⚠️ HURRY TIME IS TICKING ⚠️
Sierra needs to ensure that when users are entering data into a datasheet or form that they are limited in the values that they select. Which option should she use as the data type?
• Lookup list
• Bound value
• Short-text
• Date/time

Answers

Answer 1

Answer:

To ensue that data entering data is limited, Usually A dropdown list is used but here in the available option

Lookup list is correct.

Explanation:

Let explain why we have selected Lookup list

A lookup list is used to look for some value in a list.

For example in Excel we select a column for search which is basically limiting the value which we search.

Bound Value

we usually have 2 bounds ,

lower and upper bound

lower bound is the smallest value in a set while upper bound it the highest value in a set.

Short Text:

Short text is used to minimize the word.

For example instead of United States we simply write US

Date/Time are used for data/time value.

so the most appropriate answer is Lookup list.


Related Questions

What is the highest numeral in a binary code?

Answers

Answer:

The highest numeral in binary code is 1

In binary, you can only have 1s and 0s

if you're asking for the biggest number that can be represented, it's 255, which is 11111111. (this is 8 1s)

Explanation:

Is this a trick question? lol

May I have brainliest please? :)

You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do

Answers

Answer:

What you should do is to move the motherboard jumper.

Explanation:

Based on the information given in a situation where you boot the computer system in which you find out that there was a password set on the BIOS which full meaning is BASIC INPUT/OUT SYSTEM which means that if You need to clear the set password in order for you to edit the CMOS settings which full meaning is COMPLEMENTARY METAL OXIDE SEMICONDUCTOR What you should do is for you to move the MOTHERBOARD JUMPERS reason been that jumpers will help to set or configure the MOTHERBOARD which is the most important part of a computer and the brain of a computer in order to clear the password so that CMOS setting can be edited.

James wants to create a web page where he can write two paragraphs of text. The first paragraph of text should be colored red and the
second blue. Which snippet of code show the principle behind how James creates this page?

Answers

Answer:

The first code does it

Explanation:

Each of the attached code snippet is divide into two parts.

The CSS partThe html part

From the four code snippets, the first one answers it.

The syntax to format the paragraph of an html text using css is:

p#paragraph-id{

color:color-name

}

Analysing each element

p# -> This implies that a paragraph is to be formatted

paragraph-id -> This represents the id of the paragraph

{} -> The open and close curly braces house the properties to be formatted

color:color-name -> implies that the color of the element be changed to color-name (e.g. red or blue)

In the body tag of the html code, the first paragraph has an id of para1 and the second has para2 as its id.

i.e. <p id = "para1">......

So, the first paragraph will be formatted red while the second will be blue

Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between 1 and 20. Then I, the computer will try to my best to guess the number. Is it a 18? (y/n) n Higher or Lower (h/l) l Is it a 5?(y/n) n Higher or Lower (h/l) h Is it a 10? (y/n) y I got tour number of 10 in 3 guesses.

Answers

Answer:

This question is answered using C++ programming language.

#include<iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int num, computerguess;

   char response, hl;

   cout<<"Choose your number: ";

   cin>>num;

   srand((unsigned) time(0));

   int high = 20;    int low = 1;    int guess = 0;

   computerguess = low + rand() % high;

   cout<<"Is it "<<computerguess<<" ?y/n: ";

   cin>>response;

   while(response == 'n'){

       cout<<"Higher or Lower? h/l: ";

       cin>>hl;

       if(hl == 'h'){            low = computerguess+1; }

       else{   high = computerguess-1; }

       guess++;

       computerguess = low + rand() % high;

       cout<<"Is it "<<computerguess<<" ?y/n: ";

   cin>>response;

   }

   cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";

   return 0;

}

Explanation:

This declares num (user input) and computerguess as integer

   int num, computerguess;

This declares response (which could be yes (y) or no (n) and hl (which represents high or low) as char

   char response, hl;

This prompts user for input

   cout<<"Choose your number: ";

This gets user input

   cin>>num;

This allows the computer be able to generate different random numbers at different intervals

   srand((unsigned) time(0));

This declares and initializes the range (high and low) to 20 and 1 respectively. Also, the initial number of guess is declared and initialized to 0

   int high = 20;    int low = 1;    int guess = 0;

Here, the computer take a guess

   computerguess = low + rand() % high;

This asks if the computer guess is right

   cout<<"Is it "<<computerguess<<" ?y/n: ";

This gets user response (y or n)

   cin>>response;

The following iteration is repeated until the computer guess is right

   while(response == 'n'){

This asks if computer guess is high or low

       cout<<"Higher or Lower? h/l: ";

This gets user response (h or l)

       cin>>hl;

If the response is higher, this line gets the lower interval of the range

       if(hl == 'h'){            low = computerguess+1; }

If the response is lower, this line gets the upper interval of the range

       else{   high = computerguess-1; }

This increments the number of guess by 1

       guess++;

Here, the computer take a guess

   computerguess = low + rand() % high;

This asks if the computer guess is right

   cout<<"Is it "<<computerguess<<" ?y/n: ";

This gets user response (y or n)

   cin>>response;    }

This prints the statistics of the guess

   cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";

How should students properly use media in a presentation? Check all that apply
⬜incorporate images that are irrelevant but interesting
⬜engage viewers by adding variety
⬜stimulate the senses of the viewer
⬜clarify relevant details in the text
⬜select songs that decrease the presentation’s impact

Answers

Answer:

engage viewers by adding variety

stimulate the senses of the viewer

clarify relevant details in the text

Answer:

B,C,D for short

Explanation:

how do you take a picture on an apple computers

Answers

Answer:

You go to the launcher, then find Photo Booth. Photo Booth allows you to take photos. You can only take photos on the side where the screen is, since there isn't a camera on the back. I recommend taking a picture with a phone instead. For a screenshot, press command-shift-3.

Hope this helps!

WILL GIVE BRAINLIEST!! If a flowchart has a diamond with the words “yes” and “no” to the sides of it, then it is representing a program that is a sequence.
true
false

Answers

Answer:

false

Explanation:

a flowchart with a diamond and with the words “yes” and “no” to the sides of it, then it is representing a program with branches.

it represents branch, like an if , else statement.

It is not in sequence.

Answer:

True

Explanation:

List five types of system information that can be obtained from the Windows Task Manager. How can you use this information to confirm the presence of malware on a system

Answers

Answer:

Part A;

Five types of system information that can be obtained from the Windows Task Manager includes;

1) The processes taking place

2) The performance of the system components, including the, CPU, Memory, Disk, Wi-Fi, GPU, and a live summary of the metrics of the computer

3) The App  history

4) The list of startup

5) The current users of the computer

Part B;

By going through list of active processes on the Windows Task Manager, a malware can be detected as a rogue or unidentified process that may be running on the background. The name of a process may seem legit, but however, the process is not supposed to be running, such as a program which is not running or installed on the system  but the process is seen running on the Windows Task Manager, that is a sign of a malware on the system

Explanation:

write a program which calculates the difference between two integers which are entered by the user. The answer should be a positive integer regardless of the order in which the integers are entered. ​

Answers

In python 3.8:

print(abs(int(input("Enter a number: "))-int(input("Enter a number: "))))

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

Website designers work on the code and programming of a website, not the style or layout of the site.

Answers

Answer:

False

Explanation:

Website designers design how the site looks not works

USB 3.1 offers an improvement over its predecessors by enabling a maximum data transfer rate of up to:

Answers

Answer:

10 Gbps

Explanation:

The full form USB is Universal Serial Bus. It is used to connect to electronics as well as computers. The 3.1 USB is a recent and advance version of the USB standard. It was released in the year 2013. It can transfer data speed up to a speed of 10 Gbps.

It USB 3.1 can use the USB-C connector types and other connector types as well.

What is the function of a web browser, and what are the main components of a web address?

Answers

Answer:

The primary function of a web browser is to render HTML, the code used to design or "mark up" webpages. Each time a browser loads a web page, it processes the HTML, which may include text, links, and references to images and other items, such as cascading style sheets and JavaScript functions.

Function of a web browser: A web browser allows users to access and view websites on the internet, request web pages from servers, and display their contents.

Main components of a web address (URL):

1. Protocol

2. Domain

3. Subdomain

4. Path

5. Query parameters

6. Fragment identifier

The Function of a Web Browser:

1. Requesting Web Pages: The web browser sends requests to web servers to fetch specific web pages or resources (such as images, videos, and stylesheets) associated with those pages.

2. Rendering Web Pages: Once the web browser receives the requested content from the server, it interprets and renders the HTML, CSS, and JavaScript code to display the web page's content and structure.

3. Supporting Multimedia: Web browsers are capable of handling various multimedia elements, such as images, audio, and video, allowing users to experience a rich and interactive web environment.

