20) Which of the following functions would take the word "Joe" (found in column A) and "Smith" (found in column B), and display "Joe Smith" in column C?

A. COMBINETEXT


B. TEXTJOIN


C. JOINTEXT


D. JOIN

Answers

Answer 1

Answer:

TEXTJOIN

Explanation:

TEXTJOIN is a common function of Ms Excel or Microsoft Excel

This function requires three arguments

delimiterignore_empty text1.
Answer 2

Answer:

TextJoin

Explanation:

Is the functions would take the word "Joe" (found in column A) and "Smith" (found in column B), and display "Joe Smith" in column C.


Related Questions

Name the test statement that can be used to test the following scenario:
The contents of the variable $TEST are equal to the string “success,” or the number 5, or the contents of the variable $RESULT.

Answers

The test statement is an illustration of conditional statements and logical operators.

The test statement is: if [[ "$TEST" == ”success” || "$TEST" == ”5” || "$TEST" == “$RESULT” ]]

How to name the test statement?

From the question, we have the following scenarios:

Determine if $TEST equals "success"Or $TEST equals "5"Or $TEST equals $RESULT

To do this, we make use of the if conditional statement and the or logical operator.

The or operator is represented with ||

Since the programming language is in php, the test statement is: if [[ "$TEST" == ”success” || "$TEST" == ”5” || "$TEST" == “$RESULT” ]]

Read more about conditional statements at:

https://brainly.com/question/24833629

i need the full code for 6.1.3 code hs circles and squares please answer please help

Answers

In this exercise we have to use the knowledge in computational language in python  to write a code with circles and squares.

how to draw geometric figures in python?

inputs = 100

radius

   draw_circle(radius);

   pendown()

   begin_fill()

   circle(radius)

   end_fill()

   penup()

left(90)

forward(radius*2)

right(90)  

penup()

setposition(0,-200)

color("gray")

bottom_radius = int(input("What should the radius of the bottom circle be?: "))

draw_circle(bottom_radius)

draw_circle(bottom_radius)

See more about python at brainly.com/question/18502436

What are the major benefits of preproduction?

Answers

Some of the benefits of preproduction are that it:

Saves time while producingKeeps you on a BudgetYou could have more time to think about how you are going to produce your production.

Hope this could help?

nivel 1: operadores pedir 2 números al usuario y Sumarlos, restarlos, multiplicarlo y dividirlos ​

Answers

Answer:

¿Esta pregunta no tiene ningún sentido?

Explanation:

¿que estas pidiendo?

What is information computer security

Answers

Answer:

Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Explanation:

1.Skills

1.SkillsThe Top Skills Required for Cybersecurity Jobs

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...An Understanding of Hacking

2.Thesaurus

ThesaurusCybersecurity refers to the practice of securing electronic devices from unauthorized access or attack or the measures taken in pursuit of this practice.

3.Risk assessment

Risk assessmentWhat does a cybersecurity risk assessment include? A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.

and last..........is four

4. Field

FieldDifferent branches of cyber security

FieldDifferent branches of cyber securityApplication security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.Data governance, risk and compliance.

what is the future of web development

Answers

Answer:

Creating websites that can execute automated tasks and new programing languages revolving around web development.

Explanation:

I need help with these certain questions on my activities in school

Answers

Answer:

*part 3 multiple choice*

1 d. none of the above

2d. water

3 a. insulator

*The Other Part*

4. electrons change direction of flow frequency in ""alternating current""

2. conductors

Name three things that get information into a computer?​

Answers

Answer:

Input devices do that. Three are the keyboard, a mouse, and a trackball.

Explanation:

9.12: Element Shifter
Write a function that accepts an int array and the array’s size as arguments. The function should create a new array that is one element larger than the argument array. The first element of the new array should be set to 0. Element 0 of the argument array should be copied to element 1 of the new array, element 1 of the argument array should be copied to element 2 of the new array, and so forth. The function should return a pointer to the new array. Demonstrate the function by using it in a main program that reads an integer N (that is not more than 50) from standard input and then reads N integers from a file named data into an array. The program then passes the array to your element shifter function, and prints the values of the new expanded and shifted array on standard output, one value per line. You may assume that the file data has at least N values.

Prompts And Output Labels. There are no prompts for the integer and no labels for the reversed array that is printed out.

Input Validation. If the integer read in from standard input exceeds 50 or is less than 0 the program terminates silently.

