Which of the following will Excel recognize as a date?
Group of answer choices

February 6 1947

2,6,47

2-Feb-47

None of the above

Answers

Answer 1

The option that shows how Excel recognize as a date is February 6 1947.

How does Excel see date?

The Excel  date is often seen as a regular number that is said to have been formatted to often look like a date.

One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.

Read more about Excel from

https://brainly.com/question/25879801


Related Questions

True or false: A local area network is a group of computers, printers, and other devices connected to the same network and covers a large geographic range such as a city, a county, or a state.

Answers

Answer:

True.

Explanation:

Hope this helps you!

Complete the sentence.

When sensitive information is sent over the internet, it should be
.

Answers

Answer:

encrypted

Explanation:

to prevent others from viewing it

Answer:

Your answer is encrypted

Explanation:

This will keep your information secure whilst sending it.

This means to:

convert (information or data) into a cipher or code, especially to prevent unauthorized access

So your info is safe

Pls mark brainliest <3

Hope this helps :)

`

`

`

Tori

which changes the angle of a picture skew or select or find

Answers

Answer:

This article discusses about some very basic and generalized techniques for detecting image skew. Definitely there are much advanced algorithms to detect skew, but those will not be covered in this article.

Explanation:

What would be considered a benefit of using simulation in the education field?

Simulation can reduce the costs of books.
Simulation can increase the cost of materials.
Simulation can reduce the number of teaching jobs.
Simulation can reduce the amount of homework for students.

Answers

Answer:

books cost

Explanation:

the books cost will go down, as they are to become digital, thus, making physical copies cheaper

Answer:

A

Explanation:

Did test

Discuss what is an embedded system. Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.

Answers

Answer:

An embedded system is a computer system a combination of a computer processor, computer memory, and input/output peripheral devicesthat has a dedicated function within a larger mechanical or electronic system.

Advantage

Simple to deliver higher creation.

Less costs for per bit of resultant.

It has not many interconnections.

It has Better steady and Higher speed.

It has Higher dependable.

To use for one errand.

Disadvantage

Once configured, these systems cannot be changed. ...

They are hard to maintain. ...

Troubleshooting is difficult for embedded systems. ...

Because these systems are made for specific tasks, hardware is limited


Tasha makes fun of Jeffery at work, harasses him, and calls him names. How
might an HR manager overcome this situation of office bullying?

Answers

Answer:

public class bullyFixer

{

   public static void main(String[] args) {

       System.out.println("buller of 5 and 15 is "+buller(5,15));

       System.out.println("buller of 2 and 3 is "+buller(2,3));

       System.out.println("buller of 20 and 100 is "+buller(20,100));

   }

   

   public static int buller(int num1, int num2){

       if (num2 <= num1 && (num1%num2 == 0)){

           return num2;

       }

       else if (num1<num2){

           return buller(num2,num1);

       }

       else{

           return buller(num2,num1%num2);

       }

   

   }

}

Explanation:

public class bullyFixer

{

   public static void main(String[] args) {

       System.out.println("buller of 5 and 15 is "+buller(5,15));

       System.out.println("buller of 2 and 3 is "+buller(2,3));

       System.out.println("buller of 20 and 100 is "+buller(20,100));

   }

   

   public static int buller(int num1, int num2){

       if (num2 <= num1 && (num1%num2 == 0)){

           return num2;

       }

       else if (num1<num2){

           return buller(num2,num1);

       }

       else{

           return buller(num2,num1%num2);

       }

   

   }

}

What device allows data to be processed into information

Answers

It’s a computer because it can be programmed to accept data

James, an IT manager, expresses a concern during a monthly meeting about weak user passwords used on company servers and how they may be susceptible to brute-force password attacks. Which concept can James implement to make the weak passwords stronger

Answers

Answer:

James could implement the use of symbles and numbers in the passwords so its less easy to brute-force it, and a maximum amount of characters and symbles

Explanation:

a password that looks like: invisable man (invisableman), is easy to guess unlike a password that looks like this: &31invisable#man%^2

or you could go with something like this: 1nv1548!3 m4n (or add random caps+numbers (maybe symbles))

A team of scientists is designing a study to examine factors that affect
people's enjoyment of video games. Which statement best represents a valid
hypothesis for the study?
A. More people enjoy role-playing games than platformer games.
B. Action games are better than role-playing games.
C. The graphics in console games are cooler than those in PC
games.
O D. Video games are fun.

Answers

Answer:

A. More people enjoy role-playing games than platformer games.

Explanation:

It is A because the genre of game is a factor of a video game.

B is trying to state an objective truth that one genre is better than another but not giving a reason (like it being more enjoyable).


C isn't even really game related, that would be a study on which gaming platforms are more enjoyable and why.


D has already been established. The current study is to determine what makes them more or less enjoyable.

Answer:

B. Action games are better than role-playing games.

Explanation:

In my opinion I like to do roleplay's I don't know why but I just do, but this is the correct answer.

How is distributed ledger technology (DLT) used in a blockchain?
A. To change the ownership of assets in blockchains
B. To encrypt transactions into blocks of information
O c. To store assets in different financial institutions
O D. To keep records of transactions in different places

Answers

Answer:

I believe the answer is D. To keep records of transactions in different places.

Explanation:

what is computer
what is computer ​

Answers

Hi! Computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

LOFT sends out a cents-off offer to its email subscribers to push sales. The next day, LOFT sends another. Overuse of cents-off offers might lead to what

Answers

Overuse of cents-off offers might lead to a cheapened brand image.

What is a business brand image?

Brand image is known to be the current depiction of the customers about a specific brand.

Note that if a firm uses cents-off offers  too much and in all their services so as to push sales, customer may view the brand as too cheap for their liking and may abandon it.

Learn more about email subscribers from

https://brainly.com/question/1538272

The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by:.

Answers

Answer:

the distance that must be traveled through the network.

Explanation:

The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by the distance that must be traveled through the network. The correct option is B.

What is semantic network model?

In the late 1960s, Allan Collins and Ross Quillian developed the network model of semantic memory organization.

According to this network model, information nodes (categories) are linked to one another via strong and weak links. Priming enables our memory to prepare related information for retrieval.

A semantic network is a type of knowledge structure that shows how concepts are related to one another and how they connect.

Semantic networks mine data, connect concepts, and draw attention to relationships using artificial intelligence (AI) programming.

According to the semantic network model, the time it takes a person to retrieve information about a concept is determined by the distance that must be traveled through the network.

Thus, the correct option is B.

For more details regarding semantic network model, visit:

https://brainly.com/question/29317050

#SPJ2

Your question seems incomplete, the probable complete question is attached below:

2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each one of those packets independently through the network?

Answers

The advantages of breaking up a single logical message into a number of fixed-sized packets is that it makes it more flexible and also it increases the performance and also the reliability of the internet.

There is an Easy lost data recovery Internet as it is an heterogeneous network.

Are packets made of fixed size?

Packets are known to come in different sizes. They can also be made of  a fixed size.

The examples are 1,000 or 1,500 bytes, or other kinds of variable sizes, based on the system. Its advantages is one where errors can be corrected easily and data recovery is fast.

Learn more about fixed-sized packets from

https://brainly.com/question/3991989

Help!! When was technology made?

Answers

Answer:

3.3 million years ago, if you mean technology in general, if you mean computer technology, then 1837 should be your answer.

Answer:

3.3 million years ago the first tools were made but technology is older than our specis itself

Explanation:

well even the use of rocks as wepons are technology

In your opinion what is the best or greatest technology advancement in your lifetime and why?

At least 6 sentences and include a topic sentence and conclusion sentence. Provide an example in the paragraph to support your opinion. No need to site

Answers

Answer:

ELECTRICITY

Since early discoverers like Benjamin Franklin studied it, and inventors like Nikola Tesla tested ways to turn it into power, electricity has not only been fueling generations of new innovations but also become an irreplaceable tool of modern life.

Explanation:

There's an old joke about a group of friends debating the world's greatest invention:

There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says.

There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks.

There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold."

There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold.""Yeah," says the friend, "so what?"

There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold.""Yeah," says the friend, "so what?""Think about it, " says the man. "That little bottle -- how does it know? but have you ever think how

Thermos bottle made.

yeah, because of electricity....

The discovery of electricity became the necessary basis for the occurrence of multiple other sciences and inventions that are constantly used and are of crucial meaning in the contemporary world.

The modern society, its life and well being depends on electricity wholly. We cannot imagine our lives without cell phones, computers, the internet, coffee makers, toasters, washing machines, and microwave ovens, and all of these devices work due to electricity, but we often forget that more crucial needs of ours are fulfilled.

:-befrank

A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network

Answers

Answer:

server or supercomputer

Explanation:

The other term for template document is _______.
A. DATA FILE
B. DATA SOURCE
C. MAIN DOCUMENT
D. MAIN MENU

Answers

The data source is a document, spreadsheet or database that contains personalized information such as names, addresses, and phone numbers. The Main Document can be a Form Letter, Labels, Email, or Directory.

So the answer is B. Data source.

Hope it helps :)

83\2+58+3^3+95*2/10

it's computer pls help​

Answers

Answer:

145.5

Explanation:

I was unsure what you needed done, but if it was a math equation then that is your answer :)

Hope this helped <3 Brainliest please? :)

In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. true false

Answers

In a print statement, a user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line.

What is a print statement?

A print statement can be defined as a line of code that is used to send data to the print or println method of a programming system such as compiler.

In Computer programming, an end user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line by using a print statement.

Read more on print statement here: https://brainly.com/question/21631657

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

Answers

Answer:

Brute force

Explanation:

Brute force means forcing your way into logging into an account.

This is done by trying all kinds of passwords, starting from something like "123456" to your birthday and getting increasingly complex passwords in the hope that the account has a weak password

Which program began as a two-hour weekly TV show that offered programming appealing to African American audiences, and in 1983 became a major network that highlighted new music, movies, and entertainment news

Answers

The program that offered programming appealing to African American audiences is BET.

What is TV show?

A television show is known as TV show for short. It is said to be any kind of   content that is often made for viewing on any kind of television set.

Note that It is one that is often broadcast through the use of over-the-air, satellite, cable, etc. The program that was said to start as two-hour weekly TV show and that  offered programming appealing to African American audiences is the BET.

Learn more about TV show  from

https://brainly.com/question/24108641

is an amount paid based on the volume of products or services that a salesperson sells

Answers

Answer:

should be commission

Explanation: i took this class a while back, hope this helps man

Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information

Answers

Not naming countries or people, but its mostly Nation State Actors / Hactivits. Eh, not sure about hactivits but mostly Nation state actors.

29. The startup configuration file is stored in ________________ a. ROM b. NVRAM c. Flash Memory d. RAM

Answers

Answer:

The start configuration is stored on the nonvolatile random-access memory aka NVRAM for the vast majority of systems.

Why might a computer calculate a long list of numbers better than a human?

A. Computers can replicate human tasks.
B. Computers can think creatively.
C. Computers must rest every few hours.
D. Computers calculate numbers very quickly.

Answers

Answer: Computers calculate numbers very quickly.

Explanation:

While most of the possible options are accurate, D appears to be your best option. Computers can calculate long, sophisticated numbers in a few seconds while it will (usually) take humans longer.

Please help me on this it’s due now

Answers

it’s C


i had the same thing and i picked c

The use of smart cranes enables transportation companies to do all of the following except manually load or unload crates onto a train with several workers. Thus, the correct option for this question is C.

What are smart cranes used for?

The features of smart cranes not only support the crane operators but also provides service personnel and terminal operators. They are used to easily accessible crane data, maintenance intervals can be monitored, service work/error analyses simplified and handling rates evaluated more quickly.

According to the context of this question, easy and efficient steering and regulation of heavy loads. It involves the utilization of easy guiding of loads, especially when utilizing a remote control system. Efficient handling of heavy loads with two cranes in tandem operation.

Therefore, the use of smart cranes enables transportation companies to do all of the following except manually load or unload crates onto a train with several workers. Thus, the correct option for this question is C.

To learn more about Transportation, refer to the link:

https://brainly.com/question/27667264

#SPJ7

List and describe in detail any four power management tools that were developed by atleast two manufacturers to prevent and/or reduce the damage of processors from theprocess of overclocking

Answers

Some power management tools to reduce damage to processors by the overclocking process are:

CPU TwakerMSI AfterburnerIntel Extreme Tuning UtilityAMD Ryzen MasterWhat is overclocking?

It is a technique that allows you to increase the power and performance of various computer hardware. That is, this process increases the energy of the components and forces the pc to run at a higher frequency than determined by the manufacturer.

Therefore, there are several power management models and manufacturers to reduce and prevent physical damage to pc components.

Find out more about overclocking here:

https://brainly.com/question/15593241

Which type of hackers break into systems for the thrill or to show off their skills?.

Answers

All of them except white hats

Please help me on this it’s due now

Answers

The answer is both A and B because logistics is the overall process of how things are equipped, stored and taken to their final destination.

Other Questions
An awning that covers a sliding glass door that is 88 inches tall forms an angle of 50 with the wall. The purpose of the awning is to prevent sunlight from entering the house when the angle of elevation of the sun is more than X = 60 When solving this equation for x, what would you do next? Classify the following triangle as acute, obtuse, or right.A. ObtuseB. AcuteC. RightD. None of these You are driving down a two-way, two lane street in a residential area at night during a storm. You notice that a large tree has fallen down across the roadway ahead of you. What type of turnabout should you make and why? Lela bought 3.3 pounds of nuts they cost $1.79 a pound. How much money did she spend HELP!!! Select the three adjectives. Don't select any articles (a, an, or the). Numerous studies have found that exercise is beneficial because it reduces the risk of illnesses such as stroke, diabetes, and some forms of cancer. How do we operate the economy within the ecological constrains of natural resources? (10 marks) 1. Mrs. Lee cut a pie into 6 pieces. Shegave each of her 4 children apiece of pie.If Mrs. Lee divided the entire pie equallyamong her children, what fraction ofthe remaining pieces of pie didMrs. Lee give each child?A 14 piece of pie piece of pie13piece of pie1D piece of pie4B Kenneth is very rough and clumsy. Kenneth is like a. a cow in a rainforest b. a bull in a china shop c. a lion hunting prey d. a tiger pouncing on a rabbit please help asap tysm Identify each statement about religion as true of debora barrios-vasquezs story, or not true. estimate the following square roots 8 is between ___ and ___ but closer to____80 is between ___ and ___ but closer to____140 is between ___ and ___ but closer to____88 is between ___ and ___ but closer to____250 is between ___ and ___ but closer to____ The length of a rectangle is eight more than triple the width. If the perimeter is 168 inches, find the dimensions. What is x? What is written in pencil is what my teacher gave me. Joan borrowed $5 a day to buy lunch. She now owes $65 dollars. How many days did Joan borrow $5? Use a picture to help explain your answer. Compare the picture to the numerical expression. Fifteen is 3/8 of what number When data are categorized as, for example, places of residence (rural, suburban, urban), the most appropriate measure of central tendency is the what is the value expression of the expression 2(x + 4) - (y8)when x=1/8 any y= 3/16 .A) 11/4 .B) 65/2.C) 21/4.D) 27/4HELP ASAP Name two groups that faceddiscrimination in the West. pls help me this is so frustrating How does social media affect elections and campaigns? Is this a positive trend? Why or why not?