Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software.Michelle wants an application program that can use formulas to perform calculations and organize numbers and values into rows and columns. Identify the application program that Michelle should choose.

Answers

Answer 1

Answer:

Microsoft Excel / Spreadsheet software.


Related Questions

Online search engines like Google, Bing, and DuckDuckGo help to make information readily available to us when we need it. However, what do Wikis do that these search engines do not that also makes them useful in their own sense?

Answers

Answer:

for example, wikipedia is a very non-trustworthy website that can be edited by anyone which isn't reliable for a source while Google and DuckDuckGo have many different resources because its a search engine also the wiki is a website while technically google and duckduckgo are not

Explanation:

Which of the following is a basic concept associated with Web 2.0? Select one: a. shift in user's role from the passive consumer of content to its creator b. shift in user's interest from sharing information to finding information c. shift in user's preference from online sites to encyclopedias as sources of unbiased information d. shift in user's preference to environment-oriented products e. shift in user's lifestyle due to increased purchasing power

Answers

Answer:

A: shift in user's role from the passive consumer of content to its creator

Explanation:

During the phase of Web 2.0, consumers evolved from just been highly informed and socially connected (in other words, they evolved from being just passive consumers) to a more engaged and empowered consumer. This implied that consumers could easily adapt to new technologies to meet individual needs and create an emotional bond with brands. They evolved from passive consumers to being the creators of what they wanted to meet their specific needs.

Using the diagram to the right, match each letter
label to the correct term in the drop-down menus.

Answers

Answer:

A - slide

B - ribbon

C- command

D - group

E - format painter

F - tab

A - slide

B - ribbon

C- command

D - group

E - format painter

F - tab

In a presentation software like Microsoft PowerPoint, the slide (A) serves as the individual page displaying content. The ribbon (B) is the toolbar at the top, organized into tabs (F), each containing various commands (C) grouped (D) based on functionality.

Format Painter (E) is a tool allowing users to replicate formatting from one element to another swiftly. Together, these components streamline the creation and customization of slides, enhancing the efficiency and aesthetic appeal of presentations. The ribbon's organized tabs house commands, offering a user-friendly interface for tasks such as formatting, designing, and delivering impactful presentations.

Kevin gets a call from a user who is trying to install a new piece of software. The user doesn’t have administrative rights, so she's unable to install the software. What tool can Kevin use to install the software for the user without giving the user the local administrator password?

Answers

Answer:

use Remote Desktop

Explanation:

50 + P0INTS AND BRAIN PROMISED TO FIRST PERSON RIGHT Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?

Embed the chart.

Link the chart.

Insert the chart as a picture.

This cannot be done.

Answers

Answer:

link the chart, itll immediately update

Final answer:

To ensure her presentation chart updates with the spreadsheet, Hoda should link the chart. This enables dynamic updates, unlike embedding or inserting as a picture. Clear legibility in pie graphs and bar graphs is crucial for data presentation.

Explanation:

Hoda needs to choose the option to link the chart to her Excel spreadsheet to ensure that changes in the spreadsheet are reflected in her presentation. Embedding the chart would insert a static copy that does not update with changes to the source data. Inserting the chart as a picture would also result in a static image. Therefore, linking is the option that suits her requirement for a dynamic, updatable chart. When using linked data visualization tools like pie graphs and bar graphs it's crucial to consider presentation clarity and accuracy. For pie graphs, ensuring that the colors and percentages are legible and that smaller sections are visible is important, whereas for bar graphs, having distinguishable colors, a chronological order for data, and clear legibility of numbers and scales is essential.

Your team has already created a WBS for the ABC product launch project. You are kicking off phase 2 of this project, which is the product development phase. Which of the following is an example of what might appear in the second level of your project’s WBS?
A. ABC product launch project.
B. Work package.
C. Project phases.
D. Activities.

Answers

Answer:

C. Project phases.

Explanation:

Work Breakdown Structure (WBS) in project management is the laser-focused breakdown of a project into smaller components in order to make the project successful.

