!!GIVING 100 POINTS AND BRAINIEST T IF YOU HELP IMMEDIATELY!!
Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highest to lowest price?
Graph
Filter
Search
Sort
Sort allows Cameron to sort the data lowest to highest price or highest to lowest.
search = find a specific data input.
filter = remove and find specific data inputs.
graph = to display every database data on a graph and compare.
Answer:
sort
Explanation:
She needs to sort out the items The order is from highest to lowest.So the sort feature is best help for herwhat is auser mannual
Answer:
Contains information for user to make use of all information
Explanation:
How to create drop down list in excel with multiple selections.
Answer:
elect the cell or cells you want the drop-down list to appear in.
Click on the Data tab on Excel's ribbon.
Click on the Data Validation button in the Data Tools group.
In the Data Validation dialog, in the Allow: list select List.
Click in the Source: box.
Explanation:
A monitor is an output device. Which of the following is not a type of monitor? *
Light Emitting Diodes
Cathode Ray Tube
Laser Crystal Diodes
Answer:
cathode ray tube is the correct answer
Anyone knows the answer for 6. 1. 4 Happy Birthday! codehs
The birthday program is an illustration of a sequential program
What are sequential programs?Sequential programs are programs that do not make use of loops and conditional statements
The main programThe program written in Python, where comments are used to explain each line is as follows:
#This prints Happy birthday
print("Happy birthday")
Read more about Python programs at:
https://brainly.com/question/26980955
How do i copy a canvas course from old class to new course.
Answer:
Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.
Explanation:
Follow The Steps
That's it
Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted if the input is positive and odd. Otherwise, return rejected.
The program is an illustration of functions.
What are functions?Functions are set of program statements that are executed when called or evoked.
The main programThe function written in Python, where comments are used to explain each line of the program is as follows:
#This defines the function
def posodd_number_filter(num):
#This checks if the function is odd and positive
if num >0 and num%2 ==1:
#If yes, this returns Accepted
return "Accepted"
#If no, this returns Rejected
return "Rejected"
Read more about functions at:
https://brainly.com/question/14284563
an existing technology that would allow users to transfer images from the camera to the computer without connecting them
Answer:
wireless technology i guess??
Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.
Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.
What is Data protection policy?These are policies adopted by organizations that help to ensure data is adequately protected.
When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.
Read more about Data protection policy here https://brainly.com/question/26493645
I need to code a simple racing game in c++. Help, please.
What are two advantages and disadvantages of using computer software?
Answer:
Advantages:
Multitasking
Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.
Speed –
Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.
Disadvantages:
Virus and hacking attacks –
Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.
Online Cyber Crimes –
Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.
What needs to be done before depositing a check using a mobile app?
Answer:
The check needs to be signed in the back by you or whoever is depositing it.
Answer:
Choose the account you want to deposit the check to. Enter the check amount. Take a photo of the front and back of the check using your mobile device's camera. Review the deposit details, then hit submit, if they're correct, to process your deposit.
Explanation:
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system
HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.
Answer:
My goal is to have good grades because I failing now and I want to try and try to get my grade up
Explanation:
4 brainly
What do Web designers do? *
What's the difference between web design and web development? *
How many types of web design are there? *
Is Web Design graphic design
What are the 3 types of websites? *
What is the name of the proicess of submitting and checking credentials to valideate or prove user identiy
Answer:
Authentication
Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This environment will probably only be required for 2 months. Which types of instances would you use for this purpose
The type of instances would you use for this purpose is known as On-Demand.
What is an on demand instance?On-Demand Instances is known to be one that allows a person to pay for compute capacity usually by the hour or second with no long-term payment.
This is one that gives one a level of freedom from the costs and complexities of planning, purchasing, and keeping hardware.
Learn more about cloud from
https://brainly.com/question/25130975
help! giving a lot of points I need this asap!
Answer:
89.3
you add them all & then divide
Explanation:
How can you quickly locate emails with large attachments.
To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.
Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.
How do I find emails by attachment size?This can also be done for messages that has a size equal to or bigger than 25.
One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.
Learn more about attachments from
https://brainly.com/question/978078
Can someone please help me answer this question.
1. Select the correct answer. What is a digital portfolio?
A. a summary of your portfolio.
B. a presentation of your portfolio
C. a representation of your work
D. a preview of your most important work
2. Hadoop is a popular framework used for storing and processing big data. Which programming language was used while building this framework?
Hadoop is a popular_____ based framework used for storing and processing big data.
Answer:
1. C. or D.
2. Hadoop is a popular Java-based framework used for storing and processing big data.
Explanation:
For number 1 I think it's C because:
A digital portfolio is an online collection of work that represents your abilities and skills as a professional in your field. I could be D aswell!
Hope you do well!
True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into object code. True False
Answer:
True
Explanation:
During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use
The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.
What is an Entrance Animation?An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.
For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.
Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.
Learn more about entrance animation on:
https://brainly.com/question/20082198
1. What projects would Excel best be used for?
Please be sure to say the name of the project(s) and how you would go about creating it.
Answer:
Charting, inventory tracking, accounting and calculating
Explanation:
im assuming you are writing the response instead of a multiple choice.
hope this helps :D
How to turn off notifications for a class in canvas.
Answer:
by clicking the View Course Notifications button and then on the resulting screen, clicking the green check next to Enable Notifications.
Explanation:
Follow This Step and Read
the bookstore sold 8 books for $66 at that rate how much was one book
What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *
FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.
What tradeoff must the Administrator consider when using FTP?Although the FTP is insecure, it is a very fast way of transferring files.
When the connection is lost during file transfer, it is possible to resume such a transfer.
It also allows for queuing, scheduling, uploading, and downloading of files.
The full meaning of SMTP is Simple Email Transfer Protocol.
Learn more about FTP and SMTP at:
https://brainly.com/question/17506968
https://brainly.com/question/14396938
Which call of the function correctly follows the instructions laid out in the api?.
Answer:
MoveElement("button1", "down", 25); This function finds the minimum number in a list.
Explanation:
Hope this helps
Project: Design and Development Research Project
a team at work
A team (Imagery supplied by RicardoImagen/iStock via Getty)
Your Task
Your teacher may ask you to work in groups. Check with your teacher to see if this is required.
Choose a topic from the unit.
Identify a problem or issue to research.
Write a question (or questions) to be answered by your research.
Find at least four sources; these can be a journal article, a website from a reputable organization, an encyclopedia, a newspaper, or a documentary. When in doubt, ask your teacher.
Unacceptable sources include Wikipedia, an individual’s blog, and social media, except as examples not counted as sources.
Create a document using Word (or a similar word-processing application) as described below.
Your Word Document Requirements
Part 1: Name
Your name
Names of your partner(s) (Include the names of people in your group if this is a group project.)
Part 2: Title
Part 3: Questions to Answer
Part 4: Introduction
A paragraph that introduces your topic and the question(s) to be answered
Part 5: Exposition
An explanation of how you answered the question(s); give credit to your sources, whether using direct quotes or not
Part 6: Conclusion
A paragraph summarizing your analysis
Part 7: Bibliography
Part 8: Partner Participation (only included for those working in groups)
Describe the role and responsibilities of each member of the group.
What to Submit
You will submit the Word document described above. You can use this rubric to evaluate your project before you submit it.
The correct steps which are used to make a research are as follows:
Choose a topicFind out what problem needs to be fixed about the topicWrite your research questionsMake use of reputable sourcesWrite out your conclusionsWhat is a Research?This refers to the systematic study of a particular thing or phenomena to find out why it occurs and why it occurs the way it does and the frequency of occurrence.
With this in mind, we can see that making a research requires meticulous steps and some sources for research should not be considered because they are not reputable and this can include; individual blogs, social media, etc.
Read more about research here:
https://brainly.com/question/968894
Answer:
sorry i know this is late, but hopefully it will help someone else!
have a lovely day <3
when was the first computer built..
Answer:
1822 but it was a medical computer. not the same as computers today
Explanation:
The first computer was invented in 1822 but was built in 1991. It was invented by Charles Babbage.
Hope this helps!
What is the term for when software is installed on a computer without authorization and encrypts files and demands payments in bitcoin before the password to encrypt the files will be provided?.