Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C-string or a string object. The program should display the sum of all the single-digit numbers in the string. For example, if the user enters 2514, the program should display 12, which is the sum of 2, 5, 1, and 4. The program should also display the highest and lowest digits in the string.

Answers

Answer 1

Answer:

#include <stdio.h>

#include <string.h>

int main(){

   char number[100];

   printf("Number: ");

   scanf("%s", number);

   int sum = 0;

   for(int i =0;i<strlen(number);i++){

       sum+= number[i] - '0';

   }

           printf("Sum: %d",sum);

   return 0;

}

Explanation:

This declares a c string of 100 characters

   char number[100];

This prompts user for input

   printf("Number: ");

This gets user input

   scanf("%s", number);

This initializes sum to 0

   int sum = 0;

This iterates through the input string

   for(int i =0;i<strlen(number);i++){

This adds individual digits

       sum+= number[i] - '0';

   }

This prints the calculated sum

           printf("Sum: %d",sum);

   return 0;

Answer 2

The program that ask the user to enter a series of single digit number and display the sum of all the single digit number, highest number and lowest number is as follows:

x = input("input the series of number: ")

y = []

for i in x:

  y += i

integer_map = list(map(int, y))

print(sum(integer_map))

print(max(integer_map))

print(min(integer_map))

The code is written in python.

Code explanation:The first line of code ask the user for the series of numbers. The user input is stored in the variable "x"The y variable is an empty arraywe use the for loop to loop through the users series of number. Then add the looped items to the empty array.Then we map the string of list to an integersFinally, we print the sum , maximum and minimum number of the list.

learn more on python program: https://brainly.com/question/16025032?referrer=searchResults

Write A Program That Asks The User To Enter A Series Of Single Digit Numbers With Nothing Separating
Write A Program That Asks The User To Enter A Series Of Single Digit Numbers With Nothing Separating

Related Questions

what are the applications of computer in the field of study​

Answers

Answer: it is what it is

Explanation:

To do assignments

Compute is used by teachers to make reports and presentations

Write a C++ program that declares an array alpha of 50 components of type double. Initialize the array so that the first 25 components are equal to the square of the index variable (the position that element will occupy), and the last 25 components are equal to three times the index variable. Output the array so that 10 elements per line are printed. For the number at index 5, the value would be 25, which is 5 squared. The 25th index would hold a value of 75, which is 3 * 25.

Answers

Answer:

#include <iostream>

#include <array>

static std::array<double, 51> nums;

int main()

{

std::array<double, 51> nums;

int for1;

int for2;

for (int i = 0; i < 26; i++)

{

             nums[i] = i;

             for1 = i * i;

             std::cout << for1 << ", ";

             if(i%10==0)

                 std::cout << "\n";

}

for (int i = 26; i < 51; i++)

{

             nums[i] = i;

             for2 = i * 3;

             std::cout << for2 << ", ";

             if (i % 10 == 0)

                 std::cout << "\n";

}

}

hope i helped :D

QUESTION 1

Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?

Answers

Answer:

Data field.

Explanation:

In Computer Networking, data encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

Basically, an Ethernet Frame is one of the IEEE 802.3 data encapsulation standards.

An Ethernet Frame can be defined as the building blocks or bits contained in a single packet of data that is being transmitted over an Ethernet network or connection. When data are transmitted, a frame check sequence (FCS) containing a 4-bytes is used to detect or check for any error in a frame and to ensure no frame data was corrupted in the course of the transmission.

In the transmission control protocol (TCP), all frames that are being transmitted must have a minimum of 64-bytes in length and as such when small packets are encapsulated, some additional bits referred to as pad are typically used to increase the frame size to at least 64-bytes, which is the minimum size.

Hence, a data field is the part of an Ethernet Frame that uses a pad to increase the frame field to at least 64 bytes.

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

a. HIDS
b. NIDS
c. NIPS
d. HIPS

Answers

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

71 81 77 15 63 96 36 51 77 18 17

Show the contents of the array above each time a Merge Sort changes it while sorting the array into ascending order. Please explain your work and your answer.

Answers

Answer:

Following are the solution to this question:

Explanation:

This algorithm uses the divide and rule approach works, which splits the list into two sublists depending on if they are smaller or larger than the pivotal factor. It has O(n*log n) complexity.

It splits down the list in more than one version frequently till every sublist becomes based on a single element and fuses it to offer an ordered array. The merge type works according. It has O(n*log n) complexity.

Please find the attachment file of the sorting.

The library can store up to 100 books. Each book has information of title, author, year, and a borrowed status (true or false). The library allows adding new books to it, checking out a book, and returning a book. We assume different books have different titles in the library.

Answers

Answer:

class Books(object):

   books_count = 0

   books = {}

   #classmethod

   def book_count(cls):

       cls.books_count +=1

   #classmethod

   def add(cls, title, author, year, status):

       if cls.books_count < 100:

           cls.book_count()

           cls.books[title] = [author, year, status]

       else:

           print("Book register has reached it's limit.")

   #classmethod

   def check(cls, book_name):

       return cls.books.get(book_name)

please replace the '#' with the 'at' sign.

Explanation:

The python class defines several class methods namely; add, check and book_count. The add method adds books to the book dictionary in the class as a class attribute, the check method check for the presents of a book title in the book dictionary while the book_count method adds one to the books_count class variable which checks the dictionary size.

Problem 1: Triple + Double = So Much Trouble

Write a program that reads two integers, checks if a digit repeats 3 times in a row in the first integer and that same digit repeats two times in a row in the second integer.


Sample input/output:

Enter two integers: 3555761 72559

There are 3 conservative digits 5 in 3555761 and 2 in 72559

Answers

Answer:

Explanation:

The program code is written as:

#include <iostream>

using namespace std;

 

int main() {

    int num1,num2,flag=0,flag1=0,flag_val=0,temp1,temp2,f1,f2,f3,m1,m2;

    cout<<"Enter First Number ";

    cin>>num1;

    cout<<"Enter Second Number ";

    cin>>num2;

    temp1=num1;

    temp2=num2;

    while(temp1>0)

    {

    f1=temp1%10;

temp1=temp1/10;

    f2=temp1%10;

    if(f1!=f2)

       continue;

    temp1=temp1/10;

    f3=temp1%10;

       if(f1==f2 && f2==f3)

       {

       flag=1;

       flag_val=f1;

       }

    }

    while(temp2>0)

    {

    m1=temp2%10;

    temp2=temp2/10;

    m2=temp2%10;

    if (m1!=m2)

       continue;

    temp2=temp2/10;

    if(m1==m2 && flag==1 && flag_val==m1)

    {

       flag1=1;

       break;

    }

   

    }

    if (flag1==1)

    {

    cout<<"Both Number Are Triple + Double";

    }

    else

    {

    cout<<"Both number Are not Triple +Double";

    }

 

return 0;

}

OUTPUT:

Enter First Number = 3555761

Enter Second Number = 72559

Both numbers are Triple + DoublePress any key to continue .....

What kind of variable will be created by a line of code that reads num1 = input("Please enter your favorite
number.")?
O a string
O a float
O an integer
O a generic

Answers

Answer:

Since the input isn't specified, it would be string.

Explanation:

When input isn't specified, it's a string by default.

hope this helped :D

How will Excel summarize the data to create PivotTables? summarize by row but not by column summarize by column but not by row summarize by individual cells summarize by row and by column

Answers

Answer:

D. summarize by row and by column

Answer:

D.

Explanation:

The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:


Type Price Burn Time (hours)
1 $2.50 5
2 $3.75 7
3 $5.99 12

The owner wants you to write a program to perform certain calculations when customers buy different numbers of the candles.

Required:
a. Develop an algorithm to satisfy the following requirements:

Prompt the user to enter the number of candles of each type the customer wants to buy. Since you can’t buy a fraction of a candle, the input for each type of candle must be an integer. (You may assume that only integer values between 0 and 10 will be entered when this program is tested.)
Calculate the total price of all the candles bought using the information in the table above. For example, two Type 1 candles and one Type 2 candle would have a total price of $8.75.
Calculate the total burn time of all the candles if they were burned consecutively (i.e., one after the other). For example, one Type 1 and one Type 3 candles would burn for 17 hours.
Calculate the cost-per-minute for that purchase.
Output some kind of meaningful display that includes the number of candles of each type bought, the total price, the total burn time, and the cost-per-minute. You can be as creative as you want with this!
Write the pseudocode for the algorithm and store it in a file (file format can be text, pdf or doc) with the name CandleShopSteps.

b. Write the code (20 points)

Once you've written your algorithm it is time to turn it into a Java program. that can be executed (run). Here are some things to keep in mind:

the class should be name CastleShop.
the program will need to import the Scanner class from the Java util package.
the class should have a main method that will include the logic for the algorithm you developed in Part A. You may choose to add additional methods that are called in the main method.

Answers

Answer:

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

  double cost = 0;

  double priceF, priceS, priceT;

  int nOne = 0, nTwo = 0, nThree = 0;

  int fBurn, sBurn, tBurn;

  int burnTime = 0;

  isEnd = "n";

   while (isEnd == "n"){

      Scanner in = new Scanner(System.in);

      int option = in.nextInt();

      if (option == 1){

            priceF = 2.50;

            fBurn = 5;

            System.out.print("Enter number of items: ");

            nOne += in.nextInt();

            burnTime += fBurn * nOne;

            cost += priceF * nOne;

        } else if (option== 2){

            priceS = 3.75;

            sBurn = 7;

            System.out.print("Enter number of items: ");

            nTwo += in.nextInt();

            burnTime += sBurn * nTwo;

            cost += priceS * nTwo;

        } else if(option == 3){

            priceT = 5.99;

            tBurn = 12;

            System.out.print("Enter number of items: ");

            nThree += in.nextInt();

            burnTime += tBurn * nThree ;

            cost += priceT * nThree;

        } else{

            System.out.println("option must be between 1 and 3");

        }

      System.out.print("Do you want to end the order? y/n: ");

      isEnd = in.nextLine();

  }

  System.out.println("Number of Type 1 candles bought : "+nOne);

  System.out.println("Number of Type 2 candles bought : "+nTwo);

  System.out.println("Number of Type 3 candles bought : "+nThree);

  System.out.println("Total cost is : "+cost);

  System.out.println("Total burn time is : "+burnTime);

  double cpm = (burnTime * 60) / cost;

  System.out.println("Cost per minute : "+cpm);

}

}

Explanation:

The Java program prompts the user to continuously choose from three options 1, 2 and 3. The prices, the burn time and the cost per minute burn of the total candles ordered are printed out.

The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:


Type Price Burn Time (hours)
1 $2.50 5
2 $3.75 7
3 $5.99 12

The owner wants you to write a program to perform certain calculations when customers buy different numbers of the candles.

Required:
a. Develop an algorithm to satisfy the following requirements:

Prompt the user to enter the number of candles of each type the customer wants to buy. Since you can’t buy a fraction of a candle, the input for each type of candle must be an integer. (You may assume that only integer values between 0 and 10 will be entered when this program is tested.)
Calculate the total price of all the candles bought using the information in the table above. For example, two Type 1 candles and one Type 2 candle would have a total price of $8.75.
Calculate the total burn time of all the candles if they were burned consecutively (i.e., one after the other). For example, one Type 1 and one Type 3 candles would burn for 17 hours.
Calculate the cost-per-minute for that purchase.
Output some kind of meaningful display that includes the number of candles of each type bought, the total price, the total burn time, and the cost-per-minute. You can be as creative as you want with this!
Write the pseudocode for the algorithm and store it in a file (file format can be text, pdf or doc) with the name CandleShopSteps.

b. Write the code (20 points)

Once you've written your algorithm it is time to turn it into a Java program. that can be executed (run). Here are some things to keep in mind:

the class should be name CastleShop.
the program will need to import the Scanner class from the Java util package.
the class should have a main method that will include the logic for the algorithm you developed in Part A. You may choose to add additional methods that are called in the main method.

Answers

Answer:

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   double total = 0;

   double fPrice, sPrice, tPrice;

   int firstN = 0, secdN = 0, thirdN = 0, fTime, sTime, tTime;

   int totalT = 0;

   isEnd = "n";

   for (;;){

       if (isEnd == "y"){

           break;

       }

       Scanner in = new Scanner(System.in);

       int option = in.nextInt();

       switch (option){

         case 1:

             fPrice = 2.50;

             fTime = 5;

             System.out.print("Enter number of items: ");

             firstN += in.nextInt();

             totalT += fTime * firstN;

             total += fPrice * firstN;

             break,

         case 2:

             sPrice = 3.75;

             sTime = 7;

