Jamie was entering his expenses for the month in a spreadsheet. He got an error when he typed SOM instead of sum to calculate the total. Which error would the spreadsheet have thrown up?

Answers

Answer 1

Since Jamie was entering his expenses for the month in a spreadsheet. He got an error when he typed SOM instead of sum to calculate the total. The error that the spreadsheet have thrown up is option C. #NAME

What is the error about?

The #NAME? error appears in a spreadsheet when a function or formula is entered incorrectly or the function or formula is not recognized by the spreadsheet software.

In Jamie's case, the SUM function is a built-in function in most spreadsheet software that is used to add up the values in a range of cells. By typing "SOM" instead of "SUM", Jamie is using a formula that is not recognized by the spreadsheet software, which results in the #NAME? error.

Learn more about spreadsheet from

https://brainly.com/question/26919847
#SPJ1

See full question below

Jamie was entering his expenses for the month in a spreadsheet. He got an error when he typed SOM instead of SUM to calculate the total. Which error would the spreadsheet have thrown up?

A.

#REF

B.

#VALUE

C.

#NAME

D.

#DIV/0!

E.

#####


Related Questions

what is something about you that is not included anywhere else in your application?

Answers

Answer: Nothing

Explanation: Who said i had a application

Appreciate urgent action to answer the below Questions related to Qualys Vulnerability Management
1-To enumerate installed software applications on targeted hosts, scans should be performed in __________ mode.
Choose an answer:
a. Unauthenticated
b. Authenticated
c. Authoratative
d. Verbose
2-Why is it beneficial to configure the Business Impact of an Asset Group?
Choose an answer:
a. It's used to calculate storage space
b. It's used to calculate Severity Levels.
c. It's used to calculate CVSS Scores.
d. It's used to calculate Business Risk
3-You are building an Option Profile that targets "Zero Day" vulnerabilities. Which "Scan" option will allow you to use a "Zero Day" Search List to achieve this objective?
Choose an answer:
a. Vulnerability Detection
b. Password Brute Forcing
c. Additional Certificate Detection
d. TCP Ports
4-The Service Detection Module can detect over ________ services running on TCP and UDP ports.
Choose an answer:
a. 600
b. 256
c. 512
d. 128

Answers

a.To enumerate installed software applications on targeted hosts, scans should be performed in  Unauthenticated mode

d. It's used to calculate Business Risk.

a. Vulnerability Detection.

a. 600.

B. Configuring the Business Impact of an Asset Group is beneficial as it helps to calculate the business risk associated with the asset group. The business risk is determined by the criticality of the asset group, the impact of a successful attack, the likelihood of a successful attack, and the impact of the attack on business operations.

This risk assessment helps organizations prioritize and address their most critical assets first.

The Option Profile can be used to target Zero Day vulnerabilities by using the "Scan" option. This option allows the user to select a Zero Day Search List which contains a list of known zero-day vulnerabilities. The user can then select which vulnerabilities to target and scan for.

The Service Detection Module is able to detect over 600 services running on TCP and UDP ports. This is an important feature as it allows the user to identify services running on the targeted hosts which can provide valuable information about the targeted hosts.

This information can be used to help secure the targeted hosts from potential threats.

For more questions like Software applications click the link below:

https://brainly.com/question/2919814

#SPJ4

true/false: an exception handler is a piece of code that is written using the try/except statement.

Answers

Answer:

True

Explanation:

This is only true for python. In other languages the keywords may be different.

Ex: In Java a try-except statement would be a try-catch statement.

Choose the output of the following C++ statement: cout << "Sunny " << '\n' << "Day " << endl; Sunny \n Day Sunny \nDay endl Sunny \nDay Sunny Day In a C++ program, one and two are double variables and input values are 10.5 and 30.6. After the statement cin >> one >> two executes ___. one = 30.6, two = 30.6 one = 11, two = 31 one = 10.5, two = 30.6 one = 10.5, two = 10.5 Which of the following is a legal identifier? !program program!

