question 12 :ernesto's group has made a massive spreadsheet containing data from several sources. which feature could the group use to easily sort a series of data to help improve their understanding of the information?

Answers

Answer 1

A sizable spreadsheet created by Ernesto's team contains information from numerous sources.  if the worksheets you want to view are in the same workbook. To view a worksheet, click on it. Click New Window under the Window group on the View tab.

What is row number ?

For each sheet you want to view, repeat steps 1 and 2. Simply click the row number or column alphabet to select the first one, then move the pointer to the last row or column you want to select. Blank Workbook should be double-clicked under Available Templates. keys on the keyboard You may also hit CTRL+N to instantly create a brand-new workbook that is empty. By clicking inside a cell, you can select the one you want to format. The Home Toolbar's % style button should be clicked.

To learn more about  empty from given link

brainly.com/question/16588531

#SPJ4


Related Questions

If like dog get point..

Answers

I like dogs.

I have got one named Snupy.

Answer: Husky’s just saying..They are pretty animals.

Explanation:

n
Which of the following is not a goal of a persuasive speaking?
a. to motivate to action
b.
to change attitudes, beliefs, or values
to strengthen or weaken attitudes, beliefs, or values
d. to define, demonstrate, or instruct
C.

Answers

Answer: D. to define, demonstrate, or instruct.

Explanation:

Persuasive speaking is the form of speaking that we usually engage in. It is used to convince people. As individuals, we usually engage in persuasive speaking. We argue about different things and try to convince the other person to agree with us.

Th goals of persuasive speaking is to motivate to action, to change attitudes, beliefs, or values and to strengthen or weaken attitudes, beliefs, or values.

It should be noted that the goal of persuasive speaking isn't to to define, demonstrate, or instruct. Therefore, the correct option is D.

Answer:

Simple Answer: D

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet.

Answers

Answer:

The answer would be Spoofing

power steering belts should be checked for all of the following EXCEPT

Answers

You did not list the options.

ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next​

Answers

Answer:

B

Explanation:

I dont no if it is right but B has the things you would use for desktop publishing

Answer:

the answer is B.

a process to design and produce publications, with text and images, on computers

Explanation:

what is all about programming interactions in the real world.

Answers

Answer:

Programming is everywhere in the modern world and meets you in the street, your workplace, and the local grocery store. You interact with bar-code scanners regularly, and you almost certainly use lots of code while working, whether you're using a word processor to write a letter or an email platform to send messages. Programs used in real-world environments should also be programmed in the real world, so we have developed a new programming paradigm, “Real-World Programming (RWP),” which enables users to make programs for handling real-world environments as well as data in computers

Which external reference is formatted correctly?

=[My_Sales.xlsx]!Quarter1:C12

O ='(My_Sales.xlsx)!Quarter1':C12

O ="[My_Sales.xlsx]Quarter1'!$C$12

O =(My_Sales.xlsx)!Quarter1:$C$12


C on edge.

Answers

Answer:

= '[My_Sales.xlsx]quarter1'!C12

Explanation:

The formula gets the value of the cell C12 in the quarter worksheet of the  My_Sales.xlsx workbook.

Answer:

C

Explanation:

got it right on edge

Write an algorithm in pseudo code to find the product of two numbers​

Write an algorithm in pseudo code to find the product of two numbers

Answers

Answer:

Read num1 , num2

Set multi to num1*num2

Write multi

Explanation:

In active multiprogramming schemes, a job can monopolize the CPU for a long time while all other jobs waited. True or False

Answers

In active multiprogramming schemes, a job can monopolize the CPU for a long time while all other jobs waited. The statement is False.

Multiprogramming is a computer operating system feature that allows multiple programs to run concurrently on a single CPU. In multiprogramming schemes, the operating system can load multiple programs into main memory, and each program is given a small time slice to execute on the CPU. The operating system switches rapidly between programs, giving the impression that multiple programs are executing simultaneously.

In active multiprogramming schemes, a job cannot monopolize the CPU for a long time while all other jobs wait. Multiprogramming is designed to efficiently share the CPU among multiple jobs, preventing one job from dominating the processor and ensuring fair allocation of CPU time to all jobs.