             System.out.print("Enter number of items: ");

             secdN += in.nextInt();

             totalT += sTime * secdN;

             total += sPrice * secdN;

             break,

         case 3:

             tPrice = 5.99;

             tTime = 12;

             System.out.print("Enter number of items: ");

             thirdN += in.nextInt();

             totalT += tTime * thirdN ;

             total += tPrice * thirdN;

             break,

        default:

             System.out.println("Looking forward to the Weekend");

       }

       System.out.print("Do you want to end the order? y/n: ");

       isEnd = in.nextLine();

   }

   System.out.println("Number of Type 1 candles bought : "+firstN);

   System.out.println("Number of Type 2 candles bought : "+secdN);

   System.out.println("Number of Type 3 candles bought : "+thirdN);

   System.out.println("Total cost is : "+total);

   System.out.println("Total burn time is : "+totalT);

   double costPerBurn = (totatT * 60) / total;

   System.out.println("Cost per minute : "+ costPerBurn);

 }

}

Explanation:

The Java program creates a continuous for-loop statement that gets the candle type, price and amount ordered from a switch and accumulates the total cost and burn time of the candles bought and the cost per minute burn of the candles consecutively.

What are possible consequences for cyberbullying?

Answers

Answer:

Possible consequences for cyber bullying include depression, isolation and illness

Explanation:

The reason for this is when a person is hurt there body tends to go through things to make them feel a certain way about things.

Answer:

Possible consequences of cyberbullying are detention, suspension, or expulsion from school; legal charges or, fines.

Explanation:

Match the definitions of different business communication to the type of document

Answers

Answer:

Convey more factual data that helps facilitate decision making  - REPORTS

Reports are made with factual data to show the condition of the subject so convey more factual data that helps in decision making.

Are one page long  - MEMORANDUMS

Memorandums are used to convey new information and are usually brief which means they take one or two pages.

Are written in a block style, with the body text aligned along the left margin  - BUSINESS LETTERS

Business letters are to be as formal as possible and this includes writing them block style and aligning the text to the left margin.

Allow attachments of files, such as images  - EMAILS

As emails are softcopy and computer based, they allow for the attachment of other files such as images, documents, audio, etc.

Answer:

emails -> allow attachments of files, such as images

reports -> convey more factual data that helps facilitate decision making

memorandums  -> are one page long

business letters  -> are written in a block style, with the body text aligned along the left margin

Explanation:

Hopes this helps.

Redis can be configured to meet different requirements by editing the configuration settings in __________.

Answers

Answer:

redis.conf

Explanation:

Redis is an open-source licensed application, that acts as a database configurator. In other words, Redis is one of the ideal tools for database operations.

Hence, the redis.conf is the configuration file used to specify how the application would run to meet different requirements.

Consumers who pay more than the minimum payment on credit cards...
are crazy, why pay more than you need to?
O pay less interest in the long run.
O see their credit scores decrease.
are able to buy more things.

Answers

Pay less interest in the long run

Currently, the program blinks both LEDs at the same time, and it's doing so at such a fast rate that you can't tell they're blinking--they appear to always be on.You must change this program so that: The time between Timer 1 interrupts, and therefore changes in the state of the LEDs, is approximately 0.75 sec. The LEDs cycle between 8 states, returning to state 1 after leaving state 8:1. LED2 on2. Both LEDs off3. LED1 on4. Both LEDs off5. Both LEDs on6. Both LEDs off7. LED1 on8. Both LEDs off

Answers

Answer:

Change the time rate/frame to reflect those changesI dont really understand your question, do you want code to be written for this or what?

Which question should the user ask when determining whether a closing tag is needed

Answers

Answer:

What is element definition in the HTML specification?

Explanation:

The question a user should ask when determining whether a closing tag is needed is "What is element definition in the HTML specification?"

This is because the specification of an element determines how the elements can be used in HTML in accordance with the rules such as distinguishing which elements can have a closing tag.

Hence, in this case, the correct answer is "What is element definition in the HTML specification?"

Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes the most profit during the past month.


