what does a exponent do in excel ?​

Answers

Answer 1

Answer:

Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.

Explanation:


Related Questions

the date of creation can be added to a slide using the

Answers

Answer:

On the Insert tab, in the Text group, click Date & Time. In the Header and Footer box, do one of the following: If you want to add the date and time to your slides, click the Slide tab. If you want to add the date and time to your notes pages, click the Notes and Handouts tab.

Explanation:

The date of creation can be added to a slide by making use of the: "Insert" tab, "Text" group.

What is a slide?

A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by making use of the "Insert" tab and "Text" group.

Read more on slides here: brainly.com/question/11741377

#SPJ9

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

Which decimal number is equivalent to this hexadecimal number?
F8

A.
24
B.
143
C.
248
D.
264

Answers

Answer:

So, the number 248 is the decimal equivalent of hexadecimal number F8 (Answer).

(F8)16 = (248)10

Step by step solution

Step 1: Write down the hexadecimal number:

(F8)16

Show each digit place as an increasing power of 16:

Fx161 + 8x160

Convert each hexadecimal digits values to decimal values then perform the math:

15x16 + 8x1 = (248)10

So, the number 248 is the decimal equivalent of hexadecimal number F8 (Answer).

PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:

1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable

2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.

A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML

3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.

A) Modem
B) USB
C) Intranet
D) Desktop Interface

4. software that the owner maintains exclusive control over how it is modified and distributed

A) proprietary
B) navigation tracking
C) Spyware
D) operating system

5. set of principles that help users determine what is right or wrong in regards to computers.

A) modem
B) HTML
C) navigation tracking
D) Computer ethics

6. spyware that manages all of the installed applications and hardware on a computer or device.

A) Computer virus
B) operating system
C) citation
D) HTML

7. physical components of a computer system such as computer, mouse, or modem.

A) software
B) Network
C) browser
D) hardware

8. A malicious software program that spies on the user and share the information with a third-party.

A) antivirus application
B) malware
C) spyware
D) Desktop interface

9. icons and menus on the computer that allow the user to interact with the operating system.

A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics

10. A tool that provides directions using satellites

A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML

11. A restricted private network used by organizations to communicate.

A) asynchronous communication
B) navigation tracking
C) intranet
D) browser

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

Answers

This is a lot, but here goes!

1. C

2. D

3. B

4. A

5. D

6. B

7. D (these are technically peripherals or input devices.)

8. C

9. A

10. B

11. A

12. D

13. B

Just as a note, spyware is malware.

Use the drop-down menus to complete statements about safe and blocked senders lists.
*Safe *Blocked *repeatedly

Answers

Answer:

it already has an answer and it's right so i don't see the point to needing to answer this

your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?

Answers

Answer:

DDR

Explanation:

DDR is the only type of RAM that runs on 184 pins, its successor DDR2 was upgraded to run on 240 pins.

Hope this helps!

please help me i will give brainly

Answers

Answer:

CPU: central processing unit.

Operating System: system software that is installed on a computer to control and organize its component parts.

RAM: random access memory.

save as: command in the File menu that enables users to save their file to a different location.

Folder: an object that contains multiple documents or files.

icons: pictures that represent different commands or actions that you want the computer to perform.

Directory: index of all the files stored on the computer.

FAT: an organizational system used to organize files.

1. Define the term M.A.N.

Answers

He is right I got it correct Thanks:)

explain at least three important events during the first generation of programming language?

Answers

Answer:

Python, Ruby, Java, JavaScript, C, C++, and C#.

Explanation:

A programming language is a type of written language that tells computers what to do. Examples are: Python, Ruby, Java, JavaScript, C, C++, and C#. Programming languages are used to write all computer programs and computer software.

unable to find valid certification path to requested target

Answers

Answer:

Explanation:

This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

what type of malware prevents you from accessing files

Answers

the anwser is _______________ ———_____

how can a robot differentiate between positive or negative product reviews?