Project phases is an example of what might appear in the second level of your project’s Work Breakdown Structure (WBS).

12) Suppose you wanted a subroutine to return to an address that was 3 bytes higher in memory than the return address currently on the stack. Write a sequence of instructions that would be inserted just before the subroutine’s RET instruction that accomplish this task.

Answers

Answer:

.code

main proc

mov ecx,ebp

mov ecx, 787878

push ecx

call MySe7en

invoke ExitProcess,0

main endp

MySe7en PROC

pop ecx

sub ecx, 3

mov

push ecx

ret

end main

Given the class 'ReadOnly' with the following behavior: A (protected) integer instance variable named 'val'. A constructor that accepts an integer and assigns the value of the parameter to the instance variable 'val'. A method name 'getVal' that returns the value of 'val'. Write a subclass named 'ReadWrite' with the following additional behavior: Any necessary constructors. a method named 'setVal' that accepts an integer parameter and assigns it the the 'val' instance variable. a method 'isDirty' that returns true if the setVal method was used to override the value of the 'val' variable.

Answers

Answer:

I believe you want a subclass so here it is!

public class ReadWrite extends ReadOnly {

public ReadWrite(int initialValue){

super(initialValue);

}

private boolean modified = false;

public void setVal(int x) {

val = x;

modified = true;

}

public boolean isDirty() {

return modified;

}

}

Explanation:

I might be wrong, just check through it in case

Hope this helped

:)

HELP PLZ WILL GIVE BRAINLIEST

What are the benefits of online note-taking tools? Check all that apply.

A. They are easy to use and understand. B. Only one student has access to the notes. C. They let students share information. D. They allow students to take notes quickly. E. Students can store notes in a central location. F. They guarantee students will get good grades.

Answers

Answer:

A, B, D, and E

I am not for sure but that makes most sense.

Explanation:

I hope this helps! :)

Answer:

I'm pretty sure it's A, D, and E.

Explanation:

If r is an instance of the above Person class and oddNum has been declared as a variable of type boolean, which of the following correctly sets oddNum to true if Person object r has an odd number of children and to false otherwise?

oddNum = ( ( r.numChildren() % 2 ) != 0 );

if ( ( r.numChildren() % 2 ) == 0 )

oddNum = false;

else

oddNum = true;

oddNum = false;

for ( int k = 0 ; k < r.numChildren() ; k++ )

oddNum = !oddNum;

I only

II only

III only

I and II only

I, II, and III

Answers

Answer:

I, II, and III

Explanation:

The three are almost saying the same thing. the loop is one am a bit concerned about. but since the oddnum is set to false, the loop will work.

The one and two are pretty clear. to test for odd number, the easiest is to divide by two to see if there will be a remainder. That is what both first and second statement is trying to do.

Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats that she can leverage. What are the two main ad formats used in a Standard Display campaign?a.In-stream video adsb.Call-only adsc.Text adsd.Responsive Display adse.Uploaded ads (Image & AMPHTML)

Answers

Answer:

d.Responsive Display ads

e.Uploaded ads (Image & AMPHTML)

Explanation:

The two main ad formats used in a Standard Display campaign are;

1. Responsive Display ads: they are Google's new default ad format and are automatically created by Google using assets provided by users in a square and landscape format.

2. Uploaded ads (Image & AMPHTML): they are created using a tool like Google Web Designer to create adverts outside of Google Ads.

They can be uploaded as a jpeg, gif, zip file and png extension into Google Ads.

A range in which a measuring instrument or controller does not respond is the

Answers

Answer:

Dead band

Explanation:

In Instrumentation, dead band is defined as a range in which a measuring instrument or controller does not respond. It is also known as the neutral zone or dead zone and it is usually caused by packing friction or unbalanced forces.

Andy is writing an article and wants to verify a few facts. Which of the following websites is designed to provide answers to factual questions? A. RhythmOne B. Wolfram Alpha C. Ask a Librarian D. TinEye

Answers

Answer:

B. Wolfram Alpha

Explanation:

Wolfram Alpha is a unique website designed to provide answers to factual questions.

The mode of operation of Wolfram Alpha is by using its vast store of expert-level knowledge and algorithms to automatically answer questions, do analysis and generate reports without necessarily listing the webpages that might contain the answer.

Some websites can be used as a fact verification tool. Andy can make use of Wolfram Aplha to verify answers to questions in his articles.

(a) RhythmOne is a website used for advertisement.

(b) Wolfram Alpha is a website used for verifying solutions to topics like mathematics, algebra, physics, geometry, etc.

(c) Ask a Libarian is meant to provide an online support to library users

(d) TinEye is used for reverse image search

So, from the given options and the information provided above, we can conclude that Andy can only make use of (b) Wolfram Alpha to verify answers.

Read more about websites at:

https://brainly.com/question/10811157

As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a _____________________. Group of answer choices RAID drive network attached storage device server station gigabit NIC

Answers

Answer: Network attached storage device

Explanation:

Network attached storage(NAS) is the data storage server device that is responsible for serving files to configuration and other components.Through this sever device data can be retrieved by various client and user from central disk capacity .It provides good data access to diverse user and client of data.

Other options are incorrect because RAID drive, server station, gigabit NIC are not the devices that centrally store huge amount of data for access.Thus, the correct option is network attached storage(NAS) device

Samira recently opened an online potted plant store and needs to promote it. She chose Google Ads because it offers advertisers different campaign types that determine where ads will appear and the format in which they’ll be displayed when viewed. What Google campaign type will help her reach her most valuable audience?
1. TV campaigns, which promote her products directly to consumers while they’re watching their favorite network and cable TV programs.
2. Shopping campaigns, which promote her products by giving consumers detailed informationabout what she’s selling before they click her ad.
3. Social media campaigns, which showcase her products to users while they browse their favorite social-media platforms.
4. App campaigns, which can increase engagement, app installs, and even in-app actions, such as ordering her products.

Answers

Answer:

The answer is "Option 2".

Explanation:

As a retailer, you can boost the consistency about your guides by featured brand specifics into your commercials specifically to support customers to make better purchasing decisions. It promotes the goods while providing users with detailed data about what you are offering before they have even tap the ad, and wrong choices can be described as follows:

In option 1, It is wrong because it targets specific types of people. In option 3, This campaign emphasizes, targeting and measure ability, that vary from regular social media efforts, that's why it is wrong. In option 4, It is a way to market the apps using Google's largest tools, that's why it is wrong.

Choose all of the devices where an operating system can be found.
mainframe and desktop computers
o display monitors
o smartphones
O computer mice
o embedded devices controlling robots

Answers

All of the devices where an operating system can be found are as follows:

Mainframe and desktop computers.Smartphones.Embedded devices controlling robots.

Thus, the correct options for this question are A, C, and E.

What do you mean by Operating system?

An Operating system may be defined as the type of program that is significantly loaded into the computer by a boot program and controls all of the other application programs within a computer.

It is a type of system software that typically controls computer hardware and software resources. It also delivers some common services for computer programs.

Devices like all types of computers, smartphones, embedded devices controlling robots, etc. required operating systems in order to function effectively.

Therefore, the correct options for this question are A, C, and E.

To learn more about Operating systems, refer to the link:

https://brainly.com/question/1763761

#SPJ5

In one of the cases in the textbook, Larry Gunter was a shipping clerk for a computer company that manufactured microprocessor chips. After learning that the chips were valuable, he stole three boxes and sold them to his girlfriend's father. Since the scheme worked so well the first time, he continued stealing and selling the chips, even letting a co-worker in on the scheme. How was the theft discovered

Answers

Answer:

The answer is "An inventory manager that served out an order noticed that most of the components were missing".

Explanation:

In case of the text book, it described that somehow the inventory manager found Larry, and what's really concerning is not because he was able to grab the chips although unpleasant things will happen, but even that they happened several times.

It includes one the means the controls of the business are extremely weak and bypassing them was never that complicated. If Larry's crimes were not identified by the warehouse manager, perhaps an investigator would have found them out, and other choices can't be described in the question, that's why it is correct.