Answers

The output of the following C++ statement: cout << "Sunny " << '\n' << "Day " << endl; is Sunny
Day

In a C++ program, if one and two are double variables and the input values are 10.5 and 30.6, then after the statement cin >> one >> two executes, one = 10.5, two = 30.6.

A legal identifier in C++ is a sequence of letters, digits, and underscores that does not begin with a digit and is not a keyword. "program" is a legal identifier, but "!program" is not because it begins with an exclamation point, which is not a letter, digit, or underscore.



Please brainliest

susan needs a paragraph to automatically start on a new page. she should do which of the following? a. enable the widow and orphan control option. b. enable the don't hyphenate option. c. enable the page break before option. d. enable the keep with next option.

Answers

Susan needs to enable the page break before option to automatically start on a new page. Hence option (c) is the answer.

How to automatically have a paragraph starts on a new page?

Set a page break to come before the paragraph in your word document if you want it to always be at the top of the page. You should choose the paragraph that will go after the page break. Click the Line and Page Breaks tab after selecting Paragraph from the Format option. Page break before the checkbox should be selected.

Also Click the Page Number icon on the Insert tab, then click Page Number. Choose a location, then decide on an alignment style. With the exception of designated title pages, Word numbers every page automatically. Select Format, then pick the formatting you want to use to alter the numerical style.

To learn more about page break, visit:

https://brainly.com/question/14349355

#SPJ4

30) A(n) ________ information flow consists of information that is received from another organization.
A) stand-alone
B) legacy
C) packaged
D) upstream
E) downstream

Answers

Information flow refers to the transfer of information inside an organisation between individuals, systems, and processes. when your employees are using various devices, locations, and departments.

What is management of information flow?

Information flow, sometimes referred to as information flow management, is the technique used in product management to coordinate the information that teams share with one another.

What is information flow that is free?

The Free Flow of Information Act would establish a federal shield legislation that, like those in nearly all states, would shield journalists from penalty for refusing to reveal their secret sources in any federal criminal or civil proceeding, provided those authorities met severe requirements.

To know more about Information flow visit:-

https://brainly.com/question/13189568

#SPJ4

Suppose str = "xyzw";. After the statement str[2] = 'Y'; The value of str is "____".
a. xzYw
b. xyYw c. xyzw d. xYzw

Answers

Str has the value "xyYw" after the sentence str[2] = 'Y'. A character string is stored in a variable called a string.

How is a string variable written?

Put the string of characters inside single, double, or triple quotations to create a string, and then assign it to a variable. In the Python variables tutorial, you may learn more about how variables function in Python. A character like "a" could be assigned to the variable single quote character, for instance.

What is an example of a string value?

A string value is nothing more than a group of characters, such as "abc." Quotes are always used around a string value. All character kinds are accepted (even digits, as in "abc123" ). Any character count is allowed for strings.

To know more about string visit:-
https://brainly.com/question/30099412

#SPJ4

if you position the mouse pointer over the border of a column and double-click it, ____.

Answers

If you place the mouse pointer above a column's border and double-click it, the column will adapt to fit the widest entry in the column.

What happens if you press the Tab key while the insertion point is in the final cell of a table?

Use your keyboard's arrow keys or the Tab key to switch between cells. Pressing the Tab key will instantly start a new row if the insertion point is in the final cell.

What takes place when the table move handle is clicked?

The table may be moved by clicking and dragging the table move handle. On the Insert tab, there is a table button. To change the width of columns, use the AutoFit command.

To know more about mouse pointer visit:

brainly.com/question/28031890

#SPJ4

. Explain briefly the following concepts as used in the Windows environment (a) Desktop. (b) Window. (c) Icon. d) Sidekick menu. =) Taskbar. Task​

Answers

A minimized application is still accessible from the taskbar since it is still displayed on the desktop.

What does Windows' task bar do?

A minimized application is still accessible from the taskbar since it is still displayed on the desktop. They have what is known as desktop presence. The taskbar allows users to quickly transition between open primary windows and some secondary windows while viewing them on the desktop.

What does a Windows desktop look like?

The common components of a desktop environment are icons, windows, toolbars, folders, wallpapers, and desktop widgets (see Elements of graphical user interfaces and WIMP). Drag and drop capabilities and other elements that complete the desktop metaphor may be offered via a GUI.

To know more about Taskbar visit:-

https://brainly.com/question/28147966

#SPJ1

a(n) ____ is an alternate name given to a column or table in any sql statement.

Answers

The correct answer is Table or column names in queries can be given an alias by using the SQL AS keyword.

A column or table containing an alias can be renamed using the AS command. An alias only lives while the query is running. To create an alias, use the as keyword. When importing the calendar module in the example above, we created an alias, c, and now we can refer to the calendar module by using c instead of calendar. You may give EQL characteristics and outcomes an alias name using the AS clause. An attribute, attribute list, expression result, or query result set can all have an alias name. The aliased name is only used once since it is not persistent between EQL searches.

To learn more about SQL AS keyword click the link below:

brainly.com/question/4110600

#SPJ4

Question 7 1 pts Which statement is correct about Ethernet switch frame forwarding decisions? Unicast frames are always forwarded regardless of the destination MAC address. Only frames with a broadcast destination address are forwarded out all active switch ports. Frame forwarding decisions are based on MAC address and port mappings in the CAM table. Cut-through frame forwarding ensures that invalid frames are always dropped. Question 8 1 pts Ciscovillet configure terminal Enter configuration commands, one per line. End with CNTL/Z. CiscoVille (config)# interface gigabitethernet 0/0 Ciscoville (config-if)# no ip address Ciscoville (config-if)# interface gigabitethernet 0/0.10 CiscoVille (config-subif)# encapsulation dot1Q 10 Ciscoville (config-subif)# ip address 192.168.10.254 255.255.255.0 Ciscoville (config-subif)# interface gigabitethernet 0/0.20 Ciscoville (config-subif)# encapsulation dot1Q 20 Ciscoville (config-subif)# ip address 192.168.20.254 255.255.255.0 Ciscoville (config-subif)# exit Refer to the above configuration, what are the numbers after dot1Q referring to? In the above figure they are 10 and 20. number of hosts that are allowed on the interface VLAN number native VLAN number type of encapsulation

Answers

Note that the numbers after dot1Q referring to in the above configuration are the VLAN numbers. Specifically, dot1Q 10 refers to VLAN 10 and dot1Q 20 refers to VLAN 20.

What is VLAN?

Any broadcast domain that is partitioned and isolated in a computer network at the data link layer is referred to as a virtual local area network. In this sense, a virtual object is a physical thing that has been reproduced and transformed by extra logic within a local area network.

By operating as LAN segments, VLANs lower the frequency of collisions and the amount of network resources lost. A bridge or switch transfers data packets transmitted from a workstation in a segment, which does not propagate collisions but does snoop on them.

Learn more about VLAN:
https://brainly.com/question/14530025
#SPJ1

A data analyst is working with a data frame called salary_data. They want to create a new column named hourly_salary that includes data from the wages column divided by 40. What code chunk lets the analyst create the hourly_salary column?.

Answers

One way to create a new column named "hourly_salary" that includes data from the "wages" column divided by 40 is to use the assign method of the DataFrame, like this:

salary_data = salary_data.assign(hourly_salary = salary_data['wages'] / 40)

The code chunk I provided is used to create a new column in a DataFrame called "salary_data" called "hourly_salary." This new column is created by dividing the values in the existing "wages" column by 40.

The first code using assign method is creating a new DataFrame with new column added and updating the salary_data DataFrame. While the second code using the square brackets directly to the DataFrame, adding a new column 'hourly_salary' and storing the values calculated by dividing the 'wages' column by 40 into this new column.

Learn more about code chunk here, https://brainly.com/question/30030609

#SPJ4

In Java, ________ must be declared before they can be used.
A) variables
B) literals
C) key words
D) comments

Answers

The correct answer is In Java,  A) variables must be declared before they can be used.

In Java, there are three different kinds of variables: local, instance, and static. Java supports both primitive and non-primitive data types. In Java, there are three different kinds of variables: local, instance, and static. Data values are kept in variables as storage. There are several sorts of variables in Java, including: Strings are used to store text, like "Hello." Double quotes are used to enclose string values. 123 or -123 are examples of integers (whole numbers) that are stored using the int keyword. A variable can be compared to a memory region that can store just certain types of data.