4. Managing History and Bookmarks: Web browsers keep track of the browsing history, allowing users to revisit previously visited sites. They also provide features to bookmark and save favorite websites for quick access.

Main Components of a Web Address (URL):

A web address, also known as a URL (Uniform Resource Locator), is the unique address used to identify a specific web page or resource on the internet. It consists of several components:

1. Protocol: The protocol is the method used to access the resource.

2. Domain: The domain is the address of the website or server hosting the resource. It is typically the main part of the URL.

3. Subdomain (Optional): Subdomains are prefixes added before the main domain.

4. Path: The path specifies the location of the specific resource on the server. It may include directories and filenames.

5. Query Parameters (Optional): Query parameters are additional data passed to the web server for processing.

6. Fragment Identifier (Optional): The fragment identifier is used to specify a specific section or anchor within a web page.

Learn more about Web here:

https://brainly.com/question/27961981

#SPJ6

Hyperlinks can only point to webpages.

True or False

Answers

Answer:

I believe thats false

What is globalization? O A. A constant change in weather patterns that is occurring all over the globe OB. A movement for countries to turn to an economy based on bartering C. The movement from many local economies to one economy that is global O D. The tendency for global companies to create small local businesses ​

Answers

Answer:

The movement from many local economies to one economy that is global

Explanation:

Globalization is when companies and governments from around the world come together through interaction.

Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. I am stuck on this python assignment. Don't need the answer asap, just some explaining of how to write code to do that. I know about the built in sort function

Answers

Answer:

Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.

Explanation:

The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.

Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.

) Find and write the o/p :
X=[“F”,66,”QE”,15,”S”,34]
Y=0
Z=” ”
A=0
for c in range(1,6,2)
Y+=c
Z=Z+X[c-1]+'$’
A+=X[c]
Print(x,y,z)

Answers

Answer:

The output of this question is

['F', 66, 'QE', 15, 'S', 34] 9  F$QE$S$

Explanation:

In this question the user want to print the value of X,Y and Z

Let calculate the value of X first.

As the value of X is not altered in the program to its value will be the same that is:

['F', 66, 'QE', 15, 'S', 34]

Now we will calculate the value of Y

It is written as

Y+=c

which can be written as Y=Y+c

The loop here start form 1, the it go to 3 then 5 as explained below

Range(1,6,2) is written

The first value is the start value

The second value is stop value

While the third value is how much to increment.

So first its value will be 1 then increment it by 2. It will become 3

then increment it by 2 again it will become 5. in the next step it will become 7 which is out of range

so

Y=Y+c  =>  Y=0+1       (first loop)

                  Y=1+3       (second loop)

                   Y=4+5    (third loop)

  Some y will be 9

Now let focus on the value of Z

Z= " " +X[1-1]+'$'  (first loop)  value of  c=1

so it will become

Z=F$

Now in 2nd Loop

Z=" " + X[3-1]+'S'  (2nd loop)    value of c=3

it will become

Z=QE $

Now in 3rd Loop

Z=" " + X[5-1]+'S'

it will become

Z=" " S + $

so the overall answer of print will become

['F', 66, 'QE', 15, 'S', 34] 9  F$QE$S$

Which sentence best describes how block-based code works?

Answers

Answer:

Block-based code is a simpler way to code.  

Explanation:

Block-based coding is a form of programming language where the developer issues instructions by dragging and dropping blocks.

types of network model​

Answers

Answer:

OSI Model and TCP/IP Model

Explanation:


Select the correct answer from each drop-down menu.

What does a computer connect to in a VPN?

In a VPN, a computer connects to a ____
and then changes the ________ of your computer.

Answers

Answer:

"In a VPN, a computer connects to a server and then changes the Internet Protocol of your computer" -urgurlmarie

Source: https://brainly.com/question/19665457, -urgurlmarie

Opinion: You're answer is correct, I'll take this step by step but by connecting your PC to an server like OpenVPN, or a paid VPN service such as Nord VPN. You are changing your Internet Protocol of your PC to that servers I.P. Address.

guess who is in the cheater cage lol

Answers

Oh oop- lol that’s interesting

What is the answer for 2.8.10 word games? This is what I have so far, but I can’t seem to be able to figure out the bananaSplit public strings.

Answers

Answer:

 public String bananaSplit(int insertIdx, String insertText) {

     return word.substring(0, insertIdx) + insertText + word.substring(insertIdx);

 }

Explanation:

Do you have the other parts of the WordGames class?