Which musical instrument would have the lowest pitch ?

Answers

Answer: subcontrabass  tuba, then octocontra bass clarinet, then organ.

Explanation:

Bayley wants to connect a new external hard drive to his Windows PC. He wants the fastest connection type available because he plans to edit video directly to and from the external hard drive. Which connection type should Bayley use to get the fastest connection possible?

Answers

Answer:

Thunderbolt 3

Explanation:

Based on the scenario being described it can be said that in order to get the fastest connection possible Bayley needs a Thunderbolt 3 connection. This type of connection has become the standard due to it's theoretical maximum throughput of roughly 40 Gbps. This puts it at roughly double the speed of it's competing connection types, making it the fastest and best option.

Answer:

Thunderbolt 3

Explanation:

It is a hardware interface which was designed by Intel. The name actually depicts the pace at which it responds and performs compared to others.

George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates a pie chart. In this case, the information typed out by George in the two columns of an Excel sheet is known as a _____.

Answers

Answer:

data source

Explanation:

The main aim of a data source is for the gathering of all necessary information that is needed to access a data. Since he has used the information to create a pie chart, this means that some data were used for the creation of this pie chart. Hence the information used for the creation of the pie chart is the data source for the information illustrated on the pie chart.

If you were to mount a nonmetallic box to the front of a stud, what type of bracket should the box have? A. FP B. BP C. NP D. JP

Answers

Answer:

B. BP

Explanation:

If you were to mount a nonmetallic box to the front of a stud, the box should have a BP bracket.

If two different devices try to transmit to a common device at the same time, switches suffer from a problem in the collision domain. The packets are not readable and, in effect, dropped. The original transmitters each wait a random amount of time to retransmit in hopes of having a clear path. This is a common problem in modern network switches.T/F

Answers

Answer:

False

Explanation:

In Computer Networking, If two different devices try to transmit to a common device at the same time, switches break up the collision domain with each device connected to each port in order to achieve a faster throughput by expanding the broadcast domain.

A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured the workstation to full-duplex mode in order to enhance the network performance of the workstation. However, when the device is attached to the network, performance degrades and excess collision are detected. What is the cause of this problem?

Answers

Answer:

What led to the problem was because there was a duplex mismatch between the workstation and switch port.

You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:__________.

Answers

Answer:

Order Qualifier

Explanation:

An order qualifier is the features of an organization's product or service that is very much necessary to be present for the product or service to even be considered by a buyer. On the other hand, order winners are those features that will win the purchase. From the question, the speed and monitor screen size are the order qualifiers, while the weight and price are the order winners.

Final answer:

Speed and monitor screen size in the laptop purchasing decision are considered as screening criteria. Screening criteria are features an option must have in order to be considered further in the decision-making process.

Explanation:

In the context of this question related to purchasing a laptop computer, speed and monitor screen size are considered as screening criteria. Screening criteria are characteristics or features that an option must have in order to be considered further in the decision-making process. In this case, you narrow down your options based on two screening criteria - speed and screen size, and then make a final decision based on secondary criteria, which in this instance are weight and price.

Learn more about Screening Criteria here:

https://brainly.com/question/34705925

#SPJ3

what type of website is most likely to contain credible informtion

Answers

Answer:

Wikipedia. I know teachers hate it since it can be edited by anybody but it's got thousands of people checking credibility all the time.

Explanation:

websites that have .gov, .edu, and some could be .org

How do you rotate the graphic within a graphics frame without rotating the frame? To rotate a frame within a graphic, use the Direct Selection tool to select the frame within the graphics by clicking outside the content grabber. Then click the pointer slightly inside any of the six corner handles.

Answers

Answer:

Use the Selection tool to select the graphic within the frame by clicking within the content grabber. Position the pointer slightly outside any of the four corner handles and drag to rotate the graphic

Explanation:

The question already came with an answer; all needed was a little modification/addition to the given answer.