A. 60 televisions at $700 with a profit of 22%

B. 40 DVD players at $350 with a profit of 38%

C. 200 computer monitors at $280 with a profit of 29%

D. 100 MP3 players at $200 with a profit of 40%

Answers

The answer to that is A because 22% of 700 is 154, the largest profit out of all of them

5. If you upgrade the RAM (Random Access Memory) of you computer, what kind of enhancements will you notice? (Pick one or more choices)
(A) My computer will become faster, if I am maxing out the computer memory usage.
(B) I will be able to store and save more data and files on the computer (Example: photos, videos, documents, movies and music)
(C) I will be able to open up and work on multiple applications and software on my computer simultaneously (without making the computer lagging and slow). I will be able to open multiple tabs on the browser.
(D) I will be able to randomly use my laptop anytime I want.

Answers

A

Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task.

i need help look at pic

Answers

Answer:

ok

Explanation:

where is the pic that u want us to have a look at

Cottonisagoodreflectorofsound​

Answers

Answer:

mhmm

Explanation:

answer Stop it makes me horn y

11.How would you characterize the relative range of paths forecasted by the various computer models on August 25

Answers

Answer:

Following are the solution to this question:

Explanation:

There is some difference between both the path expected by different computer simulations on 25 August. There is also some variance between 50 km to 500 km in the predicted route but the path is also unique in each model evaluation. It might be because any and every possible situation is repeated by the computer program. Many simulations will focus mostly on variations of strain, one might focus on the temperature variation, or one might concentrate on certain variables. But each model suggests all and every parameter which is inserted during a very photographer's encoding. There are therefore several possibilities of variability in forecasting the Hurricane's course. Here and some forecasts have shown that hurricanes would pass through Florida fully, and also some models have shown that hurricanes would pass thru the Gulf Coast, accompanied by the areas of Mississippi or Louisiana. This is the real difference in the direction of these models.

fill in the blanks the cut and copy commanda are used in combination with the................ command​

Answers

Answer:

paste command.

Explanation:

The Cut and copy commands are used in the combination with the paste command. The cut, copy, and paste commands are used in computers offering an IPC technique to transfer data across the computer user interface.

The cut, copy, and paste commands are related commands and helps human to eliminate monotonous work of recreating data which is available at another place in computer's user interface.

Therefore, the correct answer is paste command.

What hardware actually produces hard-copy documents on paper or other print media?

Answers

Answer:

Impact because dot matrix (impact) printers strike the image onto the paper, they are good printers to use when carbon-copy documents are being printed.

Explanation:




Which is the answer

Answers

Answer:

table

Explanation:

it is meant to do it

PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal

You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Write your pseudocode here:










________________________________________

Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.

Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!

When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?



How could your program be useful in the real world?



What is a problem you ran into, and how did you fix it?



Describe one thing you would do differently the next time you write a program.

btw don't talk unless you are answering the question

Answers

Answer:

i can only give you pseudocode my fren

Explanation:

# information about me

def main():

MyName =  “malaki”

print(myName)

myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”

print(myInfo)

main()

sorry if this did not help :( i tried

In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

What is pseudocode?

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.

Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.

Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

Learn more about language on:

https://brainly.com/question/20921887

#SPJ2

the last layer in a layered design​

Answers

Answer:

"System Layer" is the right choice.

Explanation:

The above system layer would be the foundation of that same layered system configuration. Hardly any robotic artificial intelligence animation could very well continue indefinitely adequately because without that layer. Several of the essential elements of Machine Learning would be emblazoned throughout this stage of the network. Due to the whole layer, strategic planning requirements could continue indefinitely.

Please Help Me I Need A Better Grade.____________________________ focuses on creating engaging interfaces with well thought out behaviors.


Question 9 options:


A)Information architecture



B)Interface elements



C)Visual design



D)Informational components



E)Interaction design

Answers

Answer:

The answer you are looking for is "E.) Interaction design" This design theory focuses on how someone might interact with the system, or fix problems early- it also expresses inventing new ways of doing things.

Microsoft Excel is an example of a(n) application.

Answers

Answer:

Yes, it is an example of an app. It's downloadable (like apps normally are)

and it works through some of the same coding as an app.

-----------------------------------------------------------------------------------------------------------------Have a nice day person

<3

Microsoft created and released Excel, a spreadsheet program. It is a component of the Microsoft Office productivity software package.

What is the main use of Microsoft Excel?

Spreadsheets can be formatted, organized, and computed by Microsoft Excel users.

By structuring data using programs like Excel, data analysts and other users may make information easier to study when it is added or changed. In Excel, the rectangular containers are known as cells, and they are organized into rows and columns.