To learn more about variables click the link below:

brainly.com/question/29897053

#SPJ4

Brittany also wants to summarize and compare the performance of the swim teams by level. Switch to the Swim Levels PivotTable worksheet. Insert a PivotChart using the Stacked Column chart type and format it as follows: a. Resize and reposition the PivotChart so that the upper-left corner is located within cell E2 and the lower-right corner is located within cell L22. b. Add the chart title Wins by Level to the PivotChart using the Above Chart option, c. Filter the PivotChart so that only wins in Levels 4, 5, and 6 are displayed.

Answers

Brittany Lambert has offered to gather information on the swim club staff and teams as a volunteer for the Brevard County Swim Clubs in Melbourne, Florida.

Go to the worksheet for All Employees. The following formula should be entered in cell E3 to calculate an employee's potential pay rate based on their years of experience: Look up the Years of Experience column value using a structured reference. Using an absolute reference, get the value from the range P14:U15 in row 2 of the table. Find a reasonable fit because the hourly pay rate is tiered according to the amount of years of experience.

Learn more about information here-

https://brainly.com/question/11941925

#SPJ4

origin encountered an issue loading this page. please try reloading it – if that doesn’t work, restart the client or try again later.I have reinstalled it multiple times, but still have same issue. Any solution?

Answers

Attempt to clean your browser. Use CCleaner or Eusing's Cleaner if you don't know how to do it. Both are easy to use and can be downloaded for free.

I recently had this issue and solved it by installing Origin from scratch. You'll need to remove EVERYTHING from your Origin folder. Probably one or two items are to blame, but once I done that and installed it again, everything is working as it should. I hope it functions for you.

Origin loads without a hitch on a browser, but the app or client just won't launch. I was able to resolve this issue by removing the Origin cache files from the appdata folder.

Enter "%appdata%" in your Windows search bar to identify the cache files; next, look for the "Origin" folder and remove everything within. This should resolve the issue but will reset your origin settings, etc.

Learn more about Browser here:

https://brainly.com/question/25371940

#SPJ4

Attempt to clean your browser. Use CCleaner or Eusing's Cleaner if you don't know how to do it. Both are easy to use and can be downloaded for free.

How to fix "origin encountered an issue loading this page. please try reloading it – if that doesn’t work, restart the client or try again later."?

I recently had this issue and solved it by installing Origin from scratch. You'll need to remove EVERYTHING from your Origin folder. Probably one or two items are to blame, but once I done that and installed it again, everything is working as it should. I hope it functions for you.

Origin loads without a hitch on a browser, but the app or client just won't launch. I was able to resolve this issue by removing the Origin cache files from the appdata folder.

Enter "%appdata%" in your Windows search bar to identify the cache files; next, look for the "Origin" folder and remove everything within. This should resolve the issue but will reset your origin settings, etc.

Learn more about Browser here:

brainly.com/question/25371940

#SPJ4

read-only memory differs from random access memory due to its ability to _____ store instructions.

Answers

read-only memory differs from random access memory due to its ability to permanently store instructions.

What is random access memory, or RAM?

Ram.Random Access Memory (RAM), often known as main memory, main storage, or system memory, is a hardware component that enables the storing and retrieval of data on a computer.DRAM is a kind of memory module, and RAM is frequently related to it.

Does magnetic storage qualify as long-term storage?

Instead, they preserve information in ways that don't generally degrade over time.The magnetic storage technique utilized in hard drives is an illustration of this.Given that any information stored takes years to decay, this storage method may also be referred to as "permanent" storage.

To know more about memory visit:

https://brainly.com/question/28754403

#SPJ4

which of the following is an example of long-term storage? (choose all that apply.)a. magnetic tapeb. CPU cachec. SSDd. RAM

Answers

Answer:

a. and c.

