How can she change that value so it is reflected in the chart in her presentation?

Answers

Answer 1

Answer:

She can change the value in the mini- spreadsheet for the chart in PowerPoint.

Explanation:

Answer 2

Answer:

What she said above or below me

Explanation:


Related Questions

This question is worth 15points

Why do you think that computer programs use different data types? Wouldn't it be simpler if they treated all data the same? Why or why not?
What would happen if, for instance, a date were treated like an integer? Please answer all of the questions.

Answers

Answer:

The data type defines wich operations can safely be performed to create, transform and use the variable in another computation.

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

We have,

Computer programs use different data types for a variety of reasons:

- Efficiency:

Different data types allow programs to allocate memory and perform operations more efficiently.

- Precision:

Different data types have different levels of precision. For example, using floating-point numbers allows for decimal values but might introduce rounding errors, while integers are exact but can't represent fractions.

- Semantics:

Different data types convey meaning and help programmers and the compiler understand how the data should be used.

- Operations:

Different data types support different operations. For instance, you can't perform arithmetic operations on text strings as easily as you can on numbers.

- Type Safety:

Using distinct data types helps catch errors early in the development process. If you accidentally treat a string as an integer or vice versa, type systems can catch such errors during compilation.

If a date were treated like an integer:

- Loss of Semantics:

Treating a date as an integer would strip away its meaning. Dates have attributes like day, month, and year, which would be lost if they were treated as integers.

- Limited Operations:

Integers can't directly perform operations related to date manipulation, such as finding the difference between two dates or determining the day of the week for a given date.

- Error-Prone:

Treating dates as integers would likely lead to confusion and errors. It would be easy to make mistakes when handling date-related calculations and comparisons.

- Lack of Flexibility:

Dates have a complex structure, including leap years, varying month lengths, and time zones. Treating them as integers wouldn't allow for representing these complexities.

Thus,

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

Learn more about computer programs here:

https://brainly.com/question/33841076

#SPJ3

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on data?

Answers

Answer:

data-driven decision

Explanation:

While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!

Helppppppp pleaseeeewweeweee

Answers

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets

What steps can be used to run the Accessibility Checker? 1 Click the tab. 2. Go to the group. 3. Click and then Check Accessibility. 4. The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities.

Answers

Answer:

file, info, check for issues.:)

Explanation:

The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.

What is accessibility checker?

Your work is compared to a set of standards by the accessibility checker, which highlights any potential issues for users with impairments. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is. Making sure that the content you publish is accessible to users is the essence of accessibility.

Choosing File > Info. Choose "Check for Issues" Look into accessibility. Choose a problem from the Inspection Results. Review the How to Fix in the Additional Information, then edit your document as necessary. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is.

Thus, the Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.

To learn more about accessibility checker, refer to the link below:

https://brainly.com/question/30012324

#SPJ5

NEED HELP ASAP!!

Given that myGrade = 65, consider the conditional operator (myGrade<=65) ? myGrade+10: myGrade=myGrade+5. What is the value of myGrade after the conditional operator executes?

Answers

Answer:

75 is the answer and marke me as brainleast

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

A backup utility can ensure that data is not lost if your computer or disk drive
fails. *
True or false

Answers

false




have a good day

what was your first pokemon game


if you have not played one just comment don't answer

Answers

Answer:

FireRed & LeafGreen

Explanation:

so if it's mobile games then Pokémon go
but if it's Nintendo games then probably sword and shield cos you can catch pretty much every Pokémon.

What is one of four key principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

One of the four key principles of Responsible Artificial Intelligence (AI) is the decision-making process should be transparent and understandable. The correct option is A.

What is Artificial Intelligence (AI)?

Artificial intelligence is the process of giving a machine the capacity to reason and make decisions. The most sophisticated branch of computer science is artificial intelligence, which involves creating a mind in which a computer can think—a computer brain that can reason similarly to humans.

The creation of intelligent machines, particularly intelligent computer programs, is the science and engineering of artificial intelligence, according to John McCarthy, the founder of machine intelligence.

This results in the creation of a computer system or robotic system that attempts to function using the same logic as the human brain.

Therefore, the correct option is A. Decision-making process should be transparent and understandable.

To learn more about Artificial Intelligence (AI), refer to the link:

https://brainly.com/question/23824028

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. Decision-making process should be transparent and understandable.

B. Accountability for decisions ultimately lies with the computer algorithms

C. Companies are not reliable for violations of the law that result from the actions of AI

D. Any biases that may arise from AI processing are justifiable if they are backed by data

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

In what way can the data be visualized to get the answer that is required?

Answers

Answer:

Data visualization is the graphical representation of information and data. By using visual elements like charts, graphs, and maps, data visualization tools provide an accessible way to see and understand trends, outliers, and patterns in data.

In the world of Big Data, data visualization tools and technologies are essential to analyze massive amounts of information and make data-driven decisions.