Answers

The Element shifter program illustrates the use of functions and arrays

Arrays are used to hold multiple valuesFunctions are used as subroutines of a program

The Element shifter program

The Element shifter program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

//This declares the ElementShifter function

int* ElementShifter(int *arr, int size){

   //This declares the new array

   int *newArr = new int[size * 2];

//The following loop populates the new array

   for (int i = 0; i < size * 2; i++) {

       if(i == 0){

           *(newArr+i) = 0;

       }

       else if(i < size+1){

           *(newArr+i) = *(arr+i-1);

       }

       else{

           *(newArr+i) = 0;

       }

   }

//This returns a pointer to the new array

   return newArr;

}

//The main method begins here

int main(){

//This declares and gets input for N

   int N;    cin>>N;

   int myArr[N];

//If N is between 1 and 50

   if(N > 0 && N <=50){

//This populates the array

       for(int i = 0; i<N; i++){

           cin>>myArr[i];

       }

//This calls the Element shifter function

   int *ptr = ElementShifter(myArr, N);

//This prints the new array

   for (int i = 0; i < N*2; i++) {

       cout << ptr[i] << " ";

   }

   }

  return 0;

}

Read more abou C++ programs at:

https://brainly.com/question/27246607

a) Explain any two problems associated with the existing system used by the organization. (25 marks)​

Answers

Answer:

Lack of Strategy

Many of the most common MIS issues can be traced back to a lack of a solid strategy. Information systems leaders are well aware of the many tools available to gather data on their network. But putting that information to use is often a challenge.

At one time, technology departments served as a separate operation, providing tech support and keeping an organization’s server equipment running. Today, MIS leadership often sits alongside other business leaders, working together to ensure that the technology being used supports the overall mission of the company moving forward.

Meeting Organizational Needs

MIS plays an ever-increasing role in organizations, with professionals relying on technology for every aspect of operations. Sales and marketing rely heavily on customer relationship software to track client interactions, for instance, while accounting needs its own software for billing, invoicing and financial tracking.

With more than half of all companies now relying on big data analytics, MIS is playing an even more important role. Before making a decision, today’s management teams are likely to pull reports on existing activity to ensure they use facts rather than make educated guesses.

Explanation:

Which evidence best addresses the counterclaim?

a story about a girl who becomes a professional athlete after she graduates
quotations from teens and parents who fight with coaches
a story about a boy who gets bad grades because he plays too many sports
an example of how sports may lead to many injuries


an exclamation point
an exclamation point

Answers

Answer:

A. a story about a girl who becomes a professional athlete after she graduates

Explanation:

i hope this helped

These are raised as livestock for meat and milk EXCEPT one
A. Hog
B. Goat
C. Carabao
D. Cattle

Answers

The livestock that is not raised for  meat and milk is  hog.

What are animals raised for meat?

Livestock are known to be some domesticated animals that are said to be raised in an agricultural farm to give labor and produce things such as meat, eggs, milk, etc.

The animals that are raised for their meat and milk are:

Boar BroilerCattle, etc.

Learn more about animals from

https://brainly.com/question/25897306

which of the following is an example of application software

Answers

Answer:

A messaging app

Explanation:

Its an software application you can download, so...yeah.

(You might've thought it was an anti-virus program lol)

Option-D.A messaging app is the correct answer.
A messaging app is an application software that can be installed jn your phone and computer in order to send messages.

What is an Application software?Application software is a type of computer application that performs specific professional, academic, and individualized functions.Each software is designed to assist users with a variety of tasks, some of which may be related to productivity, creativity, or communication.Word processors, media players, and accounting software are examples of application programs.An application program (also known as a software application, application, or app for short) is a computer program created to carry out a specific task other than one related to the operation of the computer itself.The term "app" typically refers to apps for mobile devices such phones. Applications may be published independently or packaged with the computer and its operating system software.They may also be written in proprietary, open-source, or project code.An application can work with text, numbers, audio, visuals, and a combination of these depending on the task for which it was created.Word processing is an example of an application package that focuses on a particular task.On the other hand, integrated software merges several programs.

To learn about the DIfference between application software and Opertaing system click here-
https://brainly.com/question/17798901

#SPJ2

Text based game project 1

Answers

Answer:

What is your question?

Explanation:

Which of the following are vector graphic file formats? Choose all that apply.

AI

PNG

RAW

SVG
Please help

Answers

There are different kinds of files. The option that is a vector graphic file formats is SVG.

What are vector files?

Vector files are known to be a type of images that are created by using mathematical formulas that stands as points on a grid.

