?
d. what is the ciphertext after the second round?

Answers

a. The key for the first round is 0011 1100 0111 1111.

b. The ciphertext after the first round is 1010 0110 0110 0011.

c. The key for the second round is the same as the initial key, which is 0011 1111 1100 0101.

d. The ciphertext after the second round is 0100 1011 0111 0000.

In the first round, the initial key is used for the key mixing step, where it undergoes a permutation. The resulting key for the first round is obtained by swapping the left and right halves of the initial key. In this case, the left half is 0011 and the right half is 1111, so the swapped key becomes 0011 1100 0111 1111.

The plaintext is then processed using the f-function in the Feistel network, involving the expansion, key mixing, substitution, and permutation steps. After these operations, the resulting ciphertext for the first round is 1010 0110 0110 0011.

For the second round, the same key is used as the initial key, which remains unchanged. The process is repeated with the swapped ciphertext from the previous round, going through the f-function again. The ciphertext after the second round is 0100 1011 0111 0000.

Learn more about  ciphertext after here:

https://brainly.com/question/30143645

#SPJ11

Can someone help me write an algorithm and a flow chart pls for question 3

Can someone help me write an algorithm and a flow chart pls for question 3

Answers

for i in range(20, 51, 2):

      print(i)

Can someone help me write an algorithm and a flow chart pls for question 3

write any two uses of word processing software


Answers

Answer:

Editing , saving and printing document

Word processing software is a multi-purpose tool with several uses. Here are two examples:

Document Creation: Word processing software is largely used for document creation and editing.

It has an easy-to-use interface with features including formatting settings, spell checking, and the ability to integrate photos, tables, and other multimedia components.

Word processing software encourages collaboration by allowing numerous people to work on the same document at the same time.

Thus, it allows for real-time editing, commenting, and monitoring of changes, making team collaboration on projects easier.

For more details regarding software, visit:

https://brainly.com/question/32237513

#SPJ6

A company has an automobile sales website that stores its listings in a database on Amazon RDS. When an automobile is sold, the listing needs to be removed from the website and the data must be sent to multiple target systems. Which design should a solutions architect recommend

Answers

The solutions architect should recommend using AWS Lambda to remove the listing from the website and trigger multiple AWS Step Functions to send the data to the target systems.

This design allows for serverless execution and easy scalability, ensuring efficient removal of listings and data transfer to multiple systems.

AWS Lambda can be used to remove the listing from the website in a serverless manner. It can also trigger multiple AWS Step Functions, each responsible for sending the data to a specific target system. This design allows for efficient removal of listings and simultaneous data transfer to multiple systems, ensuring scalability and flexibility.

Learn more about execution here:

https://brainly.com/question/29677434

#SPJ11

I am getting two expected errors on this code for the bottom two “public static void” lines. Can someone tell me how I can fix it? Thanks

I am getting two expected errors on this code for the bottom two public static void lines. Can someone

Answers

Answer:

Declare variable b in both lines

i.e. int b

Explanation:

In the given code, the parameters of both functions were not properly declared.

When listing the parameters, the data type must be clearly stated for all parameters (individually)

In the declaration of both functions, only variable a is declared as integer while b is undeclared.

So, the correction is to declare b as integer

What are the benefits of using disk cleanup as part of regular maintenance on a computer? Check all of the boxes that apply.

Trash is emptied to clear space on the hard drive.

Files that are no longer needed are deleted to clear space and help the computer run faster.

Accumulated temporary files are deleted to help the computer run faster.

Unnecessary program files that may slow down the computer are deleted.

Answers

Answer:

all of the above

Explanation:

Answer:

Trash is emptied to clear space on the hard drive.

Files that are no longer needed are deleted to clear space and help the computer run faster.

Accumulated temporary files are deleted to help the computer run faster.

Unnecessary program files that may slow down the computer are deleted.

Explanation:

It's all of the above

post the solve
Q.1 Write all the MATLAB command and show the results from the MATLAB program Solve the following systems of linear equations using matrices. 2y = 8z = 8 and -4x + 5y +9z = -9. x-2y+z=0,

Answers

The solution for the given system of linear equations is x= 3, y = -1, and z = 2.

As the given system of linear equations can be represented in matrix form as:

| 0 2 8 | | y | | 8 |

| -4 5 9 | x | y | = |-9 |

| 1 -2 1 | | z | | 0 |

MATLAB commands to solve the system of linear equations are:

1. Define the coefficient matrix and constant matrix:

>> A = [0 2 8; -4 5 9; 1 -2 1];

>> B = [8; -9; 0];

2. Solve for the variables using the command ‘\’ or ‘inv’:

>> X = A\B % using ‘\’ operator

X =

3.0000

-1.0000

2.0000

>> X = inv(A)*B % using ‘inv’ function

X =

3.0000

-1.0000

2.0000

Hence, the solution for the given system of linear equations is:

x = 3, y = -1, and z = 2.

Learn more about MATLAB: https://brainly.com/question/30641998

#SPJ11

this color mode should be used in initial color editing in photoshop and for electronic display.

Answers

The color mode commonly used for initial color editing in Photoshop and electronic display is RGB (Red, Green, Blue).

Which color mode is commonly used for initial color editing in Photoshop and electronic display?

RGB is an additive color model where colors are created by mixing different intensities of red, green, and blue light.

This color mode is suitable for electronic devices like computer monitors, televisions, and digital displays because they emit light and can directly produce the colors represented by RGB values.

In Photoshop, when you create or edit images for electronic display, it is recommended to work in the RGB color mode.

This allows you to take full advantage of the wide range of colors that can be displayed on electronic screens and accurately preview how the colors will appear on such devices.

It's important to note that when preparing images for print, a different color mode like CMYK (Cyan, Magenta, Yellow, Black) is typically used, as printing involves the use of ink and subtractive color mixing.

Learn more about electronic display

brainly.com/question/32285298

#SPJ11

Research your choice and how they match your requirement and priorities. This is
called______________.
a) Requirement
b) Option analysis
c) Prioritising

Answers

It’s C basically if you need explanation ask me

an obstacle or barrier that may prevent you from accomplishing your goal is called

Answers

Answer:

a roadblock

Explanation:

A roadblock because it is

Which term below best describes how websites track user data while they are online and browsing content?

Which term below best describes how websites track user data while they are online and browsing content?

Answers

Answer:

Cookies

Explanation:

Note that the term, first-party trackers, and third-party trackers are the kinds of Cookies used on sites. However, Cookies are simply files created and stored on a user's web browser when they visit some websites to gain insight into their behavior and preferences.

Thus, we can rightly refer to it as the term that best describes how websites track user data while they are online and browsing content.

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

You will create a Network Diagram reflecting the activities you need to undertake to complete the final exam.
It must be configured as follows:
- There must be a minimum of 10 Activities
- You must have at least 2 paths through the network
- Each activity needs a start date, duration and all except the first requires a predecessor(s).
Next use the Critical Path Method (See PMBOK p.210, 6.5.2.2) to do forward and reverse pass on your network diagram and identify the critical path.
Maximum marks will be gained by originality, excellent presentation and accurate use of CPM.

Answers

The network diagram was configured with at least 10 activities, at least two paths through the network, and every activity having a start date, duration, and predecessor(s). After using the Critical Path Method, the critical path for this network diagram is A-B-C-E-F-G-H-I-J, which takes 18 days to complete.

The following is a Network Diagram reflecting the activities you need to undertake to complete the final exam.ActivitiesPredecessorDurationStart DateA - Select Topic - 1 12nd JulyB - Research - 3 A 15th JulyC - Create an outline - 2 B 20th JulyD - Draft the introduction - 2 C 22nd JulyE - Draft the main body - 5 D 24th JulyF - Draft the conclusion - 2 E 29th JulyG - Edit the document - 3 F 31st JulyH - Proofread the document - 1 G 3rd AugustI - Format the document - 2 H 5th AugustJ - Submit the document - 1 I 7th AugustTo complete the final exam, the above network diagram shows the activities that you will have to undertake.

