Your workbook has one data source and two worksheets visualizing it. What will be included if you save it as a packaged workbook

Answers

Answer 1

If your workbook is made up of one data source and two spreadsheets, what you would have to add to it would be  Both visualizations and underlying data.

What is data visualization?

This is the term that is used to refer to all of the means by which the data is visualized or made to create meaning to the people that would view it through the use of statistical tools such as graphs, pie charts and other types of visualization.

What the packaged workbook is the local file data that is made up of images that are used in the work book. Hence we say that If your workbook is made up of one data source and two spreadsheets, what you would have to add to it would be  Both visualizations and underlying data.

Read more on workbook here: https://brainly.com/question/27960083

#SPJ1


Related Questions

what is the meaning of communication

Answers

Communication is talking to another person with the medium of language. Sharing your thoughts and words with another person is called communication.

What is the importance of communication?

Communication is a medium to share your feelings and thinking with another person through the means of speaking or gestures. The importance of communication is people can talk to each other and be socialized.

Humans are social animals and with the means of communication, they can socialize and live with each other.

Thus, communication is speaking to someone else in a language they can understand. Communication is when you exchange ideas and words with another individual.

To learn more about communication, refer to the link:

https://brainly.com/question/22558440

#SPJ1

Compare MAN, WAN, and LAN, and make a table having three columns. ​

Answers

Answer:

MAN :-)

MAN stands for metropolitan area network.It covers a larger area than LAN such as small towns, cities, etc. A MAN, also called the Metropolitan Area Network, is defined as the computer network that joins the metropolitan areas.The maintenance cost of MAN is difficult.

WAN :-)

WAN stands for wide area network.It covers a large area than LAN as well as a MAN such as country/continent etc.A WAN, also called the Wide Area Network, is defined as a telecommunications network that extends over a large area.The maintenance cost of WAN is difficult.

LAN :-)

LAN stands for local area network.It covers smaller areas such as colleges, schools, hospitals, and so on. LAN (Local Area Network) is defined as a computer network that is responsible for connecting local areas like schools, residents, universities, etc.The maintenance cost of LAN is easy.

Hope its helpful :-)

If so, please mark me as brainlist :-)

 

 

 

 

 

Write the code to call/execute the following function

void printInfo()
{
cout << "Jared" << endl;
cout << "ITP100" << endl;
cout << "TCC" << endl;
}

Answers

Answer:

write a main() function and call your function.

Explanation:

See picture. Executed at replit.

1.1 give five (5) reasons why modeling is an important part of system analysis and design

Answers

Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

What is Modeling?

In computation, modeling refers to the action of taking into account all variables that produce a given outcome and then predict it in a virtual environment.

Modeling is fundamental in system design because enables the prediction of the behavior of diverse variables simultaneously.

In conclusion, Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

Learn more about modeling here:

https://brainly.com/question/17994947

#SPJ1

What do you think that private information like passwords pin number will be guarded or shared with the public? why?

Answers

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Why should you use passwords to protect private information?

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

https://brainly.com/question/17174600

#SPJ1

In Hootsuite Inbox, you can see all the correspondence between a user and your organization on a particular social channel, including public and private conversations. This is useful for

Answers

The ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.

What is Hootsuite Inbox?

Hootsuite Inbox can be defined as a type of software application that is designed and developed to help end users in managing social messages (correspondence) from their organization's customers and audiences, especially by availing them an ability to collect and view (see) both private and public conversations (messages) from all networks or social media channel in one place.

This ultimately implies that, the ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.

Read more on Hootsuite Inbox here: https://brainly.com/question/15321261

#SPJ1

What type of os must be installed on your machine to allow this type of action by another person?

Answers

Answer:

Im sure its called Single User OS

difference between sorting and filtering​

Answers

Answer:

Essentially, sorting and filtering are tools that let you organize your data. When you sort data, you are putting it in order. Filtering data lets you hide unimportant data and focus only on the data you're interested in.

Explanation:

Hope this will help

Sorting

The term “sorting” is used to refer to the process of arranging the data in ascending or descending order.

Example: Statistical data collected can be sorted alphabetically or numerically based on the value of the data.

Filtering

The process of data filtering involves selecting a smaller part of your data set to view or analyze. This is done by using that subset to view or analyze your data set as a whole.

Example: A complete set of data is kept, but only a portion of that set is used in the calculation, so the whole set is not used.

Hope this helps :)

During which phase of system development would you acquire any necessary hardware and software?

Answers

During the design phase of system development, you would acquire all the necessary hardware and software.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

Also, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).

In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the design phase of system development.

Read more on phases here: brainly.com/question/7112675

#SPJ1

The cathode ray tube eventually was eventually used for what entertainment device?

Answers

[tex]\huge\underline{\underline{\boxed{\bm {Answer:}}}}[/tex]

[tex] \large\bm{Television}[/tex]

[tex]\huge\underline{\underline{\boxed{\bm {Explanation:}}}}[/tex]

The cathode ray tube can be said to be a vacuum tube which contains one or more electric guns. This tube produces images when an electron beam strikes a phosphorescent surface. This tube produces pictures as a form of video signals. The entertainment device, which the cathode ray tube was eventually used for since it produces pictures, is a television set.

How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private good or public good? Explain why.

Answers

XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.

How does XM satellite radio work?

XM Radio's is known to be a kind of a ground station that is often seen to passes or they  transmits a signal in its two active GEO satellites.

Note that it is one that often bounce the signals back down to radio receivers that can be found on the ground.

Hence, the radio receivers are said to be programmed to be able to get  receive and they can also unscramble the digital data signal, that has about or more than 170 channels of digital audio.

Therefore, XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.

Learn more about satellite from

https://brainly.com/question/18496962

#SPJ1

Vincent is attempting to remotely log into the system using openssh without success. he asks you what he can do to troubleshoot this problem. what should you recommend first?

Answers

In the case above, the command that i need to  recommend first is option B. Add the -vvv option on to Vincent's ssh command.

What is SSH command?

The Secure Shell (SSH) Protocol is known to be one that allows a user to be able to link up to a remotely located computer from the use of a single computer.

Note that this communication is one that often occurs via a secured encryption process. This kind of connection is one that is often used in file transfer and giving other remote commands.

Note that option B. is one that can enlist Vincent's help, and it is also one that can help him to be able to add the -vvv option on to his ssh command. This will help to give a great amount of information that will assist the person to you track down the issue.

Therefore, In the case above, the command that i need to  recommend first is option B. Add the -vvv option on to Vincent's ssh command.

Learn more about open ssh  from

https://brainly.com/question/17352088

#SPJ1

What windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

Answers

The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.

Does Windows 10 possess local security policy?

The Local Security Policy is known to be one that is often seen in Windows 10 and it is also known to be made up of information that is regarding the security of a local computer.

Note that If a person is trying to get into the Local Security Policy in Windows 10 Home, a person will receive an error report about it.

Therefore,  The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.

Learn more about windows utility from

https://brainly.com/question/6058561

#SPJ1


There are 79 different career pathways included within the 16 nationally recognized Career Clusters.

Answers

There are 79 different career pathways included within the 16 nationally recognized Career Clusters is a true statement.

What are the Career Clusters about?

The National Career Clusters Framework is known to be one that is often used as a kind of an organizing tool that is made for Career Technical Education (CTE) programs, curriculum design and others.

Note that there are said to be 16 Career Clusters in the National Career Clusters Framework, that is standing for 79 Career Pathways to help all learners to be able to pass their way to higher success in college and also in their career. It is made up of:

Agriculture, Food & Natural ResourcesArchitecture & ConstructionArts, A/V Technology & Communications, etc.

Hence, There are 79 different career pathways included within the 16 nationally recognized Career Clusters is a true statement.

Learn more about Career Clusters from

https://brainly.com/question/24613213

#SPJ1

____ is the study of how computers can potentially improve without human programming.

Answers

Answer:

Machine Learning and/or Artificial Intelligence (AI)

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

Write a program that first reads a list of 5 integers from input. then, read another value from the input, and output all integers less than or equal to that last value

Answers

Answer:

integers = [int(i) for i in input().split()]

value = int(input())

for integer in integers:

--if integer <= value:

----print(integer)

Explanation:

We first read the five integers in a string. We can use the .split() method, which splits the string into separate parts on each space.

For example:

print(input())

>> "4 -5 2 3 12"

print(input().split())

>> ["4", "-5", "2", "3", "12"]

We cannot work with these numbers if they are strings, so we can turn them into integers using the int constructor. An easy way to do this is with list comprehension.

print([int(i) for i in input().split()]

>> [4, -5, 2, 3, 12]

Now that all the values in the list are integers, we can use a for loop to get each of the values and check whether they are less than or equal to the value.

Let's first get the value from the input.

integers = [int(i) for i in input().split()]

value = int(input())

print(value)

>> 4

Here, we have to pass the input through the int constructor to be able to compare it with the other integers. Let's now make a for loop to go through each integer and check if the integer is less than or equal to value.

for integer in integers:

--if integer <= value:

----print(integer)

The dashes are there to show indentation and are not part of the code.

Which of the following tiny computer apps is designed to be useful but could cause more harm than good?

BIOS
Macro
OS
Sys file

Answers

The following tiny computer app that is designed to be useful but could cause more harm than good is Sys file

What is a Sys file?

This refers to the system file that is in operating systems and contains settings and variables that can make changes to the operating system.

Hence, we can see that if a user decides to tamper with the sys file on their operating system- either Microsoft DOS or Windows Operating Systems, this can lead to irreparable damages.

Read more about sys file here:

https://brainly.com/question/14364696

#SPJ1

The keyword __________ is required to declare a class.
a. public
b. private
c. class
d. all of the above

Answers

Answer is b-private

Answer:  b. private

Explanation:

structure that the house the electronic system specifications

Answers

Electrical systems, also called circuits or networks, are designed as mixtures of mainly three fundamental components: resistor, capacitor, and inductor. They are likewise defined by resistance, capacitance, and inductance—generally considered to be lumped-parameter effects.

What are the specifications of a circuit?

The specification can (and normally does) also set some of the physical parameters that the procedure must meet, such as size, weight, moisture resistance, temperature range, thermal output, vibration tolerance, and acceleration tolerance.

What is the electronic system?

An Electronic System is a physical interconnection of components, or parts, that gathers various parts of information together.

To learn more about Electrical systems, refer

https://brainly.com/question/24786034

#SPJ9

Array bounds checking should be directly coded into a system rather than assumed.

a. True
b. False

Answers

Answer:

True

Explanation:

One cannot assume an array bounds, it has to be specific

What type of security control does not require the insertion of the keycard into the reader but relies on the placement of the card within the lock's range to be recognized?

Answers

A type of security control that doesn't require the insertion of the keycard into the reader, but relies on the placement of the card within the lock's range to be recognized is generally referred to as proximity reader.

What is a door?

A door can be defined as a solid material made of wood or metal, which is designed and developed to facilitate entrance and exit out of a building.

What is a keycard?

A keycard can be defined as small plastic card, which is designed and developed to read and process magnetically encoded data in an electronic device that is fitted in a door, rather than the use of a door key.

In conclusion, we can infer and logically deduce that a proximity reader simply refers to a type of security control that is designed and developed to rely only on the placement of a card within the door lock's range to be recognized, rather than lying on the insertion of the keycard into the reader.

Read more on doors here: brainly.com/question/22731237

#SPJ1

in makecode arcade, which part of the interface can be used to answer questions about how a block functions?

Answers

in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

What is the function about?

In Blocks, Functions is known to be the element that one can find under the Advanced section.

Note that in finding functions in block, student can be be introduced to Simple functions.

Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

Learn more about block functions from

https://brainly.com/question/17043948

#SPJ1

Answer:

The right side panel

Explanation:

On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.

_____ makes source code available for use, modification, and redistribution as long as licensing terms are met. Free and open-source software Free and open-source software Copyrighted material Copyrighted material Proprietary software Proprietary software Intellectual property Intellectual property

Answers

Answer:

Free and open-source software makes source code available for use, modification, and redistribution as long as licensing terms are met.

Explanation:

Open-source software is software you can find and use for free.

In a partially filled array, the number of slots in the array that are not currently used is the?

Answers

Answer:

Can you please explain more

Explanation:

Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least ________ characters.

Answers

Answer: 8 characters

Explanation:

Answer:

10 characters

Explanation:

which things computer case contains

Answers

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

What is a computer case?

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

A__________ is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.

Answers

A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.

What is a blog?

A blog, in full  is known as a Web log or a Weblog. This is known to be a kind of an online journal that is usually owns by people or firm and it is one where a person, group, or corporation usually shows a record of activities, thoughts, or their  beliefs.

Note that the  blog is said to be a web page that a person needs to update on a constant basis and a lot of times, brands do have blogs right on their websites, and this tends to make it easier for users to be able to see and engage with a lot of others with posts.

Therefore, A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.

Learn more about website from
https://brainly.com/question/13171394

#SPJ1

Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?

Answers

Answer:

A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.

The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).

SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).

SAN architecture

A storage area network consists of a fabric layer, host layer and storage layer.

Identify the part of the information processing cycle described by each of the items below.

A student types text into a word processing program.

The computer checks and compares all words entered to find misspellings.

The computer shows possible misspellings on the screen.

You save the revised document to the hard disk.

CDs and DVDs are examples of

Answers

CDs and DVDs are well known examples of storage devices.

What is a storage device?

A storage device can be defined as any tool used to store data in a computer.

A student types text into a word processing program can be defined as an input whereas a computer that checks and compares all words entered to find misspellings refers to processing.

The computer shows possible misspellings on the screen may represent the output and saving documents to the hard disk is storage.

In conclusion, CDs and DVDs are examples of storage devices.

Learn more about storage systems here:

https://brainly.com/question/984226

#SPJ1

Other Questions
Taco bell understands that educational programming is a(n) __________ motivator. PLS ANSWER ILL MARK U BRAINLIEST Use the Hertzsprung-Russell diagram to determine which condition describes each star. Use the arrows to help locate the stars.luminosity (solar units)10%10510103102100.110-210-360 Man30 M10 Solar RadiLifetime10 yrs102 Solar Radus10 Solar RaduCentauSpicaBellatrixMAINLifetime10 yrsSirius BDenebAchemarSEQUENCELifetime10 yrsWHITESUPERGIANTSCanopusVegaSrutSun.Lifetime1010 yrsDWARFSProcyod SPProcyonPolariscturusTCMBetelgeuseLifetime1011 yrsGIANTSPolluxCentaun AAlsebaranCentaun BEndaniArtares61 Cyani A61 Cypni BLagalle 00520.3 MGliese 725 AGliese 725 B0.1 MSunRoss 128Barnard's StarWat 359Proxima CentaurD Question 5 of 20:Select the best answer for the question.5. Which one of the following is a correct example of the plural possessive case? A. Men's plansB. Stone's throwC. It's placeD. Woman's plans Where did the first colonists who settled south carolina and introduced racial slavery in the 1660s come from? Remote sensing data and applications thereof are particularly valuable for africa because? Which type(s) of joint(s) lack(s) a joint cavity and is(are) held together by a fibrous connective tissue? a) 1. fibrous joints; b) 2. cartilaginous joints; c) 3. synovial joints. e) 1 only What are the consequence of variations in physical development on the adolescents social, emotional and cognitive development at large?give practical example You are the director of health information services in a major medical center that maintains both a psychiatric and substance abuse units in addition to general medical and surgical units. Your facility, under the direction of the CIO, plans to join a computer network with 15 hospitals throughout the state, which will allow online access to records, regardless of which facility they were generated. None of the other 15 facilities offers psychiatric or substance abuse treatment, and you have been asked to provide HIM analysis as the subject matter expert.Identify access and confidentiality issues that may be present with such a network in the light of the statutory, regulatory, and accrediting requirements governing patients treated in these units.What specific organizational recommendation(s) would you make to the CIO to ensure she has considered specialized records in her support of the network for all departments, including the HIM department?Discuss psychotherapy notes as defined by HIPAA and how they are treated differently. If all of your blood vessels were connected end to end, how many miles would they run? 6 miles. PLS HELP ASAP! TyLet g(x)= 2x^2+3x-9 and h(x)=x^2+2x-6Find (h-g)(2.1) 20 points please help!!!!! In order to prevent inflation the federal government can manipulate _____. group of answer choices excise tax levels progressive taxation regressive taxation interest rates Jurors power to disregard the law and the judges instructions when they conflict with their personal conceptions of justice is called? Put the main steps of genetic engineering in the correct order. i. replicate the new organism ii. isolate the genes from the specialist cell iii. select the desired trait iv. insert the genes into the target organism a. ii, i, iv, iii b. iv, i, ii, iii c. iii, ii, iv, i d. i, ii, iv, iii Which of these is not a result of the federal government spending more than it earns? group of answer choices budget deficits budget surpluses increased national debt increased taxes At what distance from a 27 mw point source of electromagnetic waves is the electric field amplitude 0. 060 v/m ? The constrained-gap igniter plug used in some gas turbine engines operates at a cooler temperature because Dropping coins onto a sheet of paper is an example of what kind of inspirational activity used by designers? Suppose that the federal reserve enacts expansionary policy. everything else held constant, this will cause the demand for u. s. assets to ________ and the u. s. dollar to ________