The SVG  is known as Scalable Vector Graphics file and it is known to be a  vector image file format as it make use of geometric forms such as points, lines, etc.

Learn more about vector graphic file from

https://brainly.com/question/26960102

Answer:

AI and SVG

Explanation:

learned it from a comment i give all credit to them

Write a program that uses while loops to perform the following steps:
a. Prompt the user to input two positive integers. Variables: firstNum and secondNum
(firstNum must be less than secondNum) (use while loop); create a user-defined function
called validateUserInput() to validate the user's input. Use Call-by-Value.
validateUserInput() is a value returning function.

b. Output all odd numbers between firstNum and secondNum. (use while loop); create a
user-defined function called oddNumbers(). Use Call-by-Value. oddNumbers() is a void
function.

c. Output the sum of all even numbers between firstNum and secondNum. (use while
loop); create a user-defined function called sumEvenNumbers(). Use Call-by-Value.
Declare a variable called sumEven in the main() for the sumEvenNumbers().
sumEvenNumbers() is a valuereturning function. Use sumEven to hold a returned value.

d. Output the numbers and their squares between 1 and 10. (use while loop): create a
user-defined function called displaySquareNumbers(). Call-by-Value.
displaySquareNumbers() is a void function.

e. Output the sum of the square of the odd numbers between firstNum and secondNum.
(use while loop); create a user-defined function called sumSqureOddNumbers(). Use
Call-by-Value. Declare a variable called sumSquareOdd in the main(), for the

sumSqureOddNumbers(). sumSqureOddNumbers() is a value returning function. Use
sumSquareOdd to hold a returned value.

f. Output all uppercase letters. (use while loop); create a user-defined function called
displayUppercaseLetters(). Use Call-by-Value. displayUppercaseLetters() is a void
function.

Answers

The program is an illustration of the loop and functions

Loops are used to perform repetitive operationsFunctions are named code segments that ar executed when called or evoked

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This function validates the user input

def validateUserInput(firstNum, secondNum):

   if firstNum >= secondNum:

       return False

   return True

See attachment for the complete program

Read more about loops at:

https://brainly.com/question/19347842

Fumiko is a network technician. She is configuring rules on one of her company's externally facing firewalls. Her network has a host address range of 192.168.42.140-190. She wants to allow all hosts access to a certain port except for hosts 188, 189, and 190. What rule or rules must she write

Answers

The rule that she must write is that  A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

What is a Firewall?

A firewall is known to be a form of a network security device that helps one to manage, monitors and filters any form of incoming and outgoing network traffic.

This is often done based on an firm's formerly set up security policies. A  firewall is known as the barrier that exist between a private internal network and the public Internet.

See options below

What rule or rules must she write?

a) A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

b) Multiple rules are necessary for this configuration; one or more rules must define Deny exceptions for 188, 189, and 190, followed by the Allow rule for the 140–190 range.

c) A Deny rule is needed for 188, 189, and 190, and then exception rules for the 140–187 range.

d) The default Deny all rule needs to be placed first in the list, and then an exception rule for the 140–187 range.

Learn more about firewalls from

https://brainly.com/question/13693641

What should I do instead of listen to music?

Answers

You could watch a movie
Learn something new that you are interested in

One problem with backlighting is that your subject may squint.

True

False

Answers

Answer:

I would say that's False. Backlighting would be behind them. So they wouldn't need to squint.

Explanation:

A person entering the field of financial analysis
will end up taking what kind of classes in
college?
A. accounting
B. agriculture
C. astronomy
D. advertising

Answers

Answer:accounting

Explanation:

explains why it is important to select the correct data when creating a chart

Answers

Answer:

to be organized

Explanation:

because when you are organized to select the correct data, you won't confused

positive and negative of adblock plus

Answers

Answer:

Pros and cons of ad blockers

Remove distracting ads, making pages easier to read.

Make web pages load faster.

Keep advertisers from tracking you across websites.

Reduce bandwidth (especially important with mobile devices)

Reduce battery usage (again, important for mobile devices)

p

Difference between centralized and decentralized processing in computer

Answers

Answer:

Centralized computing is analogous to star topology in the networks where there is n entry and n-1 exit points. We see all the computation being carried out by the pivot processor and also embed in itself a decision routine for pass on the message to other linked systems. These systems are merely the mirror whereas the computing is done by the pivot processor.

Decentralized Computing is analogous to distributed node based processing where the topology for interaction among the nodes are random and hence some times there is delay because of the orientation of nodes by since the computation is disperse, it compensates in the time in processing, storage and retrieval.