The following are the features of this diagram:It must have a minimum of 10 Activities, which it has accomplished as there are ten activities on the chart.There must be at least 2 paths through the network, which it has fulfilled as there are two paths in the network. The first path is A-B-C-D-E-F-G-H-I-J, and the second is A-B-C-E-F-G-H-I-J.Each activity needs a start date, duration, and all except the first requires a predecessor(s), which the chart has fulfilled. Every activity in the diagram has a start date, duration, and predecessor except for the first activity.The next step is to use the Critical Path Method (CPM) to do forward and reverse pass on the network diagram and identify the critical path.

The forward pass starts at the first activity and finishes at the last. The critical path is the longest path, which is A-B-C-E-F-G-H-I-J, and it takes 18 days to complete the critical path.The reverse pass starts at the last activity and finishes at the first. The critical path is the longest path, which is J-I-H-G-F-E-C-B-A, and it takes 18 days to complete the critical path.In conclusion, the network diagram was configured with at least 10 activities, at least two paths through the network, and every activity having a start date, duration, and predecessor(s). After using the Critical Path Method, the critical path for this network diagram is A-B-C-E-F-G-H-I-J, which takes 18 days to complete.

For more information on  network diagram visit:

brainly.com/question/13439314

#SPJ11

what is a computer peripheral device? provide 4 examples of peripheral devices that an os must manage.

Answers

A peripheral device is an electronic device that can be connected to a computer system, and it expands the computer system's functionality. Peripheral devices can be classified into two categories: input and output devices.

An input peripheral device is a device that is used to input data into a computer system, and output peripheral devices are used to receive or display information processed by a computer system. The following are examples of four peripheral devices that an OS must manage:

1. Mouse - This is an input peripheral device used to interact with graphical user interfaces. It translates physical movements into on-screen pointer movements. The mouse has two buttons, which are used to click or select items on the screen.2. Keyboard - The keyboard is the most common input peripheral device used to input text into a computer system.

3. Printer - A printer is an output peripheral device used to produce hard copies of documents. Printers come in different types and sizes, and their quality of print output varies.4. Scanner - A scanner is an input peripheral device that digitizes printed images and texts into electronic form.

To know more about Peripheral visit:

https://brainly.com/question/32182061

#SPJ11

Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.

Answers

Answer:

it is either c or d

I'm 99.5% sure it is C tho

Ciphers, such as the syctale cipher, that just change the order of the letters are know as ______________.

Answers

Transposition Ciphers are cyphers that only alter the letter order, like the syctale cypher.

Describe cypher.

A cypher (or cypher) in cryptography is a set of predetermined steps that can be used as a technique to achieve encryption or decryption. Encipherment is a different, less frequently used term. Information is transformed into a code or cypher when it is encoded or enciphered. In everyday speech, the terms "cypher" and "code" are interchangeable since they both refer to a series of operations that encode a message; nevertheless, in cryptography, particularly classical cryptography, the ideas are different.

To know more about ciphers
https://brainly.com/question/13155546
#SPJ4

Today, most devices, such as flash drives, mice, keyboards, and digital cameras, come with the driver already installed in Windows. The devices with included drivers in Windows are called ...
Plug and Play (PnP) is a software and hardware standard designed to facilitate the installation of new hardware in PCs by including in the OS the drivers these devices need to run. Because the OS includes this software, incorporating a new device into your computer system seems automatic. PnP lets you plug a new device into your computer, turn it on, and immediately play (use) the device.

Answers

The devices with included drivers in Windows are called Plug and Play (PnP) devices.

What is Plug and Play (PnP) devices?

Plug and Play (PnP) devices are hardware devices that are designed to be automatically recognized and installed by the operating system without the need for the user to manually install drivers or configure settings.

These devices are typically connected to a computer via USB or other ports and include things like printers, scanners, digital cameras, and external hard drives. The PnP standard is designed to make it easier for users to connect and use new devices with their computers without requiring any technical knowledge or expertise

These devices are designed to be automatically recognized and installed by the operating system without the need for the user to manually install drivers or configure settings. This makes it easier for users to connect and use new devices with their computers without requiring any technical knowledge or expertise.

To learn more about Plug and Play (PnP), visit: https://brainly.com/question/30756958

#SPJ4

7. What enhancing techniques that lines the interior of drawers and boxes resulted to soft velvety finish? A. Wood Turning b. Painting c. Etching d. Flocking

Answers

Answer:

d. Flocking

Explanation:

Flocking is one of the methods that is used to bring a finishing and decorative touch in the furniture. It is a process in which very fine particles are placed on the surface of the furniture to provide a texture to it. This process helps in adding a texture, providing a distinct color, and for better maintenance of the product. In the interior of the drawers and boxes, flocking is done so as to bring a soft and velvety finish.

_____ is the feature that allows you to quickly advance cell data while filling a range of cells.
A. Auto Fill
B. AutoCopy
C. FillAuto
D. CopyAuto
Please no files just type the answer, thanks!

Answers

Answer:

A. Auto Fill

Explanation:

Auto Fill is the feature that allows you to quickly advance cell data while filling a range of cells.

In the Administration Console, where would you navigate to view inbound messages delayed because of Greylisting?

Answers

To view inbound messages delayed because of Greylisting in the Administration Console, you would navigate to the mail server's message tracking logs.

In the Administration Console, to view inbound messages delayed because of Greylisting, you would follow these steps:

1. Log in to the Administrative Console.
2. Navigate to the "Inbound Mail" or "Message Tracking" section, depending on your console's layout.
3. Look for a filter or search option related to "Greylisting" or "Delayed Messages."
4. Apply the filter or perform the search to view the list of inbound messages delayed because of Greylisting.

Please note that the exact navigation steps might vary depending on the specific email administration platform you are using.

To learn more about inbound messages visit : https://brainly.com/question/29976314

#SPJ11

Match each example to the type of component, either Input, Process, or Output.

fermentation

newly painted structure

employees in a
management team

program code for
a software application

flour for making bread

harvesting a crop

freshly mowed lawn

a wrench

hot muffins

dryer spinning at

top speed

Match each example to the type of component, either Input, Process, or Output.fermentationnewly painted

Answers

Answer:

Find answers below.

Explanation:

1. Input: it takes in data in its raw format or an item that receives data and transfers them to the process.

Employees in a management team. Program code for a software application. Flour for making bread.A wrench.

2. Process: it converts the data from an input to a usable format. Also, it conveys the processed data (informations) to the output.

Fermentation. Harvesting a crop. Dryer spinning at top speed.

3. Output: it is the result produced by a process i.e the finished product.

Newly painted structure. Freshly mowed lawn. Hot muffins.

Lab #1 – Tabular and Graphical Displays

Objectives: At the end of this lab, you will be able to:

Find descriptive statistics using Excel and SPSS
Identify appropriate ways to summarize data
Explore relationships using crosstabulation/contingency tables
Interpret the results in the context of the problem
Directions: Refer to the Excel file Lab #1 to complete the following tasks. All results and explanations need to be reported within this Word document after each question. Make sure to use complete sentences when explaining your results. Your results should be formatted and edited. You need to submit your lab as a Word or PDF document in Canvas.

Data Set: 2011 Movies

The motion picture industry is a competitive business. More than 50 studios produce a total of 300 to 400 new motion pictures each year, and the financial success of each motion picture varies considerably. Data collected for the top 100 motion pictures produced in 2011 are listed in the Lab #1 Excel file.

Description of the variables

Motion picture: The name of the movie

Opening Gross Sales ($): the opening weekend gross sales in millions of dollars

Total Gross Sales ($): The total gross sales in millions of dollars

Number of Theaters: The number of theaters the movie was shown in

Weeks in Release: the number of weeks the movie was released

Exercise 1. Use graphical methods and descriptive statistics to explore the variables to learn how the variables measure the success of the motion picture business.