Explanation:

______ is an international standard language that is used for processing a database.
A) HyperText Markup Language
B) Dynamic HyperText Markup Language
C) Structured Query Language
D) Sybase language

Answers

Answer:

The correct answer is C

Explanation:

Structured Query Language (SQL) is an international standard language that is used for processing a database.

Each class on an class diagram is represented by a(n) ____ in a relational database.
a. attribute c. table
b. row d. column

Answers

Each class on an class diagram is represented by a(n) table in a relational database.

What purpose does a database serve?

A database is a structured collection of data that is electronically accessible and stored in computing. Large databases are hosted on computer clusters or cloud storage whereas small databases can be stored on a file system. Making data accessible to users is what access is all about. Large amounts of data can be stored in one location, which makes databases a suitable choice for data access. The data can be read and modified simultaneously by several individuals. A primary key should be present in each table in a relational database. The primary key is a column, or group of columns, that enables each row in the database to be uniquely identified.

To know more about database visit:

https://brainly.com/question/29412324

#SPJ4

your connection is not private attackers might be trying to steal your information

Answers

Only websites using HTTPS are affected by the "your connection is not private" issue (or should be running over HTTPS). Your browser makes a request to the server that hosts the website whenever you access one.

The installed certificate on the website must then be verified by the browser to make sure it complies with current privacy requirements. The TLS handshake, the certificate's verification against the certificate authority, and certificate decryption are additional processes that take place.

Mistake Code

You're not using a secure connection.

SSL Error Error Type Variations

You're not using a secure connection.

You're not using a secure connection.

You can't have a private connection.

There is no private connection here.

Causes of Error

Inactive SSL certificate

unprotected network

Cookie and cache settings for the browser

Inaccurate time/date settings

DNS mistakes

VPN and antivirus programmes

The browser will automatically attempt to block you from accessing the site if it determines that the certificate is invalid.

Learn more about Browser here:

https://brainly.com/question/25371940

#SPJ4

Assign searchResult with a pointer to any instance of searchChar in personName.#include #include int main(void) {char personName[100] = "Albert Johnson";char searchChar = 'J';char* searchResult = NULL;/* Your solution goes here */if (searchResult != NULL) {printf("Character found.\n");}else {printf("Character not found.\n");}return 0;}2)Assign movieResult with the first instance of The in movieTitle.#include #include int main(void) {char movieTitle[100] = "The Lion King";char* movieResult = NULL;/* Your solution goes here */printf("Movie title contains The? ");if (movieResult != NULL) {printf("Yes.\n");}else {printf("No.\n");}return 0;}

Answers

The first answer is searchResult = strchr (personName, searchChar); the second is movieResult = strstr (movieTitle, "The");

What do you meant by print?

A printed copy. (2): a photomechanically created replica of an original art piece (such as a painting). (3): an actual work of artwork (such as a printing, etching, or print) created by or under the direction of the artist who produced it and meant for graphic reproduction.

1) Give any occurrence is searchChar in personName a reference in searchResult.

#include

#include

int main(void) {

char personName[100] = "Albert Johnson";

char searchChar = 'J';

char* searchResult = NULL;

/* Your solution goes here */

if (searchResult != NULL) {

printf("Character found.\n");

}

else {

printf("Character not found.\n");

}

return 0;

}

2) assign a film The first occurrence of An in movieTitle appears in the result.

#include

#include

int main(void) {

char movieTitle[100] = "The Lion King";

char* movieResult = NULL;

/* Your solution goes here */

printf("Movie title contains The? ");

if (movieResult != NULL) {

printf("Yes.\n");

}

else {

printf("No.\n");

}

return 0;

To know more about print visit:

https://brainly.com/question/14668983

#SPJ4

A(n) ______ represents a particular type of object in the real world.
a. entity
b. attribute
c. node
d. relationship

Answers

The correct option a. entity. A particular kind of real-world object is represented by an entity.

Explain the term entity an its features?

A single special thing in the real world being mastered. A single person, one item, or one company are examples of entities.

Entity class. a subject of stored information, such as an individual, group, category of objects, or idea.A member record and its associated attributes are present in a source system in virtual MDM. Virtual MDM assembles those member records dynamically to create a single entity in a composite view. The gold standard for that individual, group, thing, etc. is that one particular thing. Business users continue to modify data on the source systems after the initial configuration. The entity composite view that is kept in the MDM database updates to reflect changes to the source system data according to configurable rules.

There are two categories of entities:

Tangible Entity: Things with a physical existence in the real world. A person, a car, etc.Entities that only exist logically and don't have a physical existence are referred to as intangible entities. Example: A bank account, etc.

To know more about the entity, here

https://brainly.com/question/13437795

#SPJ4

JavaScript code is compiled before being delivered to the browser (or other platform). true false

Answers

JavaScript, in contrast, doesn't require a compilation stage. Rather, the JavaScript code is read, each line is interpreted, and then the code is executed by a browser's interpreter. With the aid of a process known as Just-In-Time (JIT) compilation, more recent browsers can compile JavaScript to executable bytecode just before it is about to run.

JavaScript has it been compiled?

YES. The JS virtual machine then runs the binary byte code that the compilation process created. The compilation process does not happen at build time, in contrast to other programming languages like Java.

Is JavaScript runtime or compiled?

Although JavaScript is regarded as a dynamically typed, interpreted language, it is actually a compiled language, whether you are aware of this or not.

                  In the end, it is a compiled language, even though it is not compiled extensively beforehand like many conventionally compiled languages are.

Learn more about JavaScript

brainly.com/question/28448181

#SPJ4

"Linux ISO images that can be burned to a CD or DVD are referred to as ____.
Linux in a Box
Linux Live CDs
Forensic Linux
ISO CDs"

Answers

A live CD is a distribution that includes as much software as feasible that may be run directly from a bootable CD-ROM without needing to be installed on a hard drive. There is nothing set up.

How do live CDs operate?

A live CD is a version of an operating system that may operate fully off a CD or DVD without the need for installation on the computer's hard drive. It makes use of the computer's hard drive, RAM, and external and pluggable storage devices for data storage.

Can I live with Linux?

As a result, you may start the live system, test or use it for whatever long you need to, and then restart the system (remembering to take the live media out) to go back to the normal operating system.

To know more about hard drive visit:

brainly.com/question/10677358

#SPJ4

Explain one similarity between the trade in the indian ocean networks before the arrival.

Answers

The fact that maritime trade predominated both before and after the arrival of the Portuguese was one commonality that was noted.

Muslims, who were skilled navigators, controlled trade in the Indian Ocean.

was done extensively using several marine routes

mostly taken up by the Portuguese

The Muslim maritime trade channels were valuable, and once the Portuguese acquired control of commerce in the Indian Ocean, they continued to use them.

In conclusion, trade via sea predominated both before and after the arrival of the Portuguese.

Ocean Networks, Inc. was founded in 2013 and has its corporate offices in Atlanta, Georgia (USA). For governmental entities, carriers, content producers, and institutions of higher learning, we create undersea cable networks. We reuse Out-of-Service (OOS) cable systems for the ocean research community through our company Submarine Cable Salvage, Inc.

Learn more about Trade here:

https://brainly.com/question/26032712

#SPJ4

Use the ______ value for the CSS display property to configure an element to not display.
Question options:
block
none
0
hide

Answers

Use the none value for the CSS display property to configure an element to not display.

Can you set up page breaks inside a printed new website using CSS?

Page breaks can be configured in a published web page using CSS.From the list of suggestions for mobile web design, pick one.utilize a page layout with one column.

The text formatting is controlled by one of the these CSS properties?

Text can be underlined, overlined, and struck through with the text-decoration property.Text can be capitalized or changed to upper- or lowercase letters using the text-transform property.The fair skinned attribute is used to regulate how text flows and is formatted.

To know more about CSS display visit:

https://brainly.com/question/24179090

#SPJ4

Do you believe hackers are a necessary part of ensuring Internet safety and should they be rewarded for their efforts?

Answers

Answer:

The phrase 'Break the Law' means to fail to obey a law; to act contrary to a law. Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. Which in all words saying should not be given a reward for breaking into something unless given the consent of the owners the owners may hire or ask them to help find a fault in there system but in other terms this should not happen.

in order to redirect a file to the standard input of a command, what metacharacter should be used?

Answers

You can tell a program to open a file with the meta-character extension by using the standard input.

The second command's output is read as standard input while the first command's output is written as standard output. A meta-character (regex) engine is a character that has a special meaning to a computer program, such as a shell interpreter or a regular expression. When using the pipe command to combine two or more commands, the output of one command is used as the input for the next, and so on. It can also be considered as a momentary connection between two or more commands, programs, or processes. There are only two possible outcomes when opening a file in a computer language: either nothing from the file will be output, or something from the file will be output (here we assume that the file opening does not cause any error).

Learn more about Command's output here:

https://brainly.com/question/30177184

#SPJ4

to insert slides from another presentation into a presentation, click the new slide list arrow in the slides group, then click insert slides. true false

Answers

The answer is true. On the Home tab, under Slides, click the arrow next to New Slide, and then click Insert Slides from Other Presentation.

What is PowerPoint?

Microsoft PowerPoint is a presenting tool that was developed by Dennis Austin and Robert Gaskins at the software firm Forethought, Inc.

On April 20, 1987, it was initially only available for Macintosh computers.

The Microsoft Office suite, which included a number of Microsoft software, was originally made available in 1989 for Macintosh and in 1990 for Windows.

PowerPoint was integrated into the development of Microsoft Office starting with version 4.0 (1994), adopting shared common components and a converged user interface.

Prior to the release of a version for Microsoft Windows, PowerPoint's market share was quite modest, but it quickly increased as Windows and Office flourished.

95 percent of the global market for presentation software has been attributed to PowerPoint since the late 1990s.

To know more about PowerPoint, visit:-

https://brainly.com/question/17215825

#SPJ4

when purchasing a typical pc today, you can expect at least _____ gb of ram installed.

Answers

A typical PC today ought to have at least ___ GB of installed RAM. 2. Data is stored in __ memory permanently and without any moving elements.

What is the name of a typical PC

The first all-purpose, competitively priced personal computer made by IBM was known as the PC, or "personal computer," as it is abbreviated. This microprocessor technology has been used in any small, moderately priced computer designed for a single user to use at home or in an office. Many people refer to it as a personal computer (PC). Personal computers include devices including tablets, laptops, desktop computers, and small computers. These computer manufacturers all employ a single chip to hold an entire CPU.

Know more about  permanently Visit:

https://brainly.com/question/1443536

#SPJ4

Other Questions
Thegraph of a quadratic function with vertex (0, 3) is shown in the figure below.Find the domain and the range.Write the domain and range using interval notation. Why is Article 3 of the Constitution important? Who is John Hay and what role did he play in increasing trade with China Open Door Policy )? Is it better to retire at 65 or 70? What is name of the point indicated by point P in the diagram below The basis for requiring employers to withhold taxes from employees' pay and requiring periodic estimated tax payments from taxpayers with income not subject to withholding is known as the: Do you place the full stops inside the bracket or outside the bracket. Explain thoroughly. Will brainliest if correct. Why did the pigs change the name of the farm? I WILL PICK BRAINLIEST Arnold is studying the prevalence of three health risk factors, denoted by A, B, and C, within a population of men. For each of the three factors, the probability that a randomly selected man in the population has only this risk factor (and none of the others) is 0.1. For any two of the three factors, the probability that a randomly selected man has exactly these two risk factors (but not the third) is 0.14. The probability that a randomly selected man has all three risk factors, given that he has A and B is 1/3. The probability that a man has none of the three risk factors given that he does not have risk factor A is p/q, where p and q are relatively prime positive integers. Find p+q. What is the new annual dollar limit per taxpayer for the Energy Efficient Home Improvement Credit for Tax Year 2023? amides having fewer than __________ carbons are generally water soluble. Concerned about toxic effects of added nutrients in fortified foods and supplements, when eaten in addition to staple foods, scientists established the _____ category of Dietary Reference Intakes (DRI).A. Recommended Dietary Allowances (RDA).B. Adequate Intake (AI).C. Tolerable Upper Intake Levels (UL).D.. Estimated Average Requirements (EAR). How do you say friend lets go to school together in Japanese? Who has a pure market economy? A disadvantage of the corporate form of business entity is a. mutual agency for stockholders b. unlimited liability for stockholders c. corporations are subject to more governmental regulations d. The ease of transfer of ownership Answer: C 2. The term deficit is used to refer to a debit balance in which of the following accounts of a corporation? a. Retained Earnings b. Treasury Stock c. Organizational Expenses d. Common Stock Answer: C 3. The charter of a corporation provides for the issuance of 100,000 shares of common stock. Assume that 45,000 shares were originally issued and 5,000 were subsequently reacquired. What is the number of shares outstanding? a. 5,000 b. 45,000 c. 40,000 d. 50,000 Answer: c 4. The par value per share of common stock represents a. The minimum-selling price of the stock established by the articles of incorporation. b. the minimum amount the stockholder will receive when the corporation is liquidated c. An arbitrary amount established in the articles of incorporation d. the amount of dividends per share to be received each year Answer: c 5. A corporation issues 1,500 shares of common stock for $ 32,000. The stock has a stated value of $10 per share. The journal entry to record the stock issuance would include a credit to Common Stock for a. $15,000 b. $32,000 c. $17,000 d. $2,000 Answer: a 6. The Sneed Corporation issues 10,000 shares of $50 par value preferred stock for cash at $70 per share. The entry to record the transaction will consist of a debit to Cash for $700,000 and a credit or credits to a. Preferred Stock for $700,000. b. Preferred stock for $500,000 and Paid-in Capital in Excess of Par ValuePreferred Stock for $200,000. c. Preferred Stock for $500,000 and Retained Earnings for $200,000. d. Paid-in Capital from Preferred Stock for $700,000. Answer: b 7. The charter of a corporation provides for the issuance of 100,000 shares of common stock. Assume that 45,000 shares were originally issued and 5,000 were subsequently reacquired. What is the amount of cash dividends to be paid if a $2 per share dividend is declared? a. $80,000 b. $10,000 c. $90,000 d. $100,000 Answer: a 8. Which of the following statements is not true about a 2-for-1 split? a. Par value per share is reduced to half of what it was before the split. b. Total contributed capital increases. c. The market price will probably decrease. d. A stockholder with ten shares before the split owns twenty shares after the split. Answer: b 9. The primary purpose of a stock split is to a. increase paid-in capital b. Reduce the market price of the stock per share c. increase the market price of the stock per share d. increase retained earnings Answer: b 10. Treasury stock should be reported in the financial statements of a corporation as a(n) a. Investment. b. Liability. c. Deduction from total paid-in capital. d. Deduction from total paid-in capital and retained earnings. Answer: c 11. On the statement of cash flows, the cash flows from operating activities section would include a. receipts from the issuance of capital stock b. receipts from the sale of investments c. payments for the acquisition of investments d. Cash receipts from sales activities Answer: d 12. A company purchases equipment for $32,000 cash. This transaction should be shown on the statement of cash flows under a. Investing activities b. financing activities c. noncash investing and financing activities d. operating activities Answer: a 13. Depreciation on factory equipment would be reported in the statement of cash flows prepared by the indirect method in a. the cash flows from financing activities section b. the cash flows from investing activities section c. a separate schedule d. The cash flows from operating activities section Answer: d 14. Accounts receivable arising from trade transactions amounted to $44,000 and $53,000 at the beginning and end of the year, respectively. Net income reported on the income statement for the year was $105,000. Exclusive of the effect of other adjustments, the cash flows from operating activities to be reported on the statement of cash flows prepared by the indirect method is a. $105,000 b. $114,000 c. $96,000 d. $158,000 Answer: c why are many hoaxes released over the internet A linear function f(x) is transformed into thThe graph of both functions are shown.a) State the type of transformationthat occurredA)Vertical compressionB)Vertical reflectionC)Horizontal stretchD)Horizontal reflection what is 890-9876+098763332Use internet if you want An artist can use values:A. only for contour line drawings.B. to alter the sense of depth on a picture plane.C. only for shading the figure.