You can definitely check into IBM and Amazon Research for examples for the Centralized and Decentralized computing.

what is computers machain?

Answers

Answer:

the electronic device which take data process it and give meaningful results is called computer machine

How many categories of computer do we have?

Answers

Answer:

The 10 types of computers include personal computers, desktops, laptops, tablets, hand-held computers, servers, workstations, mainframes, wearable computers and supercomputers.

What command allows the root user to create a crontab file for the user jdoe?

Answers

The command allows the root user to create a crontab file for the user jdoe is As root, execute crontab -e jdoe.

What is the command in crontab?

The crontab command is known to be that often submits, make some editing, lists, or delete cron jobs.

Note that A cron job is a type of command that is often aided or  run by the cron daemon at  a consistent and scheduled times.

Conclusively, The  As root, execute crontab -e jdoe command will give room for the root user to create a crontab file for the user named jdoe.

Learn more about command form

https://brainly.com/question/25243683

every CAD application comes with a color menu to help you tailor your selections, mix them properly, and apply them in ways that meet your artistic expectations

true or false

Answers

every CAD application comes with a color menu to help you tailor your selections, mix them properly, and apply them in ways that meet your artistic expectations is a true statement.

What is a color CAD?

In a CAD system, there is found to be colors that are known to be often and  most commonly used to depict line weights.

Note that selecting different colors is easy using varying line thickness. One can then use these colors into layers to smooth the visibility of drawing components that you wants.

Learn more about CAD application  from

https://brainly.com/question/9222927

Answer:true

Explanation:

what is containment and why is it part of the planning process

Answers

Answer:

Isolating affected channels, processes, services, or computers; stopping the losses; and regaining control of the affected systems. It is part of the planning process to identify the best containment option for each scenario or system affected.

Explanation:

what is the name of the extension used to save publisher

Answers

Answer:

PUB

Explanation:

PUB IS THE NAME OF THE EXTENSION USED TO SAVE PUBLISHER

The major goal of a good web information
a
retrieval system is

Answers

Answer:

Explanation:

The major objective of an information retrieval system is to retrieve the information – either the actual information or the documents containing the information – that fully or partially match the user's query.

Other Questions
If a floor plan has a key for 1 graph paper line = 5 ft in real life, what is the area of a rectangular room in real life if the area on the floor plan is 44?*HINT: the key is for a dimension, but your answer is an area.* Why do you think it is important to be able to summarize a text Which membrane protein maintains the concentration gradients of ions across a neuronal membrane?. Find the interest rate for a principal of $9442 and charged $30233 in interest for 18 years. A student rounded 3872 to the nearest hundred and to the nearest thousand. The student noticed that the results, 3900 and 4000, were not equal. The student claimed that the two results will never be equal when a number is rounded to the nearest thousandwhat TWO numbers could be used to show that the student's claim is incorrectselect TWO correct answers.A. 43,594B. 55,962C. 67,299D. 72,357E. 81,974 Jose has scored 330 points on his math tests so far This semester. To get an for the semester he must score at least 425 points. Write and solve an inequality to find the minimum number of points he must score on the remaining tests,n, to get an A. El equipo _________ al bisbol. Welcome to the brainiest championship answer the question and you win a brainiest. Select the correct answer.The equation of a line is y = -3x 2. What are the slope and the y-intercept of the line?Question 9 options:slope = -3 and y-intercept = 2slope = 3 and y-intercept = -2slope = 3 and y-intercept = 2slope = -3 and y-intercept = -2 pls help will give brainliest help me please help please gelp Which property of multiplication is shown below?If x = a + bi and y = c + di, x y = y x.commutative propertyidentity propertydistributive propertyassociative property 2. What is needed for water to change from liquid from a gas? 6. Which of the following best defines a defendant? A. A person accused of a crime. B. A person who is victimized by a crime. C. The states accuser. D. A person who has been found guilty of a crime. PLEASE HELP ASAP W EXPLANATION !!!Based on the net shown below, what is the type of solid this represents and find the surface area of the solid to the nearest hundredth. my brain is not working at the momentgdshbjn how are genetically modified organisms beneficial? list 3 ways on how I need help on this question please 'religious people should always forgive those that commit crime'12 marks3 paragraphs for the statement.3 paragraphs against the statement.1 conclusion.I need this asap thankyou You are visiting family in tennessee. one morning, the weather is warm and humid. which type of air mass is most likely causing this weather?