It is most commonly used for self-running presentations.
A. Slide Transition
B. Hyperlink
C. Action Buttons
D. Animation​

Answers

Answer:slides

Explanation: because in the slide you can make a presentation

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

Answers

Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.

Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.

The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.

Read more: https://brainly.com/question/21694571

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

how do viruses spread from one computer to another computer?​

Answers

Answer:Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.

define the term software with example​

Answers

Answer:

A software or computer software essentially a type of programs which enable the users to perform some particular specific task or actually used to operate their computer. It essentially directs all of the peripheral devices on the entire computer system- what exactly to do and how exactly to perform a task. A software plays a key role of a mediator between the user and the computer hardware. In the absence of software, a user essentially can’t perform any task on a computer. A software product development company is the one which develops software for the users.

Explanation:

hope it will helpful for you

In computing we generally have two parts, the Hardware which we can feel and touch and the Software which are a set or collection of instructions or commands the computer can understand and executes, We cannot touch it

Examples of softwares are

Excel WindowsiTunesMs Word

Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.

In summary we use programming Languages to write software programme for the computer to execute.

Learn more about softwares :

https://brainly.com/question/1538272

1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues

Answers

Answer:

well...

Explanation:

it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue

who plays pokemon shield or sword

Answers

Answer: I haven’t played but i wanna

Explanation:

Answer:

no

Explanation:

i don't

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

your iphone is not configured to allow calls using this mac

Answers

Answer:

Make sure you have an iCloud account and that your computer is logged into that account.

Explanation:

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

What is an FPS? Describe the acronym as it applies to video games and explain two games popular in the 2000s that flourished in this game category.

Answers

1. Short for frames per second, fps is a measure of how many full screen, still images are captured or displayed in one second of video recording/playback or video game play.

The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer:

cyber security I think that is what it is

Explanation:

m

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

Write a function that will receive 5 numbers from a user (inputted one at a time-- use reassignment!) and will count then print how many of the numbers are odd.

Answers

The program is an illustration of loops.

Loops are used to perform repetitive operations

The function in Python where comments are used to explain each line is as follows:

#This defines the function

def count_odd(mylist):

   #This initializes the count variable to 0

   count = 0

   #This iterates through the list

   for i in mylist:

       #This checks if the current list element is not even

       if not i%2 == 0:

           #If yes, this increments the count variable by 1

           count+=1

   #This returns the count of odd numbers

   return(count)

Read more about similar programs at:

https://brainly.com/question/18269390

Other Questions
How to write a letter to your friend to telling him/her about a plan that you have for an excursion Shawn and Dorian rented bikes from two different rental shops. The prices in dollars, y, of renting bikes from the two different shops for x hours is shown. Shop Shawn used: y = 10 3. 5x Shop Dorian used: y = 6x If Shawn and Dorian each rented bikes for the same number of hours and each paid the same price, how much did each pay for the rental? $. BRAINLIEST x 3It is kinda late and I need to finish my workPlease help meIf you answer this I will create two other posts to give you extra brainliests Review the graph. On a coordinate plane, a parabola opens up and goes through (negative 2, 5), has vertex (0, 1), and goes through (2, 5). Another parabola opens to the right and goes through (8, 4), has vertex (negative 8, 0), and goes through (8, negative 4). Everything inside of the first parabola and above the second parabola within the first parabola is shaded. Which system of inequalities has the solution set shown in the graph? Find y' and then find the slope of the tangent line at (2,225). Round the slope and y-intercept to 3 decimal place. The sides of a triangle are in the ratio 4:4:3.What kind of triangle is it I accidentally left a metal spoon in some peach cobbler I think around 12am is when I got some then went to bed and saw it this morning at 8 is it safe to eat 1002828197382728173927937294729929382991divided by 182883929190.837283828281-737273728377273737272 Parallel lines cut by a transversal coloring activity. help help hoop helpo (X-5)(X+6)Expand and simplify Please help! Its due todaySolve: 5|9 3x| 7 = 38 In pricing models, elasticity of demand is an input with specifies the: a. range of demand b. sensitivity of demand to changes in price c. level of demand d. sensitivity of price to changes in demand what do you mean by reproduction? Heres a freebie for the lucky people who answer this79 - 10 =A. 70B. 7C. 69D. 6.9430 - 10 = A. 469B. 421C. 4.2.0D. 420 please help I'm stuck!!! j. It is used for drawing straight lines and measuring lengths. [ Answer the following questions. Write down the answers to the space provided for each number. 1. Which of the given measuring tools are you familiar with? 2. How are these measuring tools important?[tex]sorry walang \: jowa \: po[/tex]sorry nsaan derekson po which organization is responsible for inspecting food Based on the text, what approach do you think Lincoln would have taken toward reconstruction? What would his goals have been, and how would he have treated southern states? what is the most noticable difference between human brains and other mammalian brains