This ensures that no single job monopolizes the CPU for an extended period of time, and that all jobs are given a fair share of the CPU's processing power. So, it is not true that a job can monopolize the CPU for a long time while all other jobs wait in active multiprogramming schemes.

To know more about operating system,

https://brainly.com/question/30778007

#SPJ11

In active multiprogramming schemes, a job can monopolize the CPU for a long time while all other jobs waited.
The statement is False.

Active multiprogramming is a technique used in operating systems where multiple jobs or tasks are executed concurrently on a single CPU. This is achieved by dividing the CPU's time into small intervals and switching between jobs during those intervals. The purpose of active multiprogramming is to increase the utilization of the CPU by keeping it busy with multiple tasks. Therefore, it is essential to ensure that no job monopolizes the CPU for a long time, as this can lead to a significant decrease in the overall efficiency of the system. To prevent any job from monopolizing the CPU, a scheduling algorithm is used to determine which job should be given access to the CPU at any given time.The scheduling algorithm takes into consideration various factors such as the priority of the job, the amount of time it has already spent on the CPU, and the amount of time it still requires to complete.

For such more questions on multiprogramming

https://brainly.com/question/15714813

#SPJ11

either using the response tab in the attack results window or by looking at each successful (i.e. 200 code) request manually in your browser, find the ticket that contains the flag. what is the flag?

Answers

The flag is usually found in the response body of a successful request. To find it, look for a response with a 200 code in the attack results window. Then, open the response tab to view the response body.

what is code?

Code is a set of instructions or commands written using a programming language to communicate with a computer or other device to perform a specific task. It is the language computers understand and use to carry out tasks that humans want them to do. Code is used to create computer programs, websites, apps, and other digital media. It is the foundation of modern technology, as it is the key to unlocking the power of computers. Code can be written in many languages, such as C++, Python, and Java, and can be used to create a wide variety of applications and solutions.

Search for the flag in the body, which is typically in the form of a string of random letters and numbers. Once you've found the flag, copy it and paste it into the flag input field.

To learn more about code

https://brainly.com/question/23275071

#SPJ1

After reading chapter four of your textbook, use a browser to research workflow models. Answer the following questions: Is it a good idea to include diagram (s) of the application you are building, and if so, why?

Answers

It is definitely a good idea to include diagrams of the application that you are building. This is because it gives your a concise framework to manage things accordingly.

What do you mean by Workflow models?

Workflow models may be characterized as the sequential series of tasks and decisions that correspondingly constructs a business process.

The process of designing a workflow model lets business users observe how a process works and helps them streamline and optimize it for the best results and high efficiency.

There are three types of workflow models that typically exist. They are sequential, state-machine, and rules-driven workflows. An understanding of each will help you decide which one best suits your business processes.

Therefore, it is definitely a good idea to include diagrams of the application that you are building. This is because it gives your a concise framework to manage things accordingly.

To learn more about Workflow models, refer to the link:

https://brainly.com/question/28523445

#SPJ1

Who paid for the development of the internet, and why?.

Answers

Computer scientists whose research was heavily financed by the federal government, most notably through Darpa, the research arm of the Defense Department

which circut is a series circut?​

Answers

In a series circuit, the components are connected end-to-end

What is a Series Circuit?

A series circuit is a circuit in which the components (such as resistors, capacitors, and inductors) are connected in a single path, so that the same current flows through all the components.

In other words, the components are connected end-to-end, and there are no branches or parallel connections in the circuit.

P.S: Your question is incomplete, so a general overview was given.

Read more about series circuit here:

https://brainly.com/question/19865219

#SPJ1

Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which an overflow error occur?

Answers

2 I think because 2 I think is binary I’m sorry if this is wrong

. Given a Vertex object x, give Java code to enumerate its outgoing edges.
2. Given a VertexAndDist object x and a new distance d, give Java code to create an updated object with the same vertex as x but with distance d.
3. For simplicity of implementation, we use HashMaps to map vertices to handles/parents and edges to weights. How could you modify the Vertex and/or Edge classes, as well as the maps themselves, to implement the maps using ordinary arrays, with no hashing? Be sure to address both the vertex and edge maps in your answer. (Hint: consider the Vertex’s "id" field for inspiration.)

Answers

The id fields in the Vertex and Edge classes act as the indices for the arrays, enabling efficient access to the associated information.

1. Java code to enumerate the outgoing edges of a Vertex object x:

// Assuming a Vertex class with an id and a List of outgoing edges

Vertex x = ...; // Your Vertex object

List<Edge> outgoingEdges = x.getOutgoingEdges();

for (Edge edge : outgoingEdges) {

   // Process each outgoing edge

   // ...

}

In this code, we assume that the Vertex class has a method getOutgoingEdges() that returns a List of outgoing edges for the given vertex object. We iterate over the list of outgoing edges and perform any required operations on each edge.

2. Java code to create an updated VertexAndDist object with a new distance:

// Assuming a VertexAndDist class with a vertex and a distance

VertexAndDist x = ...; // Your VertexAndDist object

int newDistance = ...; // The new distance value

VertexAndDist updatedObject = new VertexAndDist(x.getVertex(), newDistance);

In this code, we assume that the VertexAndDist class has a constructor that takes a vertex and a distance as arguments. We create a new VertexAndDist object with the same vertex as x and the new distance value d.

3. Modifying the classes and maps to use arrays instead of HashMaps:

To implement the maps using ordinary arrays instead of HashMaps, you can follow these steps:

a) Vertex Class:

Modify the Vertex class to have an id field of type int. This id will act as an index for the array-based maps.

Ensure that the Vertex objects are stored in an array-based data structure, such as an ArrayList or a simple array, using the id field as the index.

b) Edge Class:

Modify the Edge class to have an id field of type int. This id will act as an index for the array-based maps.

Ensure that the Edge objects are stored in an array-based data structure, such as an ArrayList or a simple array, using the id field as the index.

c) Vertex-to-Handle/Parent Map:

Replace the HashMap used for mapping vertices to handles/parents with a simple array-based structure. The size of the array should be equal to the maximum possible id value for vertices.

Use the id of the vertex as the index in the array to store and retrieve the handle/parent information.

d) Edge-to-Weight Map:

Replace the HashMap used for mapping edges to weights with a simple array-based structure. The size of the array should be equal to the maximum possible id value for edges.

Use the id of the edge as the index in the array to store and retrieve the weight information.

By implementing these modifications, you can replace the HashMaps with array-based data structures, eliminating the need for hashing. The id fields in the Vertex and Edge classes act as the indices for the arrays, enabling efficient access to the associated information.

Learn more about Hash Maps visit:

https://brainly.com/question/30088845

#SPJ11

is concerned with improving productivity and safety by designing workplaces, equipment, instruments, computers, workstations, and so on that take into account the physical capabilities of people. question 26 options: ergonomics employee motivation job design job enrichment

Answers

The goal of ergonomics is to increase productivity and safety by designing work environments, tools, computers, workstations, and other items with people's physical capabilities in mind.

How might you describe ergonomics?The study of individuals in their workplace environments is generally referred to as ergonomics. More specifically, an ergonomist (pronounced like economist) creates or changes the work to fit the worker, not the other way around. The intention is to reduce labor-related discomfort and injury risk.Ergonomics is the science of adapting the job to the person. Workers can stay healthy and businesses can cut back on or do away with the high costs related to MSDs by designing workstations and tools to reduce work-related musculoskeletal disorders (MSDs).Working in awkward postures or being in the same posture for long periods of time.

To learn more about Ergonomics, refer to:

https://brainly.com/question/8495020

which one of the following statements about copy and fill instructions is not true? question 2 options: 1) the length parameter indicates the number of elements in the destination stack. 2) the source and destination address must have the indexing

Answers

The statement which not true about copy and fill instructions is the source and destination address must have the indexing.

So, the correct answer is option 2.

What's Copy and fill instructions

Copy and fill instructions are commonly used in programming to transfer data from one location to another.

These instructions are useful in situations where it is necessary to duplicate information or move it to a different location. In general, the length parameter in these instructions indicates the number of elements in the destination stack, which determines how much data is copied.

However, one statement that is not true is that the source and destination address must have indexing. This is incorrect because indexing is not always required for these instructions to work properly.

In some cases, the addresses may be specified directly without using indexing. Overall, copy and fill instructions are important tools for manipulating data in programming and can be used to simplify complex tasks.

Hence the answer of the question is option 2.

Learn more about data at

https://brainly.com/question/30270766

#SPJ11

what is excel in ibca

Answers

Answer:

Excel is mostly used for data storage. It also more or less has its own programming language within it for automation of data transfer and storage. It's used in a grid layout or what you'd see as a sheet.

I have taken IBCA (Intro to Business Computer Applications) but I'm surprised that you're taking excel in IBCA, perhaps just the basics I'm assuming. Completing IBCA should get you Microsoft certifications in Word and BCA will get you certifications in Powerpoint and Excel. If you pass of course.

An operating system is defined as hardware that converts software into a useful form for applications.

a. true
b. false

Answers

Hardware that transforms software into a form that is helpful for applications is referred to as an operating system. False. Hardware conversion is done by software.

What is an operating system?Computer hardware and software resources are managed by an operating system (OS), which also offers common functions for software programs.Operating systems that use time-sharing plan activities to make the most of the system's resources. They may also contain accounting software to allocate costs for processing time, mass storage, printing, and other resources. An operating system (OS) is a piece of software that controls all of the other application programs in a computer after being originally loaded by a boot program. Through a specified application program interface, the application programs seek services from the operating system (API).

To learn more about operating system, refer to:

https://brainly.com/question/22811693

#SPJ4

why is it necessary to use standard furniture in a computer lab​

Answers

to avoid poor posture which may lead to strain injury.

FILL THE BLANK. in vivo exposure within systematic desensitization is ______ imaginal exposure.

Answers

In vivo exposure within systematic desensitization is real-life exposure.Systematic desensitization is a therapeutic technique commonly used in cognitive-behavioral therapy (CBT) to treat phobias.

In vivo exposure specifically refers to the real-life, physical exposure to the feared stimuli or situations. It involves directly facing the feared object or engaging in the feared activity in the actual environment where it occurs. For example, if someone has a fear of heights, in vivo exposure would involve gradually exposing them to heights in real-life situations, such as climbing a ladder or standing on a high balcony.On the other hand, imaginal exposure is a different technique within systematic desensitization that involves exposure to feared situations or stimuli through imagination or mental imagery. It is typically used when the feared stimuli cannot be easily replicated in real life or when it is impractical to expose the individual directly to the feared situation.

To know more about desensitization click the link below:

brainly.com/question/5557547

#SPJ11

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Answer:

Sound recorder software

Explanation:

A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions, you find out that his nephew upgraded his RAM for him over the weekend and couldn't get the computer to work right. What could be the problem

Answers

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

Use the cal command to determine the day of the week you were born. This will require 2 parameters for the cal command. What command did you enter?

Answers

Cal command is a calendar command in Linux which is used to see the calendar of a specific month or a whole year and enter a command, using output redirection (>), to output of the date command to a file called todaysdate.

What is cal command?

cal is a command- line utility on a number of computer operating system which includes Unix, Plan 9, Inferno and Unix - like operating system such as Linux that prints an ASCII calendar of the given month or year.

cal command is generally stands for calendar and the function of cal command is to display a simple calendar. The example of cal command is cal sep 1752.

Therefore, Cal command is a calendar command in Linux which is used to see the calendar of a specific month or a whole year and enter a command, using output redirection (>), to output of the date command to a file called todaysdate.

Learn more about cal command here:

https://brainly.com/question/22970860

#SPJ4

What type of visualization is commonly used to display data when components leading to a total can involve negative values?.

Answers

Line charts are a type of visualization commonly used to display data when components leading to a total involve negative values.

Line graphs display value changes over continuous measurements, as those taken over time. Positive and negative modifications are facilitated by moving the lineup or down, respectively. In order to aid the reader in projecting or making predictions about the future, it can also reveal broad trends.

Other related charts, such as the sparkline or ridgeline plot, can be created from many line charts. Whether the connection between the displayed variables is strong or weak, positive or negative, linear or non-linear, scatter plots offer a flexible way to show that relationship. Thus, scatter plots can also be used to efficiently show negative value results, but are a little complex.

Learn more about data visualization here: https://brainly.com/question/28146734

In your opinion what do you think “digital freedom”means?

Answers

Answer:

umm i think secure websites and privacy

Explanation: I guessed

Answer:

digital freedom in my opinion is being digataly free like not being moderated every time you flipping answer somthing

Explanation:

(all hale eggplant god

In your opinion what do you think digital freedommeans?

design a system that takes as input 4 bits (a1 a0 b1 b0) that is treated as two separate 2 bit integer values a: a1a0 and b: b1b0. the output f of the circuit will 5 be a 1 if the value of a is equal or greater than the value of b (i.e. a ≥ b) and 0 otherwise

Answers

Designing a system that accepts four bits (a1 a0 b1 b0) as input and interprets them as two distinct 2-bit integer values a: a1a0 and b: b1b0 is the goal

. If the value of a is greater than or equal to the value of b (i.e. a≥b), the output f of the circuit will be 1. Otherwise, the output f will be 0.In the following section, we will look at how to design a system that will accept a 4-bit input and produce a 1-bit output by comparing the two 2-bit numbers a and b.How can you construct the system's circuit?The table below displays the four possible two-bit values for a and b:

The output f must be set to 1 when a is greater than or equal to b. As a result, we can construct the circuit for f as follows:First, build the circuit to generate the "a≥b" output. Then, pass the output of this circuit through an OR gate with a logic 1 to produce the final output f. To construct the "a≥b" circuit, we compare the two leftmost bits of a and b using an XOR gate. If the two bits are different, the output is 1; otherwise, the output is 0. We also use an AND gate to check if the rightmost bit of a is 1. Finally, we connect the output of the XOR gate to one input of an OR gate, and the output of the AND gate to the other input. As a result, the circuit will generate a 1 output only if a≥b.

To know more about bit visit:

https://brainly.com/question/30904812

#SPJ11

What is shoulder browsing? A. accessing someone else’s computer without permission B. deceptively observing people type in personal information C. distributing illegal software D. using internet search engines for information

Answers

B. Deceptively observing people type in personal information.

Essentially, think of it as someone standing behind you, looking over your shoulder, watching everything you do on a computer.

Answer:

b

Explanation:

Which loop prints the numbers 1, 2...100?

c = 1

while (c <= 100):
c = c + 1
print (c)

c = 1

while (c < 100):
c = c + 1
print (c)

c = 1

while (c <= 100):
print (c)
c = c + 1

c = 1

while (c < 101):
c = c + 1
print (c)

Answers

Answer:

while (c <= 100):

print (c)

c = c + 1

Explanation:

We can cancel out the while loops with ' < ' because then it won't print when C is 100.

while (c <= 100):

print (c)

c = c + 1

Is probably right because unlike the other while loop with ' <= ' it has a print statement before the C = C + 1 which means look at this:

C = 1

print(c)

C = C + 1

So when it's run 1 is printed

But when doing the other while loop:

c = 1

while (c <= 100):

print (c)

c = c + 1

C = 1

c = c + 1

print(c)

It prints 2 because it added 1 to C first before actually printing it.

The loop that prints the numbers 1, 2...100 is

c = 1

while (c <= 100):

   print (c)

   c = c + 1

We are to find the loop that prints the numbers 1 , 2 …100.

Therefore, the loop that print 1 to 100 can be represented as follows:

c = 1

while (c <= 100):

   print (c)

   c = c + 1

c is a variable initialize with zero.

The while loop is used to check if c is less than or equals to 100.

If c is less than or equal to 100 we print the value of c .

Then we add 1 to c and go back to the loop again.

learn more on loop here: https://brainly.com/question/19705987?referrer=searchResults

Which loop prints the numbers 1, 2...100?c = 1while (c &lt;= 100): c = c + 1 print (c)c = 1while (c &lt;

Which of the following statements are true about cross-platform development? Select 3 options.
Hybrid apps are cross-platform and provide access to many hardware features.
Web apps are not cross-platform, unless they are being run on a smartphone.
Native apps are cross-platform applications, where one version of the app runs on all devices.
Application programming interfaces are often used to make cross-platform development easier.
Cross-platform development allows programmers to create one version of an app that runs on many
different platforms.

Answers

Answer:

- Application programming interfaces are often used to make cross-platform development easier.

-Hybrid apps are cross-platform and provide access to many hardware features.

-Cross-platform development allows programmers to create one version of an app that runs on many different platforms.

Explanation:

The statements that are correct about "cross-development platform" would be:

A). Hybrid apps are cross-platform and provide access to many hardware features.

D). Application programming interfaces are often used to make cross-platform development easier.

E). Cross-platform development allows programmers to create one version of an app that runs on many different platforms.

What is a cross-development platform?

The Cross-Development platform is described as the process of development of application software that carries the ability to function on various operating systems.

The above statements correctly state that these applications offer access to multiple characteristics of the hardware and work on a number of platforms.

The applications are prepared to allow its access on distinct devices and it helps in making on the application that will work on all platforms.

Thus, options A, D, and E are the correct answers.

Learn more about "Development" here:

brainly.com/question/752980

Other Questions
Your cousin plays point guard for her community basketball team. When she plays in a game, five out of seven baskets she scores for her team are lay-ups.If your cousin scores fourteen baskets for her team at Saturday night's game, how many were lay-ups?If, during the course of the season, your cousin scores one hundred forty baskets for her team, how many were lay-ups?If, over the course of several games, your cousin makes twenty lay-ups, how many total baskets did she score for her team? if 6 bales are needed to feed 40 head of cattle, how many bales are needed to feed 50 The force created when the court pushes LeBron James upwards is equal towhich force?y Clayton is considering opening a security company in his town that will provide body guards and security officers for both individuals and businesses. Based on his research, Clayton identifies five potential competitive threats. Identify which of the five forces is associated with each potential threat. Threat of Seller bargaining power Existing competition Threat of substitutes Buyer bargaining power new entry Answer Bank Clayton estimates that he will make a positive economic profit in his first year of business. The majority of Clayton's employees are off-duty police officers who belong to a labor union. There is one large business in town that Clayton estimates could account for 80% of his potential revenue. Many companies are replacing security officers with high-tech camera monitoring systems. A national security franchise has a well-established firm in his town that already serves most small businesses. What is one theory that explains the cause of ice ages? What is 400*9+450=?400*9+450=? 3.1 Political Origins 1. What three concepts of government did the pilgrims bring to the new government? 2. What is the Magna Carta? 3. What is a bicameral legislature? 4. What document secured the right to a trail and judged by your peers? 3.2 Independence5. How did the colonist become proficient at self rule? 6. For how long did the Second Continental Congress serve as our first government? How should Raoul revise this body paragraph to make it more effective? How do I make my parents love me? Sierra was meeting with board members of the league of women voters and was aware from previous meetings that all the female board members wore dresses to meetings. Sierra normally wore pantsuits to work, or dress pants and a blouse, but on this day, sierra wore a dress. Sierra is exhibiting. Managers who strive to act fast to meet changing customer needs orto capitalize on new opportunities are focusing on Eliminate the parameter t to rewrite the parametric equation as a Cartesian equation. {X(t) 8 cos(t) ly(t) = 5 sin(t) ( = Which temporal technique depicts possible outcomes that may or may not actually happen in the future?Thetemporal technique depicts possible outcomes that may or may not actually happen in the future, A cyclist travels 9.6 km in 30 minutes. What is his average speed in km/h? what is the correct term for the largest group of indigenous people in greenland? Why is the father's absence such a powerful presence in the novel When The Emperor Was Divine? According to the Patient's Bill of Rights, a patient musttake responsibility for the efforts to improve their healthdisclose their medical historyask questions if they do not understandall of the above Use a calculator to approximate cot(5) to two decimal places. (Enter a number.) To assess the accuracy of a laboratory scale, a standard weight known to weigh 1 gram is repeatedly weighed a total of n times How large should n be so that a 95% confidence interval for has a margin of error of 0.0001? Write a linear equation that passes through the given two points.(0, 1) and (5,3)