It has calculating or computing capabilities, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language (VBA). The Microsoft Office program package includes Excel.

Therefore, Microsoft produced Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS.

Learn more about Microsoft Excel here:

https://brainly.com/question/24202382

#SPJ2

Cell address A4 in a formula means it is a _________Mixed cell reference​

Answers

Answer:

Relative cell reference.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

A relative cell reference can be defined as a cell whose reference is mainly relative to the location of the cell.

In Microsoft Excel, the cell reference is considered to be a relative reference by default.

Hence, the cell address A4 in a formula means it is a relative cell reference and when the formula is copied, the reference in the formula will change.

For example, if you refer to cell A4 from cell D4, it means you're pointing to the cell that is three (3) columns to the left of the same row i.e D minus A (D - 4).

Other Questions
Most kinds of animalsGroup of answer choicesall eavesdrop on other animals in the same way.use only their hearing to eavesdrop.use different senses to do their eavesdropping.never eavesdrop on other animals. Select the correct answer from each drop-down menu.How do you define resistance and voltage?------ is a measure of the extent to which a device opposes the flow of current. ------ is a measure of the "strength" of devices such as batteries and generators, which cause a current flow.1. A. voltage B. resistanceC. power2. A. powerB. resistance C. voltage What are the advantages and disadvantages of renewable and nonrenewable energy resources? This is my argument essay plz read it and tell me how it is also I am not done with it. Do pageants show a woman's true beauty? Pageants are too exploitative because pageants utilize the standard that judges and society have given to the definition of beauty. Most pageants these days promote low self-esteem, force women into specific demographics, and send the wrong message.Many Pageants focus on makeup, hair, gowns, swimsuit modeling, and personal interviews. Even though all that makeup they still might not feel beautiful. A study made by Statistic Brain Research saw that 8 of 10, 10-year-old girls that have been in pageants in the U.S. have been on a diet. Forty-two percent of the girls who were on a diet wanted to be thinner. People who entered into pageant claimed that they are only there because they want to feel love and beautiful but, sometimes they feel less of themself and try to change themself hoping it will make them loved and beautiful p-3=-4 pls i need to know What time does a waxing crescent set and rise? Which of the following is a function of skin?a. regulate body temperatureb. feel/touchCsweat to rid the body of wasted. all of the above 9+4 to the power of 3 times(20-8) divided 2+6 Find the value of x and y Im being timed, correct answer will receive brainliestWhich shows a perfect square trinomial?50 y squared minus 4 x squared100 minus 36 x squared y squared 16 x squared + 24 x y + 9 y squared49 x squared minus 70 x y + 10 y squared Oi I need help as soon as possible if you know Korean perfectly please tell me what this means! . . , , ? . . . . . , . , . .Thank you!! you have to solve for x Levi decides to examine the effect of fertilizer on the growth of tomato plants. He chooses four plants for his experiment and applies varying amounts of fertilizer to the three of them. He does not apply fertilizer to one plant. Over a 15-day period, the plants receive fertilizer on Days 1, 4, 7, 10, and 13. Levi measures the height of all of his plants with a meter stick on Days 3, 6, 9, 12, and 15. He also makes sure to hold all experimental factors constant except for the fertilizer. Which statement describes what Levi did to prepare the control group in his experiment?Levi applied different amounts of fertilizer to three of his plants.Levi did not apply any fertilizer to one of his plants..Levi held all experimental factors constant except for fertilizer., ,Levi measured his plants on five separate days. Raul has $1,200 to deposit into two different savings accounts.Raul will deposit $450 into Account 1, which earns 4.8% annual simple interest.He will deposit $750 into Account 2, which earns 3.75 interest compounded annually.Raul will not make any additional deposits or withdrawals. What is the total balance of these two accounts at the end of 4 years.(A) $86.40(B) $1405.39(C) $536.40(D) 868.99 A piano wire has a tension of 650 N and a mass per unit length of 0.060 g/cm. What is the speed of waves on this wire Why did the inhabitants of the graveyard decideto accept and protect the baby? Place the tiles on the screen and then complete the statements. one orange x tile and three orange + tiles The variable is represented by . The operation and the constant are represented by . The tiles represent an unknown number. can someone please help meeee its urgent I dont get this what does y= 3x - 2 equal? expressions that are equivalent to 3(5x-2)