Answers

Answer:

Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.

Please give brainliest.

When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.

Answers

Answer:

It is called a driver.

Explanation:

when backing up an ios device to a cloud service the first recommended step is to

Answers

Answer:

make sure that your device is connected to wifi

Explanation:

I think that's the answer because cloud service needs wifi (duh). Hope this helps!

Answer:

The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.

a file extension of .xlsx means that the file contains what?

Answers

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

Answer:

Explanation:

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

algorithm to convert Fahrenheit temperature into celsius temperature​

Answers

Lets use python

[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]

[tex]\tt C=(F-32)*5/9[/tex]

[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]

Output:-

[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]

[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]

Answer:

Using c++ variable names

double c;

double f;

//set f to some temperature value or pass the value to the function

c=f-32;

c=f*(5/9);

//c is now the temp in celcius

4.) Food cost for your restaurant is about $.38 on the dollar. That means for every dollar
in sales, you spend 38 cents in food cost.
Figure out the food costs for the following days' sales:
Monday: $3,459.00
Tuesday: $2,976.81
Wednesday: $3,185.32
Thursday: $3,562.91

Answers

Answer:

38 cents on the dollar means that the cost is 38%. So for each of the costs, multiply by 0.38 (38%) to get the cost.

$3459*0.38=$1314.42

$2976.81*0.38 = 1131.1878 or about $1131.19

etc.

Which THREE of the following practices conform to good email etiquette?

using a large font
including a salutation
using a page background
including a closing
using correct spelling and punctuation

Answers

Answer:

including a salutation, including a closing, and using correct spelling and punctuation.

Explanation:

A salutation is a greeting. It is always good etiquette to greet someone.

You do not want to end your email abruptly. Use a good closing.

It is never fun to read an email with bad spelling or punctuation. Using correct spelling and punctuation will make your email look more professional.

Using correct spelling and punctuation, include a closing, and including a salutation

Imagine that over the past few weeks, you have experienced an abundance of pop-up ads

appearing when you are using the Internet. You'll also noticed that your computer is

working more slowly than usual.

In a 200 - 300 word essay, diagnose the problem with your computer and explain what can be done to remedy the issue. In your essay, use information from the lesson to justify your

diagnosis and solution.

I

Answers

Answer:

Look below

Explanation:

You open the computer that you recently purchased and it is running slower than usual and your experiencing popups

What most people would think is that a virus has infected their computer. This can be diagnosed via a free online (REPUTABLE) tool such as Malwarebytes. If the tool detects a virus it can remove it and this will 99% of the time fix the problem.

Now after you have solved the problem there is another thing to learn, viruses don't just catch computers like a real virus so its User Error either by the owner of the computer or someone with access, If you are the only one who uses the computer you should learn some online safety such as not visiting websites people wouldn't consider reputable and don't run sketchy files (EXE, JAR, etc) don't download anything from a source you don't trust.

If it was a family member or friend's fault explain internet safety to them and how sometimes a simple mistake of not double-checking the website can lead to a virus. One time I was installing java on a friend's computer and just clicked the first link (an ad) not Javas website and it ended up in me getting in some trouble.

However, if you have solved the virus issue and your computer is still being slow you should check if Windows has been damaged, you can do this via Command Prompt a program that comes with your Windows Machine. Just type "sfc /verifyonly" and it will find if your windows files have been damaged.

-END

256 words

Pls mark me Brainliest i worked hard on this. Your assignment asks for information on the lesson however i used some complicated solutions to make up for that so your teacher/professor thinks your smart

Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.

A.
True

B.
Fale

Answers

Answer:

True

Explanation:

Individuals may restructure their investment portfolios because

Answers

Answer:

the results are below expectations

Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capacity are required?​

Answers

Answer:

You could use three 1 GB modules.

it refers to the kind of activity that you are going to perform or methods of training to used

A.type
B.frequency
C.intensity
D.time

Answers

I believe the correct answer is “type”

what guidance identifies federal information security controls?

Answers

Answer:

FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.

What is Personally Identifiable statistics?

Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.

The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.

Read more about the security :

https://brainly.com/question/26260220

#SPJ2

What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.

Answers

Answer:

The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.

The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.

Given that,

The number we are trying to find is between 1 and 1000.

We are trying to determine the maximum number of guesses it would take to find this number.

To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.

In a binary search, we start by guessing the middle number, which in this case would be 500.

If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.

If it's lower, we guess the middle number is between 1 and 499, and so on.

Using this approach,

As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,

It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.

Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.

To learn more about number system visit:

https://brainly.com/question/33311228

#SPJ3

what is the answer ??​

Answers

Answer:

option 1 is correct go with 1s .

Is 1/5 a rational number, interger, whole number, and natural

Answers

Answer:

1/5 is a rational number.

Explanation:

Natural numbers are the numbers you use to count with (1, 2, 3, etc.). Nobody uses fractions while counting whole objects unless they think they're funny and want to stall, so 1/5 wouldn't be a rational number.

Whole numbers are the exact same as natural numbers, but with the addition of the number 0 (think about it, no one starts from zero when counting).

Integers include whole numbers as well as their opposites (for example, the opposite of 4 is –4).

As a basic rule of thumb, if the number includes a fraction or a decimal point of any kind, it would be a rational number.

Other Questions
PLEASE HELPWhy were the people in the south using violence against the African Americans during reconstruction Algebraically Speaking Write an equation: Rita has $5 in her purse. This is $12 less than she had before she went shopping. How much did she have when she went to the mall?. Which of these positions in part of good posture?a.your stomach is tucked in.b.your shoulders are hunched forward.c.your feet are spread wide apartsomebody said it was c it that true?! Problem: How do the levels of reproductive hormones influence the human menstrual cycle?You'll be needing a graph paper and the data below because I don't know how to screen shot with computer and used this link as the image and please give me correct graphing and results please finish it all and Ill give brainiest and 30 points. is refusing to hold wrong against another person. 32 Points!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!What was the Federalists argument for not adding a separate bill of rights to the Constitution?A) A separate bill of rights might be used later to weaken Americas reputation.B) A separate bill of rights be might used later to free enslaved people.C) A separate bill of rights was unnecessary because the new government would have limited power.D) A separate bill of rights was unnecessary because the Constitution was not taking away any rights from citizens. 6. Carla runs 3 miles in 30 minutes. Find the number of miles Carla runs each minute. Show your work using mathematics. Find the number of minutes Carla runs for each mile. Show your work using mathematics. ANSWER THE QUESTION CLEARLY PLZZ !!! 13 add (-20) answer plz A group of friends paid a total of 50.24 for tickets to the museum each friend pay the same amount for a ticket how much did each friend pay for a ticket to the museum What fraction of Senators are up for election every 2 years? Find the slope for (10, 22) and (3, 14) Someone give me the answers pls hello thereI'm looking for some help here thanks, giving brainliest if able to. Divide 240 by 8. options:30304040 Details about the character in Hamlet Act 1 scene 1:- Barnardo- Francisco- Marcellus- Ghost- Horatio WILL MARK AS BRAINLIEST IF CORRECT1. Jorge _______ la tarea en la clase de ciencias naturales. *fueestuvopudohizo2. Nosotros _______ al centro comercial ayer. *fuipudimosfuimosestuvieron3. Ellos _______ un perro blanco. *estuvierontuvieronescribieronhicieron4. Yo _______ televisin en el sof. *tuvoestuvofuivi5. T no _______ ir al cine con tus amigos. *hicistepudopudisteestuvo Helpp! Im not sure what the question is asking What is the image of (0,-4) after a dilation by a scale of 1/2 centered at the origin What makes a successful Aquarium