Answer:
See the bottom status bar of excel, it will show the average, count and sum of values in the selection.
Which focal length and aperture combination is most likely to give you a deep depth of field?
a)50mm f2
b)120mm f4
c)18mm f22
d)120mm f5.6
50 points and brainliest mark
Answer:
f/11 is the answer I think
Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
Answer:
Trace Precedent
Explanation:
Trace Precedent is a Microsoft Excel tool that is mostly used in auditing work to evaluate the connection or linkage between the cells in a spreadsheet. It is used to display the cells that are referred to by a formula in the selected cell. This is to locate the basis of an error in knowing how the formulas are adapted.
This can be done by clicking on the Formulas tab, then click on Formulas Auditing, then click on Trace Precedents.
Hence, in this case, the correct answer is TRACE PRECEDENTS.
True or false?
as the speed of a vehicle increases the amount of tire tread touching the road also increase.
describe the impact of technology in your life . how does it affects your human relations with other people .
Answer:
Technology has a huge impact on my life, it has helped me visit places, talk to people, and captivate me. For example, using a car I have visited my friends and family. This is making a stronger bond with those people I visited. And, using my phone I can call and text people. this has led to making lots of friends and stronger relationships. Technology is important for human contact unless you want to ride carriages around the streets.
If you are working on doing senior portraits and want a lens that will give you the best shallow depth of field which lens would you choose?
a) 55mm f1.2 (focal length of 55mm, maximum aperture of 1.2)
b) 28-80mm f4.5 (Zoom lens with focal length from 28-80mm, max aperture 4.5)
c) 18mm f5.6
d) 50mm f1.4
45 points and brainliest
Answer: The answer is C Hope this helps :) Please mark Brainliest
Explanation:
Answer:
c) 18mm f5.6
Explanation:
For the best lens that offers the best shallow depth of field, you need to choose the one with the maximum apertature but does not zoom.
Hence choice c) has the maximum aperture and does not zoom.
Hope this helps :)
The Boolean operators include which of the following?
A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not
Answer:
The answer is A. and, or, not
Explanation:
Using a Boolean search can help narrow your results. A Boolean search is a query that uses the Boolean operators AND, OR, and NOT, along with quotation marks, to limit the number of results. For example, searching the terms Alexander the Great AND conquests will provide results about Alexander, great, and their conquests.
g Create a Java program that takes input of a list of integers from the user, stores them into an array and then finally uses the array contents to output the list of integers in reverse. The user's input begins with the number of integers to be stored in the array. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.Create a Java program Ex: If the input is: 8 5 2 3 4 10 6 8 9
Answer:
import java.util.Scanner;
public class Main{
public static void main(String[] args) {
int arraylent;
Scanner input = new Scanner(System.in);
System.out.print("Array Length: ");
arraylent= input.nextInt();
int[] myarray = new int[arraylent];
for(int i = 0; i<arraylent;i++)
myarray[i] = input.nextInt();
for(int i = arraylent-1; i>=0;i--)
System.out.println(myarray[i]);
}
}
Explanation:
This declares the length of the array
int arraylent;
This next two lines prompt and get the array length i.e. number of input
System.out.print("Array Length: ");
arraylent= input.nextInt();
This declares the array as type integer. And the length of the array is gotten from the user input
int[] myarray = new int[arraylent];
This gets the items of the array
for(int i = 0; i<arraylent;i++)
myarray[i] = input.nextInt();
This reverse and prints the array
for(int i = arraylent-1; i>=0;i--)
System.out.println(myarray[i]);
Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second, regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor
Answer:
When the transmission exceeds 667 packets
Explanation:
In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.
A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.
