Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Need some help please. I want to much my answers to see if they are correct. Tha

ID: 3841479 • Letter: N

Question

Need some help please. I want to much my answers to see if they are correct. Thank you

All of the following are basic spreadsheet principles except A. logical form B. clean layout C. no text D. clear and understandable entries To get the first characters in a cell you should use the A. Begin function B. Start function C. Left function D. Get function If you found regHours in a spreadsheet formula you'd know it's a A. mistake B. named reference C. constant D. function Which of the following is a valid XML tag? A. B. C. D. Which of the following is not one of the standard operations on databases? A. Project B. Select C. Disassemble D. Union The symbol to terminate a statement in JavaScript is A. ~ B. ! C. D. Which of the following is not a term used to describe changing the value of a variable? A. assign B. gets C. sets D. becomes All of the following are input elements except A. print B. radio button C. text box D. checkbox In JavaScript, onclick is a(n) A. variable B. event C. event handler D. button The building blocks of programming are A. programming languages B. functions C. HTML and JavaScript D. variables and events Random numbers in JavaScript are generated using A. Math.random() B. Rnd C. Math.rnd D. Random.Math() Which keyword generally begins the last line of a function? A. end B. final C. outtie D. return A false outcome for a termination test means A. terminate the loop B. terminate the program C. continue the loop D. do not enter the loop The maximum number of times a loop can iterate is A. 1024 B. 65.536 C. 1.048.576 D. infinite Array elements cannot be numbered with A. negative numbers B. decimals C. letters D. all of the above Computers can A. think B. manipulate information C. be creative D. all of the above All computer computations can be completed with just A. 4 instructions B. 6 instructions C. 9 instructions D. 11 instructions For quality control purposes, enter B here. Also, take a deep breath and relax. A. Not this one B. This one C. Not this one either D. Definitely not this one A. spam B. spyware C. phishing D. rootkit E. worm Software that directly manipulates the OS to hide its presence. Social engineering concept that involves convincing trusting people to give up personal data. Software that snoops on private information. Software that copies itself over the Internet and contains malicious code. Unsolicited commercial email.

Explanation / Answer

1.which of the following is not one of the rules cited in class for making e-mail more effective?

Answer:C .Use all capital letters.

2.which of the following is not an area to protect our computer in?

Answer: C.wrapping the computer in foil.

3.which of the following is an example of identity theft?

Answer:D.all of the above.

4.The result of XORing 1011 1011 with 1001 0110 is

Answer:B.0101 0010

5.Respectively,rows and colums are designated with

Answer:A.numbers,letters

6.Spreadsheet formulas start with

Answer: B.=.

7.which of the following is not a valid range of cells?

Answer:all of the above.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote