To prevent users from making changes to her presentation, Selma should convert it to a read-only format like PDF and set permissions to restrict editing.
How can Selma ensure that users are unable to make changes to her presentation?To ensure that users who have access to her presentation are unable to make changes to it, Selma should take the following steps:
Convert the presentation to a read-only format: Selma can save the presentation in a format that only allows viewing, such as PDF (Portable Document Format). This will prevent users from making any modifications to the content.
Set permissions and access control: Selma should adjust the permissions and access control settings for the presentation file. She can restrict editing privileges for specific users or user groups, ensuring that only authorized individuals have the ability to make changes.
Password protect the presentation: Selma can add a password to the presentation file, preventing unauthorized users from opening and modifying it without the correct password.
Store the presentation in a secure location: Selma should store the presentation in a secure location, such as a password-protected folder or a secure cloud storage service, where only trusted individuals have access. This will further safeguard the presentation from unauthorized modifications.
By implementing these measures, Selma can effectively protect her presentation from being edited by unauthorized users, ensuring that the content remains intact and unchanged.
Learn more about presentation
brainly.com/question/29964652
#SPJ11
When do you use a while loop instead of a for loop? (Select multiple answers)
1. You do not know how many times a loop will need to run
2. To do number calculations
3. When using a count variable
4. To repeat code.
Answer:
1. You do not know how many times a loop will need to run
4. To repeat code.
Explanation:
Required
When to use while loop instead of for loop?
Option 1 and 4 answer the question
1. You do not know how many times a loop will need to run
Using while loop in this case is suitable to the for loop.
Take for instance
You want a set of instruction to be repeated until the user enters 1
e.g.
while a != 1:
print("abc")
print("def")
a = int(input("Input: "))
The above is written in Python
The print instructions will be repeated until the user enter 1.
Now, you do not know if the user will enter 1 the first time or the 100th time or the 10000th time.
In other words, you don't know how many times the loop will be executed.
In this case, while loop is preferred to for loop
4. To repeat code:
The same analysis as used in (1) above is applicable in (4).
The print statements in
while a != 1:
print("abc")
print("def")
a = int(input("Input: "))
will be repeated until the user enters 1
The for loop isn't preferable in this case
Other options (2) and (3) can be implemented using both the for loops and the while loops
The while loops allows the execution of a block of code over and over again until a condition or certain conditions are met. The while lop are used instead of the for loop in the following circumstances :
You do not know how many times a loop will need to runWhen using a count variableCertain loops requires that a condition is met before the loop terminates. While some loops have a clear and predictable number of runs, some do not. Hence, due to this unpredictability, while loops are preferred :
Code snippet in python :
num = int(input())
while num < 5 :
print('invalid')
num = int(input())
Also, when using a count variable, the while loops is more appropriate as also more appropriate ;
Code snippet in python :
count = 20
while count > 0 :
print('available')
count -= 1
Therefore, the while loop is more appropriate for a loop with an unknown number of runs and when using the count variable.
Learn more :https://brainly.com/question/15745784
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
a. missing prototype
b. incomplete documentation
c. unfinished system proposal
d. inadequate feasibility study
Hey there mate :)
As per question,
Question:- A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
To find:- Write the correct option
Answer:- Option B. incomplete documentation
Answer per sentence:-
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. This is due to incomplete documentation.
you can use tables for layout work. However, in XHTML, each form control should have its own ______ element
a. method
b. textarea
c. label
d. fieldset
Answer:
c. label
Explanation:
Installing a system file checksum verification application on your servers is an example of ensuring
Installing a system file checksum verification application on your servers is an example of ensuring the integrity and security of your system files by verifying that they have not been tampered with or corrupted during transmission or storage. This verification process helps to prevent errors and vulnerabilities that could compromise the stability and performance of your servers and the applications running on them. By regularly verifying the checksums of your system files, you can detect any changes or discrepancies that may indicate a potential security breach or system malfunction, and take appropriate measures to address them.
To know more about following installing a system file please check the following link
https://brainly.com/question/26221430
#SPJ11
Explain one rule the company must follow when using cookies on its website.
Explanation:
Work out what cookies your site sets, and what they are used for, with a cookie audit.
Tell your visitors how you use cookies.
Obtain their consent, such as by using Optanon, and give them some control.
Easy coding question, please help.
Answers:
What is the index of the last element in the array? stArr1.length()-1
This prints the names in order. How would I print every other value? Change line 4 to: index = index +2
Change line 7 to: i < names.length
Please anyone, help me.... I'm not sure how to put these all together.
35 points!
Answer:
#School Name
school_name = "Klein Cain"
# Asks for name
full_name = input("Please enter your full name ")
#Says Hello
print("Hello, ", full_name, "!!")
#Says the letters in your name
print("There is ", len(full_name), " letters in your name")
#Says final message
print("??? is a Cain where??? ", school_name)
Answer: I can confirm DoggyMan5 is correct.
Which of the following statements describe the benefits of a career in transportation, distribution, and logistics (TDL)? everfi
The statement that describes the benefits of a career in transportation, distribution, and logistics (TDL) is: It seeks to reduce logistics costs for the company and increase satisfaction for buyers.
What is a career in transportation, distribution, and logistics (TDL)?The planning, management, and transportation of people, materials, and commodities via road, pipeline, air, train, and water are the main areas of employment for the Transportation, Distribution, and Logistics Career Cluster.An expanding sector known as transportation, distribution, and logistics (TDL) links producers and other businesses with customers. To move items from one site to another securely and on schedule, a large TDL workforce is required due to the sharp development in eCommerce.In order to make sure that the product reaches the customer at the appropriate location and time while taking distribution and logistics into account, that profession assesses what is pertinent to logistics transport.Learn more about TDL refer to :
https://brainly.com/question/29275775
#SPJ4
1) Coding for Table in Html
See below for the code in HTML
How to code the table in HTML?The given table has the following features:
TablesCell mergingList (ordered and unordered)The HTML code that implements the table is as follows:
<table border="1" cellpadding="1" cellspacing="1" style="width:500px">
<tbody>
<tr>
<td colspan="1" rowspan="2"><strong>IMAGE</strong></td>
<td colspan="1" rowspan="2"><strong>name</strong></td>
<td colspan="2" rowspan="1"><strong>first name</strong></td>
</tr>
<tr>
<td colspan="2" rowspan="1"><strong>last name</strong></td>
</tr>
<tr>
<td>DOB</td>
<td>yyyy</td>
<td>mm</td>
<td>dd</td>
</tr>
<tr>
<td>Qualifications</td>
<td colspan="3" rowspan="1">references</td>
</tr>
<tr>
<td>
<ol>
<li> </li>
<li> </li>
<li> </li>
<li> </li>
</ol>
</td>
<td colspan="3" rowspan="1">
<ol type = "a">
<li> </li>
<li> </li>
<li> </li>
<li> </li>
</ol>
</td>
</tr>
</tbody>
</table>
<p> </p>
Read more about HTML at:
https://brainly.com/question/14311038
#SPJ1
. Data mining methods for classifying or estimating an outcome based on a set of input variables is referred to as a. supervised learning. b. unsupervised learning. c. Interval estimating. d. data sampling.
Data mining methods for classifying or estimating an outcome based on a set of input variables is referred to as A. Supervised learning.
Supervised learning is a type of machine learning where the algorithm is trained on a labeled dataset. In this context, a labeled dataset contains both the input variables (also known as features) and the desired output, which is the target variable or class label. The goal of supervised learning is to create a model that can accurately predict the target variable for new, unseen data points.
Interval estimating and data sampling are not directly related to classifying or estimating outcomes based on input variables. Interval estimating is a statistical method for estimating an unknown population parameter within a given range or interval, while data sampling refers to the process of selecting a subset of individuals or data points from a larger population to draw inferences or make predictions about the entire population.
In summary, supervised learning is the data mining method for classifying or estimating an outcome based on a set of input variables, while unsupervised learning, interval estimating, and data sampling serve different purposes within the realm of data analysis and machine learning. Therefore, the correct option is A.
Know more about Supervised learning here:
https://brainly.com/question/29888372
#SPJ11
Show transcribed data
This assignment helps to learn how to use generics in Java effectively. The focus of this assignment is on the relationships between classes and the generic definitions applied that sets all classes into context. Implement an application that handles different kinds of trucks. All trucks share the same behavior of a regular truck but they provide different purposes in terms of the load they transport, such as a car carrier trailer carries cars, a logging truck carries logs, or refrigerator truck carries refrigerated items. Each truck only distinguishes itself from other trucks by its load. Inheritance is not applicable because all functionality is the same and there is no specialized behavior. The property of every truck is also the same and only differs by its data type. That is the load of a truck is defined by an instance variable in the truck class. This instance variable is defined by a generic parameter that must have the Load interface as an upper bound. The Load interface represents any load a truck can carry. It is implemented by three different classes. Create the following types . Load: Create an interface called Load. The interface is empty. • Car. Create a class named Car that implements the tood intertace. This class is empty but you may add properties. Treelog: Create a class named Treelog that implements the Lord interface. This class is empty but you may add properties. • Refrigerated Storage: Create a class named Refrigerated Storage that implements the cous interface. This class is empty but you may add properties. • Truck: A final public class named truck Instances (not the class itself:) of this Truck class should be specialized in the way they handle freight transport. The specialized freight is accomplished by the class using a generic type parameter in the class definition. The generic parameter on the class definition must have the Load interface as its upper bound. Each truck carries a freight which is defined by an instance variable of praylist with elements of the generic type parameter, Do not use the type toad interface for the elements. The exact type of the load instance variable is determined at instantiation time when the variable of the truck class is declared. The class has the following members • A member variable of type arrayList named freignt. The ArrayList stores objects of the generic type defined in the class definition • A method named 1006.) that loads one object onto the truck and adds it to the releit list. The object is passed in as an argument and must be of the generic type defined in the class definition • A method named unicooker) which expects an index of the element in the predprt list to be removed. The removed element is returned by the method. The return type must match the generic type defined in the class signature. Solution: Implement the program yourself first and test your solution. Once it works, fill in the missing parts in the partial solution provided below. Download Truck.java interface Load } class } class Tree Log } class Refrigerated Storage } public final class Truck private ArrayList freight = new ArrayList 0: public void load(T item) { this.freight.add(item); } public unloadint index) { return this.freight.get(index); } }
The solution to the given problem regarding Java program is as follows:
class Car implements Load { }
class Treelog implements Load { }
class RefrigeratedStorage implements Load { }
interface Load { }
public final class Truck {
private ArrayList<Load> freight = new ArrayList<>();
public void load(Load item) {
this.freight.add(item);
}
public Load unload(int index) {
return this.freight.get(index);
}
}
The provided Java program deals with different types of trucks. Each truck carries a freight, which is defined as an instance variable named `freight` of type `ArrayList` with elements of the generic type parameter.
The class `Truck` has the following members:
A member variable named `freight` of type `ArrayList<Load>`. This `ArrayList` stores objects of the generic type `Load`.A method named `load` that takes an object of type `Load` as an argument and adds it to the freight list.A method named `unload` that expects an index of the element in the `freight` list to be removed. It returns the removed element, and the return type matches the generic type defined in the class signature.Note that the Load interface is implemented by the classes Car, Treelog, and RefrigeratedStorage, which allows objects of these classes to be added to the freight list. The specific type of the Load instance variable is determined at instantiation time when the variable of the Truck class is declared.
Learn more about Java program: https://brainly.com/question/17250218
#SPJ11
acme corp. is looking to buy software and start using it right away in the cloud. which aws offering enables users to do this?
Answer: AWS Marketplace enables users to buy software and start using it right away in the cloud.
Explanation:
What is AWS ?
With over 200 fully featured services available from data centers around the world, Amazon Web Services (AWS) is the most complete and widely used cloud platform in the world. AWS is being used by millions of clients, including the biggest businesses, most successful startups, and top government organizations, to cut costs, improve flexibility, and accelerate innovation.
Facts about AWS Marketplace :
Around 17,300 goods and services were available on the Amazon Web Services (AWS) marketplace as of mid-2021, 5,002 of which related to infrastructure software, the largest subcategory.Hence, AWS Marketplace enables users to buy software and start using it right away in the cloud.
You can learn more about AWS from the given link
https://brainly.com/question/28319684
The computer code behind password input can be modified to force people to change their password for security reasons. This is known as “password expiration,” and some websites and companies use it regularly. However, people tend to choose new passwords that are too similar to their old ones, so this practice has not proven to be very effective (Chiasson & van Oorschot, 2015). Your friends have a hard time remembering passwords. What method can you devise for them so that they can remember their new passwords AND make them very different from the old ones?
Answer:
to remember the passwords you could either make a little rhyme to "help" remember it or you could be like everyone else and write it down on a piece of paper. you could also write the password over and over again to make it stick. a way to make a password different from an old one is to use completely different wording and completely different numbers.
Explanation:
Answer:
B
Explanation:
got it right
Briefly explain the purpose of the design process
Answer:
When you want to create something or if you want to solve a problem or if you have been assigned a task but the steps towards the results are not clear yet. The purpose of a design-process is to shape and guide your work and thoughts to improve the outcome.
Explanation:
Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software
Answer:
Utilities
Explanation:
A formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it is known as a data categorization scheme. ____________
A formal access control methodology used to assign a level of confidentiality to an information asset and restrict the number of people who can access it is known as a data categorization scheme.
This methodology involves classifying data based on its sensitivity and criticality to the organization.
By categorizing data, the organization can implement appropriate access controls, such as authentication and authorization mechanisms, to ensure that only authorized individuals can access the information.
Data categorization schemes typically involve assigning each information asset to a specific category or level of sensitivity, such as confidential, restricted, or public.
The level of sensitivity is then used to determine the appropriate access controls that need to be implemented for that particular data category.
For example, confidential data may require strict access controls, such as two-factor authentication and encryption, whereas public data may only require basic access controls, such as a username and password.
Implementing a data categorization scheme is critical for organizations that deal with sensitive or confidential information, such as financial institutions, healthcare providers, and government agencies.
It helps to ensure that data is protected against unauthorized access and helps to minimize the risk of data breaches or data loss. Furthermore, it helps organizations comply with various regulatory requirements related to data privacy and security.
For more questions on data categorization scheme
https://brainly.com/question/15101438
#SPJ11
you have two classes, a crow class that inherits from a bird class. what is the correct class declaration for crow?
Assuming that the Bird class has already been defined, the correct class declaration for Crow that inherits from Bird would be:
class Crow(Bird):
def __init__(self, name):
super().__init__(name)
# additional initialization if needed
In this example, the Crow class is defined as a subclass of Bird using the syntax class Crow(Bird):. This means that Crow inherits all the methods and attributes of Bird, and can also define its own methods and attributes.
The __init__ method is also defined for Crow, which takes a name parameter and passes it to the __init__ method of the Bird class using the super() function. This ensures that the name parameter is properly initialized in the Bird class before any additional initialization is performed in the Crow class.
Of course, the specific implementation details of the Crow class will depend on your specific use case and requirements.
The correct class declaration for a crow class that inherits from a bird class in object-oriented programming is:
class Crow(Bird):
class definition
In object-oriented programming, inheritance is a mechanism that allows a subclass to inherit properties and behaviors from its superclass. In the context of the given question, the crow class is a subclass of the bird class. The bird class serves as the superclass, which means that the crow class inherits all of the properties and methods defined in the bird class.
To declare the crow class, the class keyword is used, followed by the name of the class, which in this case is Crow. The name of the superclass, which is Bird, is included in parentheses after the name of the subclass. This indicates that the crow class inherits from the bird class.
The class definition for the crow class can then be included within the body of the class declaration, which may include properties, methods, and other attributes specific to the crow class. By inheriting from the bird class, the crow class automatically has access to all of the properties and methods defined in the bird class, which can be extended or overridden as needed within the crow class definition.
You can learn more about class declaration at
https://brainly.com/question/22100033
#SPJ11
your company is in the process of creating a multi-region disaster recovery solution for your database, and you have been tasked to implement it. the required rto is 1 hour, and the rpo is 15 minutes. what steps can you take to ensure these thresholds are met?
The required Recovery Time Objective (RTO) of 1 hour and Recovery Point Objective (RPO) of 15 minutes are met in a multi-region disaster recovery solution for your database
Data Replication: Implement synchronous or asynchronous data replication between the primary database and the disaster recovery site(s). Synchronous replication provides a lower RPO but may increase latency, while asynchronous replication offers better performance but may have a higher RPO. Automated Backups: Set up automated and frequent backups of the database to capture changes within the desired RPO timeframe. This ensures that you have up-to-date backups available for recovery.
Failover Mechanism: Configure an automated failover mechanism that can quickly redirect traffic from the primary database to the disaster recovery site in the event of a failure. This minimizes the downtime and helps achieve the required RTO. Regular Testing: Perform regular disaster recovery testing to validate the effectiveness and efficiency of the solution. This helps identify any potential gaps or bottlenecks and allows for necessary improvements to meet the RTO and RPO thresholds.
Learn more about disaster recovery planning here:
https://brainly.com/question/31818087
#SPJ11
What needs to be installed on a machine in order to execute java class files (essentially, what enables java to be so cross-platform)? (state the acronym)
In order to execute java class files and enable Java to be cross-platform, one needs to install the Java Virtual Machine (JVM) on a machine.
Therefore, the acronym that needs to be installed on a machine is JVM. It is a crucial part of the Java platform and is responsible for executing Java bytecode or class files.JVM (Java Virtual Machine) is a virtual machine that is responsible for executing Java bytecodes. The Java Virtual Machine is a crucial part of the Java platform as it enables cross-platform compatibility. This is because the Java Virtual Machine abstracts hardware features and provides a platform-independent execution environment for the Java program.
Java Virtual Machine is an abstract machine that provides an execution environment for the compiled Java code (known as bytecode). When a Java program is compiled, the result is bytecode that can be executed on any platform that has a Java Virtual Machine installed. In other words, the Java Virtual Machine is responsible for taking the compiled Java bytecode and translating it into machine code that can be executed by the computer's processor.The main answer is Java Virtual Machine (JVM), which needs to be installed on a machine to execute Java class files, and this enables Java to be so cross-platform.
To know more about java visit:
https://brainly.com/question/33208576
#SPJ11
in virtually all systems that include dma modules, dma to main memory is given higher priority than cpu access to main memory. why?
Network cards, sound cards, and disc controllers may all directly access the system's main memory without using the CPU thanks to a technique called DMA (Direct Memory Access).
Why is processor access to main memory given a lower priority than DMA access?DMA access to main memory is prioritised above processor access to main memory in almost all systems using DMA modules. Why? The processor won't lose any data if it waits a little.
Why is DMA given more priority than CPU?Only at the start and finish of the transfer does the CPU get involved. The read/write operation, I/O address, and number are sent to the DMA channel by the CPU when it wants to read or write a block of data.
To know more about DMA visit:-
https://brainly.com/question/22594279
#SPJ1
Select the correct answer from each drop-down menu.
Which are the HTML5's new features?
HTML5's new features are (providing a time picker, caching application data, handling exceptions, providing a date picker)
and (providing a date picker, positioning a user on the map, providing a time picker, validating information)
The correct new features of HTML5 include:
Semantic elements (e.g., <header>, <footer>, <nav>, <section>, etc.)Multimedia support for audio and video playbackCanvas element for dynamic graphics and animationsGeolocation for accessing user's location informationOffline web application support with Application Cache and Local StorageEnhanced form features, including new input types and form validationDrag and drop functionalityWhat is HTML5 ?HTML5 is a markup language that is used on the World Wide Web to structure and deliver content. It is the World Wide Web Consortium's fifth and final major HTML version recommendation. The HTML Living Standard is the current standard.
HTML and HTML5 are both hypertext markup languages that are generally used to create online pages or apps.
HTML5 is the most current version of HTML, and it includes new markup language features like as multimedia, new tags and components, and new APIs. Audio and video are also supported by HTML5.
So it is correct to state that
The correct new features of HTML5 include:
Learn more about HTML5 at:
https://brainly.com/question/22241341
#SPJ1
What network is carrying the masters golf tournament.
The Master's golf tournament is being carried by CBS and ESPN networks in the United States.
In the United States, the Masters is broadcasted on CBS and ESPN. CBS has been the exclusive broadcaster of the tournament since 1956 and airs the weekend rounds of the event. ESPN, on the other hand, covers the first and second rounds of the tournament.
The Master's golf tournament is one of the most prestigious golf events in the world and is eagerly awaited by golf fans each year. The tournament is held at the Augusta National Golf Club in Augusta.
Internationally, the Masters is broadcasted in various countries by different broadcasters. For example, in the United Kingdom, the tournament is broadcasted on the BBC, while in Canada, it is broadcasted on TSN.
Read more about Golf tournaments at https://brainly.com/question/30803264
#SPJ11
Which software program would you use to turn data into a graph?.
explain what is meant by the term conditionally executed. 2. you need to test a condition and then execute one set of statements if the condition is true. if the condition is false, you need to execute a different set of statements. what structure will you use? 3. if you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? 4. briefly describe how the and operator works. 5. briefly describe how the or operator works. 6. when determining whether a number is inside a range, which logical operator is it best to use? 7. what is a flag and how does it work
learn more about the program here:
https://brainly.com/question/24833629
#SPJ4
what is file management?can please help me
You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?
From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.
What techniques are used to raise search rankings?
If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.To learn more about search rankings. refer
https://brainly.com/question/14024902
#SPJ1
. Electricians will sometimes call ______ "disconnects" or a "disconnecting means."
A) SwitchesB) Three-pronged plugsC) Two-pronged plugsD) Electrical cords
Answer: A: Switches
Explanation:
Answer:
A) Switches
Explanation:
many people shop online. Dicuss the benefits and drawbacks to the customer of shopping online.
Answer:
Explanation:
Shopping online has become increasingly popular in recent years due to the convenience it offers. There are several benefits and drawbacks to shopping online for customers.
Benefits:
Convenience: Online shopping allows customers to shop from the comfort of their own home, eliminating the need to travel to a physical store.
Time-saving: Online shopping saves time, as customers can easily find and purchase products without having to navigate through crowded stores or wait in long checkout lines.
Access to a wider variety of products: Online shopping provides customers with access to a wider variety of products, including rare and hard-to-find items.
Better prices: Online retailers often offer lower prices than physical stores due to lower overhead costs.
Easy price comparison: Customers can easily compare prices of similar products from different retailers, which helps them make informed purchasing decisions.
Drawbacks:
Unable to see or touch the product before purchasing: Customers cannot physically examine the product before purchasing, which may result in receiving a product that is different from what they expected.
Delivery delays: Delivery times may vary and sometimes take longer than expected.
Shipping costs: Shipping costs can add up, especially for larger and heavier items.
Risk of online fraud: There is a risk of online fraud, such as stolen credit card information or identity theft.
Lack of personal interaction: Online shopping lacks the personal interaction that customers may receive in physical stores, such as the ability to ask questions or receive recommendations from sales associates.
A ___________ variable is used to add up a set of values. fill in the blank
Answer:
dependent variable -- As it depends on the other variables, changes when they change
The sum variable should be used for adding the set of values.
The following information regarding the sum variable is as follows;
It is the variable i.e. used for adding the values.In this, the values are added so that the final answer could come.In excel, the sum formula is like = sum().Therefore we can conclude that the sum variable should be used for adding the set of values.
Learn more: brainly.com/question/19585043
What does it mean to influence the government? Use influence in a sentence.
Answer:
Explanation:
Influence -- This refers to the outcome of an attempt to change someone's behavior or attitude. Power -- This refers to the means by which the influence is accomplished. Politics -- The pursuit of self-interest in an organization to protect or further either individual or organizational goals.
Answer: To influence the government is to do something that could possibly change the law, like writing a bill, sure it might not be passed but it can still be an influence the the government