User max owns a directory games, containing a text file called ourgames.txt that he shares with users belonging to the group gameplayers. Those users may read and execute this file, but not delete it. They may not add other files to the directory. Others may neither read, write, nor execute anything in games. What would be the appropriate ownerships and permissions for both directory games and the file ourgames.txt look like
Answer:
The directory games folder: drwxr-x---
ourgames.txt files : -rwxr-x---
Explanation:
The directory games and the ourgames.txt file are owned by max who has read, write and execute permissions for both, where the 'd' in the first column represents the directory. The gameplayers group has read and execute permissions represented by the 'r' and 'x' letters. The other group is the third section with just dashes which means no permission is granted for the file.
how ssd is better than normal sata and pata HDD
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
explain the major innavotions made from the establishment of abacus
Answer:
The major innovations made from the establishment of abacus is explained below in details.
Explanation:
Industrial Age - 1600
John Napier, a Scottish aristocrat, and statesman dedicated much of his relaxation time to the knowledge of mathematics. He was particularly involved in devising ways to aid calculations. His greatest offering was the discovery of logarithms. He recorded logarithmic measures on a set of 10 boarded rods and thus was capable to do multiplication and division by equaling up numbers on the sticks. These enhanced identified as Napier’s Bones.
Exodia
Principle of Computer Operation
Answer:
????
Explanation:
The OpenMP critical-section compiler directive is generally considered easier to use than standard mutex locks, because
Complete question
A) management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors.
B) programmers don't need to worry about race conditions.
C) a thread cannot block inside a critical section.
D) deadlock cannot occur.
Answer:
A. Management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors
Explanation:
This is a multiple choice question and this is the answer because:
1. OpenMp is inclusive of an APL/compiler directives:
2. any code which follows #pragma omp parallel is a parallel region and it is performed by large number of threads that are same as the number of processing cores that are in the system.
3. The critical-section compiler directive acts more like a binary semaphore or mutex lock,it makes sure that only one thread is active in the critical section at the same time.
Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.
A. export
B. sort
C. link
D. import
Answer:
pretty sure that it would be A. Export :)
----------------------------------------------------------------------------------------------------------------
Explanation:
Because B and C don't make too much sense, and D would mean to 'bring in' and A means the opposite, which is take out.
A formal method for designing and representing human-computer interaction dialogues using box and line diagrams is called:________.
Answer:
Dialogue Diagramming
Explanation:
Dialogue is simply a sequence of interaction that usually occurs between a user and a system.it consists of Designing the dialogue sequence, Building a prototype and Assessing Usability
Dialogue diagramming is a known widely anf formal means by which we are designing and representing human-computer dialogues using box & line diagrams.
The attenuation of a signal is -10 dB. What is the final signal power if it was originally
5 W?
Answer:
P₂ = 0.5 W
Explanation:
It is given that,
The attenuation of a signal is -10 dB.
We need to find the final signal power if it was originally 5 W.
Using attenuation for signal :
[tex]dB=10\text{log}_{10}(\dfrac{P_2}{P_1})[/tex]
Put dB = -10, P₁ = 5 W
Put all the values,
[tex]-10=10\text{log}_{10}(\dfrac{P_2}{5})\\\\-1=\text{log}_{10}(\dfrac{P_2}{5})\\\\0.1=\dfrac{P_2}{5}\\\\P_2=5\times 0.1\\\\P_2=0.5\ W[/tex]
So, the final signal power is 0.5 W.
The final signal power if it was originally 5W is; 0.5 W
Signal PowerWe are given;
Attenuation signal; dB = -10 dBOriginal signal power; P1 = 5 WFormula for attenuation signal is;
dB = 10log_10_ (P2/P1)
Where P2 is final signal power
Thus;
-10 = 10log_10_(P2/5)
-10/-10 = log_10_(P2/5)
-1 = log_10_(P2/5)
0.1 = P2/5
P2 = 0.1 × 5
P2 = 0.5 W
Read more about signal power at; https://brainly.com/question/13315405
Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?
Compatibility Checker
Accessibility Checker
Insights
AutoCorrect
Answer:
Accessibility Checker
Answer:
answer is accessibility checker or B on edge
Explain the consequences of using bits to represent data.
Answer:
Each description of a PC needs to clarify how the PC handles data: numbers, text, pictures, sound, films, directions.
Using bits to represent data implies that the computer has to use a lot of memory since every character has a group of bits representing it.
The PC is an electronic gadget. Every one of its wires can either convey electric flow or... not convey current. Thus, similar to a light switch, it sees just two states. Incidentally, this is sufficient to make the entire thought work. Indeed, any framework that can speak to in any event two states can speak to data. Take, for instance, the Morse code that is utilized in telecommunication. Morse is a sound transmission framework that can convey a short signal (spoke to by a dab) and a long beeeeeep (spoke to by a scramble). Any letter or number can be spoken to by a mix of these two images. Snap here to see a Morse interpreter.
Explanation:
Essentially with PCs. To speak to a number, we utilize the parallel number-crunching framework, not the decimal number framework that we use in regular day to day existence. In the double framework, any number can be spoken to utilizing just two images, 0 and 1. (Morse is nearly, yet not exactly (because of the delays between letters) a paired framework. A framework firmly identified with Morse is utilized by PCs to do information pressure (more about this later).
A bit which is also called a binary digit is the smallest unit of data. A combination of two or more bits is regarded as bytes.
A bit is usually processed by the electrical parts of a computer system. Internet speed is measured in bits and it reflects two opposite commands which could be either yes/no , on/off etc.
The consequence of using bit to represent data is due to the advantages which includes:
Easy computation : Due to the simplicity and it involving less complex calculations, the bits gives room for less errors.Ease of Coding: The bits is the simplest and smallest unit of data which makes it less stressful when used in coding operations.Ease of Operation: Devices which operates with the bits system makes it easier for humans to operate when compared to other complex forms.Read more on https://brainly.com/question/19667078
Factor 72y+108z
lmk the answer asap
how to earn money fast in adopt me?
Answer: If you want money in adopt me quickly, you could become a baby and buy a pet and take care of it and yourself. Also, you could purchase adopt me bucks with robux.
Explanation:
Which of the following scenarios is most likely to give you the shallowest depth of field?
a) 18mm lens at f5.6, subject 20 feet away.
b) 50mm lens at f22, subject 6 feet away.
c) 28mm lens at f4, subject 15 feet away.
d) 85mm lens at f2, subject 8 feet away
50 points and brainliest
Answer: The answer is B Hope this helps :) Please mark Brainliest
Explanation:
PLS HELP ASAP- Select the correct text in the passage.
Which concept explained in the paragraph below means that data always remains consistent?
Specific programs have some tasks that a computer must perform in parallel with others. These tasks (such as the performance of the same set of operations on different data sets) often work in parallel clusters. In such cases, a separate thread of execution handles each separate task. You can think of a thread as a sequence of instructions that computers can manage independently.
It is possible for different threads to access the same data elements and change their values, and this can lead to an inconsistent state of information. For instance, if multiple programs access a shared variable x and change its value, the variable will not contain the correct value at the end of the programs. We can prevent such inconsistencies by using locks. A thread puts a lock on shared data, and releases this lock only after completing its operations.
Answer:
reread the text
Explanation:
I do it it helps
Answer:
A thread puts a lock on shared data, and releases this lock only after completing its operations.
The last sentance
Explanation: TRUST ME ISTG THATS THE ANSWER
Question 24 Multiple Choice Worth 5 points)
(01.04 MC)
Zavier needs to compress several files. Which file type will allow him to do this?
ODOC
GIF
OJPG
O ZIP
Answer:
ZIP
Explanation:
ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections
TBH:
it may be O ZIP but i've never heard of it.
Answer:
Zip (D)
Explanation:
Took The Test
What is cybercrime?
Describe some of the various cybercrimes?
What are the laws that govern cybercrimes?
What can we do to prevent being a victim?
Remember to provide examples.
Answer:
criminal activities carried out by means of computers or the internet is known as cyber crime.
Which binary number is equivalent to the decimal number 104?
The inside color of a shape or object is it’s
Answer:
A.
Explanation:
A __ consists of wires connecting the CPU and other parts of the computer. The __ transfers the data between the CPU and the memory unit.
write a an algorithm to find out volume?
Please help this computer science question(Pseudocode and Trace table)
Answer:
can u explain more specific plz
Explanation: