What are uses of Spreadsheet

Answers

Answer 1

Answer: The three most common general uses for spreadsheet software are to create budgets, produce graphs and charts, and for storing and sorting data. Within business spreadsheet software is used to forecast future performance, calculate tax, completing basic payroll, producing charts and calculating revenues.

Explanation:

Answer 2

Answer: You can use it to storing and sorting data and to produce graphs  , it also has other uses.


Related Questions

Some automated troubleshooting programs identify certain keywords in the customer’s query to provide potential solutions to the query. For example, ‘There is no display on my mobile phone screen.’ The keywords ‘display’ and ‘phone’ would link to common problems with a phone display. Analyse the requirements for this system and design, develop, test and evaluate a program to identify keywords in a query typed in by the user and provide a linked solution to common problems related to a mobile device from a selection stored in a text file or database. You will need to identify appropriate keywords that can be linked to general advice related problems. You need to account for variations in the form of the user input e.g. one user may query ‘There is no display on my mobile phone’, another user may query ‘My phone screen is blank.’

Answers

We may group all terms into four basic types of intent when conducting research to determine a user's motivations for conducting a search: commercial, transactional, informational, and navigational.

What is navigate?

The term navigate is a field of study that concentrates on the process of observing and controlling the movement of a trades or vehicle from one place to another field of navigation includes four general collections: land navigation, marine navigation, aeronautic navigation, and space navigation

A database table's records are retrieved using a SQL SELECT statement in accordance with clauses (such as FROM and WHERE) that define criteria. As for the syntax: the following query: SELECT column1, column2 FROM table1, table2 WHERE column2='value';

Therefore, a user's motivations for conducting a search: commercial, transactional, informational, and navigational.

Learn more about navigating here:

https://brainly.com/question/8888625

#SPJ1

when blogging for business, you can write without using proper grammatical conventions, as long as you write with an authentic voice. True or False

Answers

The given statement is false because, when you write blogs for business, you cannot write without using proper grammatical conventions, just only with an authentic voice.

A business blog is a regular feature representing part of an online publication that generally relates to a particular, service, product, or topic. A business blog consists of personal commentary and articles by one or multiple authors. The business blog is usually appearing on a company’s website; some business blogs may feature on an independent commentator’s site.

Whenever a business blog is written it is ensured that the author makes it error-free if there are any grammatical or spelling errors. For this purpose, the author requires to make use of proper grammatical conventions with an authentic voice.

You can leran more about blogging at

https://brainly.com/question/10893702

#SPJ4

select one or more: group of answer choices it is best practice to create one maintenance plan to support all databases for an instance a database user needs to be a part of the sysadmin role in order to execute sql server agent jobs database maintenance plans do not require sql server agent sql server job schedules can be attached to multiple sql server agent jobs or none at all sql server agent jobs cannot be run simply based on cpu idle time; a specific start time is required each sql server instance has its own sql server agent process database maintenance plans help automate many standard dba maintenance tasks.

Answers

A database maintenance plan is a list of specified, preventative actions that must be taken on a regular basis to maintain the performance and availability of databases.

Open the SQL Server Enterprise Manager, then go to your server using the hierarchy. Expand the Management folder under the server. To launch the Database Maintenance Plan Wizard, right-click Database Maintenance Plans under Management and choose New Maintenance Plan. To guarantee the availability and performance of the database, you must monitor and improve the database server. Updating statistics, tracking database, server, and space usage, and organizing backup and recovery plans are all part of maintaining DB2 and Oracle databases.

Learn more about database here-

https://brainly.com/question/6447559

#SPJ4

In HTML, write a short paragraph describing something from a book or movie (two or three sentences). Be sure to mention the book or movie title in the paragraph, and format appropriately.

Answers

To write in HTML, you need to understand the format of the HTML itself. This is an example how to write a paragraph in HTML.

<html>

   <head>

       Black Adam

   </head>

   <body>

       <p>Black Adam is one of DC movies that airs in 2022.</p>

       <p>Directed by Jaume Collet-Serra, and featuring Dwayne Johnson as Black Adam.</p>

       <p>Black Adam is rated for PG 13.</p>

   </body>

</html>

First, you need to define what language you want to write in this case, it's HTML so write <html> and don't forget to complete with </html> at the end.Next, there is two part in html which is head and body. Head or header is intended for the name of the website, in this case it's the movie name. While body is intended for the content of the website, or in this case it's the paragraph.Next, you need to write the sentence to make a paragraph. In order to to that, you need to write <p> follows by the sentence and complete with </p>.

Learn more about HTML here

https://brainly.com/question/7169423

#SPJ1

What is strong password policy?

Answers

A strong password policy states that a secure password must have at least 8 characters for your computer or computer network. Any of your private information, such as your real name, username, or business name, should not be included. It ought to differ significantly from the passwords you've previously used. It shouldn't contain any words that are completely spelled.

What is Cybercrime?

Cybercrimes are crimes committed via a computer or computer network. Either the computer was the target of the crime or it was employed in its commission.

Cybercrime is an illegal action that either targets or makes use of a computer, computer network, or networked device. It may compromise someone's security or financial stability.

Most cybercrimes are performed by hackers or cybercriminals who are motivated by financial gain. Both individuals and organizations are capable of committing cybercrime. Some cybercriminals are well-organized, employ cutting-edge methods to hack your computer network, and possess exceptional technical proficiency. Some hackers are amateurs.

To learn more about Cybercrime, use the link given
https://brainly.com/question/13109173
#SPJ4

listen to exam instructions a user calls the help desk. each time he creates a new text file, permissions of 640 are applied to the file, and he must use chmod to set them to 644. what command should you enter in the user's profile to set the default permission for newly created files to 644?

Answers

umask 0022 is the command that should be entered in the user's profile to set the default permission for newly created files to 644.

Mention any ten LINUX commands.

ls - The most frequently used command in Linux to list directories.pwd - Print working directory command in Linux.cd - Linux command to navigate through directories.mkdir - Command used to create directories in Linux.mv - Move or rename files in Linux.cp - Similar usage as mv but for copying files in Linux.rm - Delete files or directories.touch - Create blank/empty files.ln - Create symbolic links (shortcuts) to other files.cat - Display file contents on the terminal.

To learn more about LINUX commands, use the link given
https://brainly.com/question/28331559
#SPJ4

given that integer array x has elements 5, 10, 15, 20, what is the output?

Answers

Note that where the integer array x has elements 5, 10, 15, 20 the output will be "Error: Invalid access" (Option D)

What is an integer Array?

An integer array is a collection of integers or "whole numbers" that may be used for a variety of computations. An integer is a number that has no fractions. Integers are entire integers that may be both positive and negative, such as zero, one, and a negative one.

In mathematics, integer arrays are often utilized. The array might be specified within parenthesis for use in a computation or equation. The array can be as big or small as needed. The array is a commonly used mathematical concept in computer programming.

Arrays use a single identifier to represent numerous data components of the same kind. The index number makes it simple to access or search for an element in an array. An array may be simply accessed by incrementing the index by one.

Learn more about Integer Array:
https://brainly.com/question/15048840
#SPJ1

Full Question:

Given that integer array x has elements 5, 10, 15, 20, what is the output?

int i;

for (i = 0; i < 4; ++i) {

System.out.print(x[i] + x[i + 1]);

}

Question options:

A) 10, 15, 20, 5

B) 15, 25, 35, 25

C) 15, 25, 35, 20

D) Error: Invalid access

create a phone book program that enables users to enter names and phone numbers of friends and acquaintances. create a structure to hold contact information, and use calloc() to reserve the first memory segment. the user should be able to add or modify phone book entries through a menu. use the realloc() function to add contiguous memory segments to the original memory block when a user adds a new phone book entry.

Answers

The phone book program that enables users to enter names will be:

#include<stdio.h>

#include<stdlib.h>

struct phonebook{

char name[10];

double phoneno;

};

int main()

{

int t,i,total;

typedef struct phonebook phone;

phone *arr;

arr = (phone *)calloc(1,sizeof(phone));

printf("want to add a phone number:(0/1)\t");

scanf("%d",&t);

i = 1;

while(t!=0)

{

printf("enter name:\t");

scanf("%s",arr[i-1].name);

printf("enter phoneno:\t");

scanf("%lf",&arr[i-1].phoneno);

printf("want to add a phone number:(0/1)\t");

scanf("%d",&t);

i++;

arr = (phone *)realloc(arr,i*sizeof(phone));

}

total = i;

for(i=0;i<total-1;i++)

{

printf("name:\t%s",arr[i].name);

printf("\tphoneno:\t%.0lf\n",arr[i].phoneno);

}

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

Source code refers to a computer program in its human-readable form. The program based on the information is illustrated above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

consider the following indicators in the ir process. no incident response plan no recording of commands failure to control access to digital info failure to report what best describes this status?

Answers

A phrase which best describes the aforementioned status in an incident response (IR) process is common forensic mistakes.

What is incident management?

Incident management can be defined as a strategic process through which a business organization (company or firm) identifies, analyzes, and correct hazards and potential problems, in order to ensure that normal service operation is restored as quickly as possible to its end users after a disruption, as well as to prevent a re-occurrence of these hazards and mistakes in the future.

Generally speaking, some examples of common forensic mistakes (indicators) in an incident response (IR) process include the following:

"No incident response plan.""No recording of commands." "Failure to control access to digital info.""Failure to report.""Underestimating the scope of an incident."

Read more on incident management here: brainly.com/question/11595883

#SPJ1

create a traffic light control program that will do the following things: 1. remove the traffic control logic from the main program. 2. add methods to the traffic light objects that will (1) allow them to talk to each and (2) control how they display green / yellow / red.

Answers

The color of the traffic light, Red indicates a stop or a danger sign, yellow indicates caution, and green indicates you may start walking with caution. Typically, red lights contain some shades of orange, and green lights contain some shades of blue.

Traffic light explanation

Each installation of a traffic light aims to have one or more of the following functions: to obtain an orderly traffic movement, to increase the traffic capacity at crossroads, to reduce the frequency of certain types of accidents. The whole world must use the same traffic lights in terms of colors, namely red, yellow and green.

Learn more about traffic lights:

brainly.com/question/28033780

#SPJ4

we are going to revisit our course assignment. however, there is going to be some changes. stop when and only when the user has exactly five courses. whenever the user must add courses, accept a comma-separated list of courses, and add each of them. o before adding the course, remove any whitespace around its name, and correct its capitalization. whenever the user must drop courses, accept a comma-separated list of courses, and delete each of them. o treat the names the same way as you add them and the comparisons will be easy. o you need to check for, and ignore, courses the user is trying to drop courses they are not taking!

Answers

Using the knowledge in computational language in python it is possible to write a code that comma-separated list of courses, and delete each of them.

Writting the code:

def printCourses(l):

   if len(l)==0:

       print("You aren't currently taking any courses.")

   else:

       print('You are currently taking these courses:')

       for i in range(len(l)):

           print(str(i+1)+': '+l[i])

#main

l=[]

printCourses(l)

while(len(l)!=5):

   if len(l)<5:

       s=input('What courses would you like to take? ')

       s = s.split(',')

       for i in s:

           l.append(i.strip().capitalize())

   else:

       s=input('What courses would you like to drop? ')

       s = s.split(',')

       for i in s:

           if i.strip().capitalize() in l:

               l.pop(l.index(i.strip().capitalize()))

   printCourses(l)

See more about python at brainly.com/question/12975450

#SPJ1

How do you use the fill handle to copy the formula in cell b11 to cells C11 and D11?

Answers

Cell C11 contains the formula you want to copy. Observe the fill handle located in the lower-right corner. Place your mouse over the fill handle, until the arrow becomes a black cross. Drag the fill handle across the cells D11 and E11 and then release the mouse button.

What is MS-Excel?

Microsoft's spreadsheet program Excel is a part of the Office family of products used for commercial applications. Users of Microsoft Excel can format, arrange, and calculate data in a spreadsheet.

What is spreadsheet?

A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns. One of the most used tools for personal computers is the spreadsheet. In general, a spreadsheet is made to store numerical data and short text strings.

To fill handle to copy the formula in cell b11 to cell c11 and D11:

Select the range B8:E8.Choose Fill from the Edit menu, and from the Fill submenu choose Right.Select cell C11 and enter the formula =B11*1.02.Select the range C11:C13 and choose Fill from the Edit menu, and from the Fill submenu choose Down.

Learn more about MS Excel click on this:

https://brainly.com/question/24749457

#SPJ4

Before you use a plugin, you have to know all but one of the following. Which one is it?

a. the options that it provides
b. the HTML that it requires
c. the methods that it provides
d. how its CSS works

Answers

Answer:

d. how its CSS works

Explanation:

A JavaScript utility called PostCSS converts your CSS code into an abstract syntax tree (AST) and then offers an API (application programming interface) for JavaScript plugins to analyze and change it. It offers a wide range of plugins to carry out various tasks, like linting, minifying, inserting vendor prefixes, and many other things.

Postcss-import is one of the most fundamental and crucial plugins to utilize. We can import CSS files into other files using it. Visit src/style.css in the postcss-tutorial repository to see how to utilize this plugin.

Click here to learn more about CSS here

https://styleguide.brainly.com/220.4.0/docs/

#SPJ4

Select the statement XXX that will correctly swap the values in smallArray[0] and smallArray[2].
int temp;
int smallArray[] = {5, 12, 16};
XXX

Answers

The statement XXX that will correctly swap the values in smallArray[0] and smallArray[2] are:

temp = smallArray[0];

smallArray[0] = smallArray[2];

smallArray[2] = temp;

What is a statement in coding?

A statement is a grammatical unit of an imperative computer language that expresses some action to be performed. A program developed in this language is made up of a series of one or more statements.

A program code can contain a variety of statements that regulate the input and output of the tasks that the program is supposed to do.

A coding instruction that is used to compare data, express and make judgments. A conditional statement instructs a program to do action based on whether a condition is true or false. It's frequently expressed as an if-then or if-then-else expression.

Learn more about statements:
https://brainly.com/question/13735734
#SPJ1

What is the benefit of password policy?

Answers

Answer:

Passwords provide the first line of defense against unauthorized access to your computer and personal information. The stronger your password, the more protected your computer will be from hackers and malicious software. You should maintain strong passwords for all accounts on your computer. While you may not be able to control user's activities 100%, it enables you to guide them for their own safety.A password strength rule is a rule to which a password must conform. For example, password strength rules might specify that the minimum number of characters of a password must be 5.

The standards for judging whether a new password is secure are set forth in a password policy.

For instance, password strength guidelines can mandate that a password have a minimum of five characters.

What is IBM® Security Privileged?

Privilege credential and access management, application identity management, and session recording are all provided by an appliance-based solution known as the IBM® Security Privileged Identity Manager.

A password policy specifies the requirements that passwords for a service must meet, including the minimum length and character types that are acceptable and unacceptable. The password policy may further specify that if a word is in a dictionary of objectionable words, it is prohibited from being entered. Before selecting this option in the user interface, you must first load a dictionary.ldif file into the IBM® Security Privileged Identity Manager.

The following standards and other guidelines for passwords are available to you:

The shortest and longest lengthslimitations on charactersReusing passwords frequentlyUser IDs or names that are not permittedSet a password's minimum age.

Establishing password guidelines:

An administrator can create a password policy to be used with one or more services. A rule that states that a character can only be used three times in a password, for instance, could be established in your password policy.

Making a rule for password policies:

As an administrator, you can add a rule to an existing password policy. For example, you could create a rule that requires a minimum number of digits in a password.

Altering the password guidelines:

An administrator can change a password policy to conform to your company's password requirements. For instance, you could change a password policy to state the required minimum and maximum number of characters.

Altering a password policy stipulation:

A password policy rule may be modified by an administrator. You may, for instance, modify or eliminate the settings for an existing rule.

A password policy being deleted:

A password policy that is no longer required to regulate password entries can be deleted by an administrator.

Individual password guidelines:

The IBM Security Privileged Identity Manager server allows you to include special logic for password generation. The logic can be added using a particular rule, a customized generator, or a mix of the two.

Learn more about password policy click here:

https://brainly.com/question/28389547

#SPJ4

computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans. true false

Answers

It is true, robots and computers can not only perform a range of routine physical work activities better and more cheaply than humans.

What is the difference between robots and humans?

According to the neuroscientist, that's exactly what it is, the difference between the value and price of personal experiences – what differentiates us from robots. “Human experiences have another level of complexity and many of them cannot be replaced in depth by any machine”, he adds.

In addition to repetition, robots help humans with their precision, which is far superior in all aspects. If built correctly, it can perform millimeter movements without any deviation, something beyond most people's capabilities.

See more about robots at brainly.com/question/15561225

#SPJ1

write a program that operates like a cashier terminal in a grocery store. it begins by prompting for the number of different items being purchased and then starts a loop. in the loop, the program should prompt for the item description, price and quantity of each item being purchased. these three values should be passed as arguments to a custom function that is defined in a separate module file. the imported function should print the subtotal for the item and return it to main. the total should be printed in main after the loop ends.

Answers

Using the knowledge in computational language in python it is possible to write a code that operates like a cashier terminal in a grocery store.

Writting the code:

def subtotal(description, price, quantity):

total = price * quantity

print("Item: " + description + ", subtotal: $" + str(round(total, 2)))

return total

import subtotal

num = int(input("How many different items are being purchased? "))

total = 0

for i in range(num):

desc = input("Enter description of item " + str(i+1) + " ")

price = float(input("Enter price of item " + str(i+1) + " "))

quant = int(input("Enter the quantity for item " + str(i+1) + " "))

total = total + subtotal.subtotal(desc, price, quant)

print("\nYour total is $" + str(round(total, 2)))

See more about python at brainly.com/question/12975450

#SPJ1

To decompress a file using the gzip command, which parameter do you need to use?.

Answers

Gzip has compression levels ranging from 1 to 9, with 9 providing the highest compression but the slowest performance.

A nice balance between speed and compression ratio can be found in the default compression level of 6, which is 6. HTTP compression, a method for accelerating the transmission of HTML and other content on the World Wide Web, uses the gzip format. According to RFC 2616, it is one of the three accepted formats for HTTP compression. We may use gunzip with filename as an input to recover our original, uncompressed file. 7. Gzip cannot be used to uncompress files. Utilizing the gzip function is quite easy. You only need to type "gzip" and the file's name to compress it.

Learn more about compression here-

https://brainly.com/question/13707757

#SPJ4

a netbios suffix may identify a computer or server being enumerated as a domain controller. why do hackers often exert more effort to attack computers identified as domain controllers?

Answers

Hackers frequently expend more effort attacking domain controllers because they provide more information, such as logon names for user accounts and network resources.

What is Domain controllers?

On computer networks, a domain controller is a server that responds to authentication requests and verifies users. Domains are a hierarchical method of organizing users and computers that share a network. The domain controller organizes and secures all of that data

The domain controller (DC) is the box that houses the kingdom's keys—Activ Directory (AD). While attackers can use a variety of techniques to gain elevated access to networks, including attacking the DC itself, you can not only protect your DCs from attackers, but also use them to detect cyberattacks in progress.

To learn more about Domain controllers, visit: https://brainly.com/question/25664001

#SPJ1

Which excel feature allows you to select all cells in the column with inconsistent formulas.

Answers

CTRL + D is used to fill the formula column down

What is the feature?

Hold down the SHIFT key while pressing one of your arrow keys, selecting the cell containing the erroneous formula, and then releasing the SHIFT key. This will select all the cells, including the one that is inconsistent. then choose one of these: To fill the formula down, press CTRL+D while selecting the cells below.

Excel's Go To Special Function[1] enables you to quickly choose all cells that match a set of requirements, such as cells that contain: Formulas (numbers, text, locals, errors) (numbers, text, locals, errors) Constants (text, numbers, logic, and mistakes)

Hence to conclude that CTRL+D excel feature allows you to select all cells in the column with inconsistent formulas.

To know more about the ctrl+D option and excel features follow this link

https://brainly.com/question/24749457

#SPJ4

Other Questions
Write an explicit equation for the followingsequence:4/7,-4, 28, -196, 1372, ... when preparing the statement of cash flows most companies use the write an equation in STANDARD FORM of the line that passes through (-6,-10) and has the slope m=1/6 a group of friends wnats to go to the amusement park.They have no more than $110 to spend on parking and admission.parking is $8 and tickets cost $23 per person including tax Find the xx-intercept of each line defined below and compare their values.Equation of Line A:y-2=-(x+1)Select values from Line B: x y2 0-1 -30 -6 Which option would provide Louise with the most diversity in the following scenario?Louise needs to do a report on forest biomes. She has to write ten pages and choose an option that will provide herwith ample information on many different plants and animals.O boreal forestsO deciduous forestsO lowland forestsO tropical forests Bijou says the following steps can be used to find 0.62 of 7:Step 1 Change "of to the multiplication symbol.Step 2 627=434Step 3 There are 0 decimal places in 7 and 2 decimal places in 0.62 for a total of 2 decimal places in the factors.Step 4 Move the decimal place in the product 2 places to the right to find the solution: 0.62 of 7 is 43,400.In which step did she make her first error? What will the density be if the radius of the sphere is halved, compressing the air within?. Noah borrows \$2000$2000dollar sign, 2000 from his father and agrees to repay the loan and any interest determined by his father as soon as he has the money. The relationship between the amount of money, aaa, in dollars that noah owes his father (including interest), and the elapsed time, ttt, in years, is modeled by the following equation. A=2000e^{0. 1t}a=2000e 0. 1t a, equals, 2000, e, start superscript, 0, point, 1, t, end superscript how long did it take noah to pay off his loan if the amount he paid to his father was equal to \$2450$2450dollar sign, 2450? give an exact answer expressed as a natural logarithm. a technique used whereby the therapist directs family members to continue there symptomatic behavior. in an experiment, people rated cartoons as funnier when they held a pen between their teeth than when they held a pen between their lips. in this experiment, cartoon ratings are the: 3. Corey is playing a game in which he selectsall of the numbers that are less than -5 butgreater than -20. Shade the values that Coreyshould choose.-97 -56-3 -11-15180 I'm very confused. Can someone p|z explain what's happening here? (view screenshots below)(I drew a cursor on most of the pictures because I can't screenshot with my cursor meaning when I take a screenshot, my cursor will disappear and so I drew the cursor on the pictures so that way you could see where I was clicking) Those who examine external forces on behavior take the side of ________, while those who focus on internal factors take the side of ________. if you run the acetylation reaction (part 1) using the exact amounts described in the procedure, what is the limiting reagent? according to the patriots, the never-ending violations of american rights by the british government led to revolution, war, and ultimately the disruption of the empire. what evidence is there that the british were to blame for provoking the americans? reese is comparing retirement plans with prospective employers. abc, inc., offering a salary of $52,000, will match 75 percent of his contributions up to 10 percent of his salary, his maximum contribution. xyz company will match 100 percent of this contribution up to 6 percent of salary, but he can contribute up to 15 percent of his income. xyz company is offering a $48,000 salary. if reese assumes that he will contribute the maximum amount allowed and keep these first-year retirement funds invested for 30 years with a 9 percent return, how much would each account be worth? if 40-year-olds and 60-year-olds show differences in intelligence test scores, the differences in the test scores mary and david are married, and bob is their only son. if mary purchases a life insurance policy that pays benefits to bob if david dies, mary is considered: a. a policyholder. b. an insured. c. both an insured and a beneficiary. d. a beneficiary. Eating and Being Human