Identify which of the four quantitative variables would be appropriate to summarize a) using grouped frequency distributions and b) using ungrouped frequency distributions. Explain.
Construct frequency distributions and graphs for each of the four quantitative variables.
Use descriptive statistics to summarize opening gross sales, the total gross sales, the number of theaters and weeks in release. What conclusions can you draw about the opening gross sales, the total gross sales, the number of theaters and the number weeks the movie was released?
Construct a cross-tabulation table to explore the relationship between the total gross sales and the opening weekend. Discuss the relationship between the total gross sales and the opening weekend.
Use a cross-tabulation table to explore the relationship between the total gross sales and another variable. Discuss the relationship between the total gross sales and the variable you select.

Answers

The objective of Lab #1 – Tabular and Graphical Displays is to find descriptive statistics using Excel and SPSS and identify appropriate ways to summarize data, explore relationships using crosstabulation/contingency tables, and interpret the results in the context of the problem.

1:Quantitative variables appropriate for summarya) Using grouped frequency distributions, the appropriate quantitative variables for summary are Opening Gross Sales ($), Total Gross Sales ($), and Number of Theaters.b) Using ungrouped frequency distributions, the appropriate quantitative variables for summary are Total Gross Sales ($), Weeks in Release, Opening Gross Sales ($), and Number of Theaters.Frequency distributions and graphs for each quantitative variableOpening Gross SalesTotal Gross SalesNumber of TheatersWeeks in ReleaseDescriptive statistics to summarize opening gross sales, total gross sales, the number of theaters, and weeks in releaseThe mean opening gross sales for the top 100 movies produced in 2011 was $20.95 million.

The mean total gross sales was $86.2 million.The mean number of theaters for the top 100 movies was 2,551.The mean weeks in release was 11.68.Conclusions about opening gross sales, total gross sales, the number of theaters, and weeks in releaseMovies released in more theaters had higher opening weekend sales than movies released in fewer theaters.The top grossing movies stayed in theaters for a longer period of time.The highest grossing movies had a wider release and stayed in theaters for a longer period of time.

To know more about Graphical Displays visit:

https://brainly.com/question/31656233

#SPJ11

every student has an internet account."" ""homer does not have an internet account."" ""maggie has an internet account.""

Answers

It seems like you are providing additional information rather than requesting a program. However, based on the statements you mentioned:

"Every student has an internet account.""Homer does not have an internet account.""Maggie has an internet account."We can infer the following:All students, except for Homer, have an internet account.Maggie, specifically, has an internet account.If you have any specific requirements or if you need assistance with a program or any other topic, please let me know, and I'll be happy to help.every student has an internet account."" ""homer does not have an internet account."" ""maggie has an internet account.""

To know more about program click the link below:

brainly.com/question/30613605

#SPJ11

You input the following into spreadsheet cell B7 =$B$3 This is an example of Iterative referencing Absolute referencing A programming error Relative referencing Circular referencing

Answers

The correct answer is Absolute referencing.

Spreadsheet cell is the intersection of a row and a column within a spreadsheet where a user can enter data, text, or formulas. The position of the cell is referenced by a letter and a number.The following is an example of what this looks like in the Microsoft Excel program:

You input the following into spreadsheet cell B7 =$B$3.

This is an example of Absolute referencing. Absolute referencing allows the user to make sure that a specific cell reference in a formula remains constant, or fixed, even if the formula is copied to a new cell or sheet. In this case, the formula in cell B7 will always refer to cell B3, no matter where it is copied to. The dollar signs around the cell reference make it an absolute reference.

More on Absolute referencing: https://brainly.com/question/14174528

#SPJ11

Are robots that fix other robots engineers or doctors.

Answers

The robots are Engineers

The online underground is used___.
Select 3 options.

The online underground is used___.Select 3 options.

Answers

Answer:

I think its the 4th one but im not that sure tho sorry!

Explanation:

Answer:

1,3,4

Explanation:

By cybercriminals to sell ransom services,by cybercriminals to purchase malicious software,for networking by criminal organizations

Other Questions
Journalism and advertising have always had a distant relationship.TrueFalse 13. Find a random variable X defined on roulette such that its cumulative distribution function is of the form (0 a 4. Can this be done in many ways? Find the expectation and the variance of X. 1 3. How did Whitney influence later inventors? Why did the Spanish and Portuguese take a sudden interest in overseas maritime expeditions in the fifteenth century What are the steps required to teach a dog the care (aka wellness check) command? in order to prevent mastitis, which discharge instructions should the breastfeeding postpartum client receive from the nurse? select all that apply. Bonnie Company has a direct labor standard of 23 hours per unit of output. Each employee has a standard wage rate of $18.00 per hour. The standard variable overhead rate is $14.00 per hour. During March, employees worked 13,500 hours. The direct labor rate variance was $9,970 favorable, the variable overhead rate variance was $13,900 unfavorable, and the direct labor efficiency variance was $16,200 unfavorable. What is the actual variable overhead? a mole of oxygen (o2) molecules and a mole of carbon dioxide (co2) molecules at the same temperature and pressure have a) the same average molecular speeds. b) the same number of atoms. c) different average kinetic energy per molecule. d) the same number of molecules. e) different volumes. a client rescued from a house fireis being treated for burns to both arms and suspected inhalation injury. what data collected by the nurse has the highest priority? What is the effect of iambic pentameter in Shakespeare? 1. What is meant by mass customization, and why is this so beneficial?2. What are the key differences between direct marketing by email and direct marketing by post?3. Why is it important for permission to be gained before marketing by email or mobile to a prospect?4. Emails that are expected and recognized are more likely to be read. How can a marketer use this knowledge to increase the readership of emails? Nicole's birthday party will cost $72 if she invites 36 guests. If there are 79 guests, how much will Nicole's birthday party cost? Assume the relationship is directly proportional. Which of the following is a potential disadvantage of using wind energy? (2 answers)A)It has potential to kill fish caught in the turbinesB)The source of energy can sometimes be inconsistentC)It alters migratory bird routesD)It is influenced by the amount of cloud coverE)It releases high amounts of carbon dioxide when used reeves company is taking a physical inventory on march 31, the last day of its fiscal year. which of the following must be included in this inventory count? o goods that reeves is holding in inventory on march 31 for which the related accounts payable is 15 days past due. o goods in transit that reeves has sold to smith company. fob shipping point. o goods in transit to reeves, fob destination. o goods that reeves is holding on consignment for parker company. II. Choose the word/ phrase ( A,B,C,D) that best fits the space in each sentences. 1. He does morning exercise..........to improve his health. A. in order to B. so to as C. in order for D. so that 2. The children must learn how to look after...................................... A. themself B. theirself C. themselves D. ourselvesIII. Use the correct form of the word given in each sentence. 1. Many students actively...............in the school activites. ( participation)VII. Use the correct tense: Simple Present or Simple Future 2. I will look after the children while you .away. (be) 3. I promise I.my homework tomorrow without fail. Ok, but dont forget. (bring) 4. She .(get) you some milk when she .to the shop tonight. (go) 5. After you ..(take )the medicine, you .better. (feel) write a paragraph on the meaning of Sugondese the probability distribution shows the weights x, in kilograms, of boxes being shipped from a certain factory. a shipped box is randomly chosen. what is the probability that it weighs less than 29 kilograms? a probability distribution histogram. the vertical axis has no scale. horizontal axis is labeled x and extends from 24 to 32 with an interval of 1. the bars in all intervals are equal in height. responses 0.75 0.75 0.625 0.625 0.5 0.5 0.375 3.9 ft7 ft26 ftfind the area of the shape The first settlers in North America were from which area of the world? O A. Asia OB. Africa O c. South America OD. Europe Kuta Software - Infinite Algebra 2 Factoring By Grouping Factor each completely. 1) 12a 9a + 4a - 3 Yacza D-3(50421) 392155 2) 2p +50 + 6p+ 15 2p+epteprys 2plptat sips