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

how to find radius of the base examples ​

Answers

Answer:radius is half the diameter

Explanation:

Which view is most often used to reorder slides in a presentation that has already been created?

Outline view
Slide Sorter view
Reading view
Normal view

Answers

Answer:

Normal view

Explanation:

The normal view is best used because it is just to drag and drop

Normal view, is most often used to reorder slides in a presentation that has already been created. Thus, option (d) is correct.

What is presentation?

The term presentation refers to the present on the information in the front of the audience. The presentation was the present the information in the short way and the face to face communicated to the audience. It was the interaction to the audience. The presentation is the two way communication.

The normal view in Microsoft PowerPoint is the default view for developing and viewing presentation slides. You'll be creating your slides in normal view, which is the editing mode, the most of the time. Unless you altered the default view, when you create or open a presentation you see it in normal mode.

As a result, the significance of the normal view is most typically used to reorder slides in a presentation that has already been created are the aforementioned. Therefore, option (d) is correct.

Learn more about on presentation, here:

https://brainly.com/question/28712294

#SPJ3

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use?

Answers

Answer:

PST

Resource:

This question has already been answered here: https://brainly.com/question/18415952

Explanation:

PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too.  Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.

what is bespoke software???​

Answers

Answer:

custom-built to address the specific requirements of a business

Explanation:

Answer:

As such we are going to highlight a number of examples of bespoke software. As enthusiastic business owners, we all want to be unique.

...

2. Customer Relationship Management (CRM)

Business Process Automation System. ...

Automated Invoicing. ...

Company-Facing / Customer-Facing Web Portals. ...

Ecommerce software solutions.

Explanation:

There ya go

help plz i need help ASAP
bhgydhusjbhhuidjs

Answers

Answer:

id.k

Explanation:

good luck

Food deliveries should be scheduled _____.

Answers

Answer:

1-11pm

Explanation:

Answer:

at less busy times so that staff has time to properly inspect food

Explanation:

PLS HELP BEING TIMED!!!!
Why do prospective lenders only accept FICO credit reports that are one or two days old, at most?
O Good credit scores can plummet quickly
O Credit scores change on a daily basis.
O Bad credit scores can improve quickly.
O Credit reports expire after two days and are no longer valid.

Answers

Answer:

O Credit scores change on a daily basis.

Explanation:

Other Questions
Science 6th grade digital INB- You dont know what parts of the ground are safe and what parts are thin crusts of soil covering fires or sinkholes. Design a system that can access the area and take measurements that show changes in the fire. (No right or wrong answer just need someone to come up with something and quick.) Why is it important for the United States Supreme Court to make decisions on laws? The amount of force a muscle can exert is known as - Coordination - Speed - Power - Balance Write a function formula forgusing the functionf.g(x)=Write a function formula forfusing the functiong.f(x)= Meat with more than 20% fat is considered empty calories rather than protein.TrueFalse No state could make any thing except ______and ______ money for the payment of debts Solve the following equation for I. A = 2nr + nrl. Explain each step please Select the correct answer. Read the sentence.It is safe to assert that no government proper ever had a provision in its organic law for its own termination. What kind of evidence does this statement provide for an argument against secession of the southern states from the United States? A logical reasoning B. statistic C. example D. emotional appeal If one party disagrees with a ruling from a U.S. Court of Appeals, its appealwill be heard first by which type of court?A. State appellate courtB. U.S. Supreme CourtC. U.S. District CourtD. State Supreme Court question: How many unites down would triangle RST need to be translated in order for the coordinates of R to be (-3, 0) How did for suspending our own legislature , and declaring themselves invested with to power legislate for us in all cases whatsoever start and what was the outcome that triggered it? What is the frequency of a light wave who has a wavelength of 5.5 x 10-14 m v Type your answer in the box.The video reports a decline in the number of "packers" in California. What are packers, and what challenges doestheir decline pose to firefighters who fight wildfires? Plz someone help I beggggg I need explanation + answer.Do not write the answer without explanation, please. thanks in advance! Find the values of X and Y can someone help me with this Hi- Uhm, Help, please? Why is elemental zinc considered a pure substance?Select one:It is a metal.It is a mixture of different atoms.All elements are considered pure substances.It must be created in a lab. Reid's Hardware discounts all riding lawnmowers 9% to customers paying in cash. If Trey paid $1,390.49 in cash for a riding lawnmower, which of the following equations can be used to determine the original price of the lawnmower?