To rotate the graphic within a frame without rotating the frame;

We use the Selection tool to select the graphic within the frame by clicking within the content grabber. Position the pointer slightly outside any of the four corner handles and drag to rotate the graphic.

It is usually four corner handles not six as written in the question.

Final answer:

To rotate a graphic within a frame without affecting the frame, use the Direct Selection tool or Content Grabber to select the graphic, then hover near a corner handle until the rotation icon appears and drag to rotate.

Explanation:

To rotate the graphic within a graphics frame without rotating the frame itself, most graphic design programs like Adobe InDesign or Illustrator allow you to use the Direct Selection tool or the Content Grabber. Here is a step-by-step method to accomplish this:

Select the graphic frame that contains the image you wish to rotate.Switch to the Direct Selection tool, which allows you to select content within a frame separately from the frame itself.Click on the content grabber (a circle that appears in the center of the selected graphic) to select the graphic inside the frame.Once the graphic is selected, hover slightly inside any of the corner handles until the rotation icon appears. It typically looks like a curved arrow.Click and drag to rotate the graphic independent of its frame.

Note that the exact method may vary slightly depending on the software you are using, but the tools and the basic principles will be similar.

When providing a citation in a document, what information about the author should you include?

Answers

Answer:

The Name of the author, The name of the source etc

Explanation:

There is way more than one

What is the output of the following code? import java.util\.\*; public class Test { public static void main(String[] args) { List list1 = new ArrayList<>(); list1.add("Atlanta"); list1.add("Macon"); list1.add("Savanna"); List list2 = new ArrayList<>(); list2.add("Atlanta"); list2.add("Macon"); list2.add("Savanna"); List list3 = new ArrayList<>(); list3.add("Macon"); list3.add("Savanna"); list3.add("Atlanta"); System.out.println(list1.equals(list2) + " " + list1.equals(list3)); } }

Answers

Answer:

true false

Explanation:

list1 is assigned as Atlanta, Macon, Savanna

list2 is assigned as Atlanta, Macon, Savanna

list3 is assigned as Macon, Atlanta, Savanna

After these assignments,

The program checks if lis1 is equal to list2 and prints the result. Since both lists are equal, it will print true

The program checks if lis1 is equal to list3 and prints the result. Even though both lists contain the same elements, the order is different, it will print false.

Careers on the largest declining industries list will see an increase in the number of employees in their workforce.

True
False

Answers

The answer is False.

The word "declining" means going down. So, in this case, the employees would go down or leave.

Answer:

False

Explanation:

In a TCP half-open DoS attack, ________. Group of answer choices the attacker sends the final ACK of a session opening the attacker sends an RST segment Both the attacker sends the final ACK of a session opening and the attacker sends an RST segment Neither the attacker sends the final ACK of a session opening nor the attacker sends an RST segment

Answers

Answer:

Neither the attacker sends the final ACK of a session opening nor the attacker sends an RST segment

Explanation:

In Transmission Control Protocol (TCP), if a receiver receives a damaged TCP segment, it does nothing and usually TCP session opening ends with an acknowledgement, ACK message.

Additionally, in a Transmission Control Protocol (TCP) half-open DoS (denial of service) attack, neither the attacker sends the final ACK of a session opening nor the attacker sends an RST segment.

Other Questions
According to Piaget, an individual's cognitive development is driven by ____. an effort to understand and influence the surrounding environment an effort to satisfy the id while working with the superego the need to satisfy a deficient cognitive state the need for superiority due to innate deficiencies Cesium-137 has a half life of approximately 30 years. How much of a 40 g sample would be left after 90 years?A. 14.33 gB. 6.31 gC. 32.49 gD. 5 gE. 26.67 g It requires energy to bring two identical positive charges together. As these charges are brought closer together, the electrical potential energy will The weights of six animals at the zoom are shown in the table below 52438526685What is the mean absolute deviation? Round to the nearest tenth You have been given an elevation surface and asked to produce a raster indicating potential sites for a forest service radio relay tower that will send and receive radio transmissions to the main tower located near headquarters. The potential sites must be accessible by all-terrain vehicles (ATVs). Which of the following tools would be most helpful in this scenario? a) X Hillshade tool; Raster Calculator tool; Contour toolb) X viewshed; Raster Calculator tool; Contour toolc) X Raster Calculator tool; Aspect; Sloped) X Raster Calculator tool; Contour tool; Aspect toole) X Viewshed tool; Contour tool; Aspect toolf) X Viewshed tool; Hillshade tool; Contour tool Which statement best summarizes the rhetorical technique Roosevelt uses to persuade her audience? Roosevelt uses parallel structure when she quotes from the amendment to show its flaws. Roosevelt appeals to logic by urging members to seek a compromise on the amendment. Roosevelt repeats the word democratic to show why the Soviet amendment is dangerous. Roosevelt uses loaded language to provoke intense emotions in audience members. The year 1975 is usually cited as the year theVietnam War ended. Why? rewrite this fraction as a decimal 15/4 Study the example shown below.Which expression should replace the word "numerator" in the work shown?2x-822 - 7x+10X-3? - 7x+ 102x-8-(x-3)x2 - 7x+10numerator(x-2)(x-5)Ox-11x-53x-113x-5 O he was wearing dark glassesO he took a photo of themO he was the same man who sold Jake the mapO he had followed them all day A baker uses a coffee mug with a diameter of 8 cm8\text{ cm}8 cm8, start text, space, c, m, end text to cut out circular cookies from a big sheet of cookie dough. What is the area of each cookie? Find the slope of the line that passes through the two points below (-4,9) and (8,7) a large data sample of heights of US women is normally distributed with a mean height of 64.2 inches and a standard deviation of 2.6 inches. What is the approximate probability that a randomly selected person in this sample is shorter than 61.6 inches? (I need this by Tuesday the 22nd) Suppose that an inventor discovers a new chemical compound that can change the color of a person's eyes with no negative side effects. Since she holds a patent on this chemical, she has a monopoly over the sale of the new eye-color treatment. However, she's an inventor, not a businessperson. Which of the following statements explain to her how she should set the price for the eye-color treatment in order to maximize her profits? a) The inventor should produce an output that maximizes total revenue. b) The inventor should price her product so that price equals marginal cost for the marginal unit. c) The inventor should establish the marginal revenue and cost for each additional unit produced. d) The inventor should produce all the units for which marginal revenue equals or exceeds marginal cost. e) The inventor needs to establish the demand for her product using market research. f) The inventor needs to establish the supply for her product using market research. If the hypotenuse of a 30-60-90 triangle has length 15, then the shorter leg has length 5.5 6.5 7.5 According to the cell theory, how are bubble algae, or sea pearls made. 15grams of powder to make a 22oz shake.i make skakes for the week and plans to make 198oz. how many grams of protein will I use for the entire week? Why does the author describe Stanleys environment? Choose the best answer.to paint a picture of what camp looks liketo show that camp will be difficultto explain that not everyone is so badto joke about the camp not being green Sodium hydrogen carbonate (NaHCO3) , also known as sodium bicarbonate or "baking soda", can be used to relieve acid indigestion. Acid indigestion is the burning sensation you get in your stomach when it contains too much hydrochloric acid (HC1) , which the stomach secretes to help digest food. Drinking a glass of water containing dissolved NaHCO3 neutralizes excess HC1 through this reaction: HC1(aq) + NaHCO3 (aq) NaC1 (aq) + H2O (I) + CO2 (g) The CO2 gas produced is what makes you burp after drinking the solution. Suppose the fluid in the stomach of a man suffering from indigestion can be considered to be 50. mL of a 0.034 M HC1 solution. What mass of NaHCO 3 would he need to ingest to neutralize this much HC1 ? Be sure your answer has the correct number of significant digits. g Texas Corporation purchases a piece of equipment on January 1 for $300,000 and the equipment has an expected useful life of ten years. Its salvage value is estimated to be $20,000. Assuming Texas uses the double-declining balance depreciation method, what would be the accumulated depreciation at the end of the second year