Answer:
parentheses
Explanation:
math in parenthesis gets done first
4 + 5 x 6 = 34 but
(4 + 5) x 6 = 54
chatgpt
You will develop a set of policies that should be clear enough and detailed enough that lawmakers could use them as the basis for drafting new legislation and carmakers could use them as guides for developing new self-driving algorithms for their automobiles.
Draft 5-10 new policies around autonomous technology using the prompts above, and explain why those laws should be implemented.
- Clearly describe the conditions/scenarios to which the policy applies and does not apply.
- Clearly state how difficult decisions, such as in the "trolley problem", should be made according to your policy.
- Focus on how to determine what the "correct" decision is and how that decision might be enforced, both in law and in code.
The two policies that are created based on the given question is given below:
The PoliciesPolicy 1: Human Life Above All
This policy applies to all autonomous vehicles and necessitates that the safety of human life be prioritized over any other matter. Consequently, when an accident is expected to ensue, the vehicle should take action so as to diminish harm directed towards alive existence; even though it implies jeopardizing the safety of its own occupants. The trolley problem must be settled in a way that negligent suffering to human life is minimal, and such decision should abide by set rules predetermined by manufacturer and approved by respective regulatory agencies. To ensure that guidelines are abided by, strict fines ought to be imposed for violations occurred.
Policy 2: Transparency and Responsibility
This policy requires autonomous vehicles to provide transparency about the evolving of decisions and be held responsible for their proceedings. For this purpose, concerning their functioning, tracking and recording each data relating to them is essential, from sensor details to algorithms that determine decisions to overrides made through human manipulation. Manufacturers must furnish clear information of how rationales transpire and what precautionary approaches are utilized for protection. In cases of crashes or accidents, all related info shall be exposed to both governmental organizations responsible for regulation as well as public citizens to make sure transparency and accountability prevail. To guarantee adherence to these regulations, conducting regular reviews and foreboding rigid penalties shall be obligatory contemplation.
Read more about policies here:
https://brainly.com/question/6583917
#SPJ1
Design templates can be applied to presentations when _____.
they are opened
a new slide is added
all the slides are created
all of the above
none of the above
IT IS NOT WHEN A NEW S IS ADDED
Answer:
all of the above
Explanation:
The answer to this is all of the above. In the Microsoft Powerpoint software, you are able to add a design template as soon as you first open the software and begin creating your presentation. Aside from this, you can also add the design template you want to use when a new slide is added or all the slides have already been created. This is done by clicking on the Design tab in the top ribbon and choosing the desired template. From this tab, you are also able to select specific slides to which you want the design to be applied to.
Answer:
All of the above
Explanation:
EDG2021
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absolutePlease help I have no idea what to do :(
Write a program that simulates a coin flipping. Each time the program runs, it should print either “Heads” or “Tails”.
There should be a 0.5 probability that “Heads” is printed, and a 0.5 probability that “Tails” is printed.
There is no actual coin being flipped inside of the computer, and there is no simulation of a metal coin actually flipping through space. Instead, we are using a simplified model of the situation, we simply generate a random probability, with a 50% chance of being true, and a 50% chance of being false.
A Java Script program that simulates a coin flipping, so that each time the program runs, it should print either “Heads” or “Tails” along with the other details given is stated below.
Code for the above coin simulationvar NUM_FLIPS = 10;
var RANDOM = Randomizer.nextBoolean();
var HEADS = "Heads";
var TAILS = "Tails";
function start(){
var flips = flipCoins();
printArray(flips);
countHeadsAndTails(flips);
}
// This function should flip a coin NUM_FLIPS
// times, and add the result to an array. We
// return the result to the caller.
function flipCoins(){
var flips = [];
for(var i = 0; i < NUM_FLIPS; i++){
if(Randomizer.nextBoolean()){
flips.push(HEADS);
}else{
flips.push(TAILS);
}
}
return flips;
}
function printArray(arr){
for(var i = 0; i < arr.length; i++){
println("Flip Number " + (i+1) + ": " + arr[i]);
}
}
function countHeadsAndTails(flips){
var countOne = 0;
var countTwo = 0;
for(var i = 0; i < flips.length; i++){
if(flips[i] == HEADS){
countOne+=1;
}
else {
countTwo+=1;
}
}
println("Number of Heads: " + countOne);
println("Number of Tails: " + countTwo);
}
Learn more about Java Script:
https://brainly.com/question/18554491
#SPJ1
Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb
To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:
1. S → SS | AB | B
2. A → AA
3. A → a
4. B → bBb | bb | ε
5. C → CC | a
6. D → aC | bb
Explanation:
1. The production S → SS has been retained as it is.
2. The production A → aAAa has been split into A → AA and A → a.
3. The production B → bBb has been split into B → bB and B → b.
4. The production B → bb has been kept as it is.
5. The production B → ε (empty string) has been denoted as B → ε.
6. The production C → CC has been retained as it is.
7. The production C → a has been kept as it is.
8. The production D → aC has been kept as it is.
9. The production D → bb has been kept as it is.
In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.
For more questions on parsing, click on:
https://brainly.com/question/13211785
#SPJ8
Answer:
Explanation:
To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:
Step 1: Eliminate ε-productions (productions that derive the empty string).
Step 2: Eliminate unit productions (productions of the form A → B).
Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.
Step 4: Convert terminals in remaining productions to new non-terminals.
Step 5: Ensure all productions are in the form A → BC (binary productions).
Applying these steps to the given grammar:
Step 1: Eliminate ε-productions
The given grammar doesn't have any ε-productions.
Step 2: Eliminate unit productions
The given grammar doesn't have any unit productions.
Step 3: Convert long productions
S → SS (Remains the same)
S → AB
A → aAAa
B → bBb
B → bb
C → CC
C → a
D → aC
D → bb
Step 4: Convert terminals
No changes are needed in this step as all terminals are already in the grammar.
Step 5: Ensure binary productions
The given grammar already consists of binary productions.
The converted grammar in Chomsky Normal Form (CNF) is:
S → SS | AB
A → aAAa
B → bBb | bb
C → CC | a
D → aC | bb
Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.
A script meaning sound effects
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
Hayne is starting his own business as a psychotherapist and needs to post a website advertising his services,contact information,and some tips on what clients can expect in therapy.What kind of website would best suit Hayne's needs?
A) Static website
B) E-commerce website
C) Dynamic website
D) Scripted website
The kind of website which would best suit Hayne's needs is a: C) Dynamic website.
A website is the collective name that is used to describe series of interconnected webpages having a unique domain name.
Basically, a website is an HTML document which comprises codes, tags, images, audios, and videos that are integrated to make them responsive and interactive with clients (end users).
In Computer and Technology, there are four (4) main types of website and these include:
Static website.E-commerce website.Scripted website.Dynamic website.A dynamic website is a type of website which is designed to contain information that automatically changes based on the client, time zone, time of the day, language, services, and other factors.
In this scenario, the kind of website which would best suit Hayne's needs is a dynamic website because his services, tips or contact information may change.
Read more: https://brainly.com/question/21694571
What is a rule of solid database design regarding calculated values?
They should be stored in a database.
O They should not be stored in a database.
O They should be hidden from query results.
O They should be eliminated from query results.
Answer:
They should not be stored in a database.
Explanation:
Someone who gets pleasure out of hurting people online and starting conflicts and is a/an
Question 8 options:
advocate.
bystander.
troll.
positive digital citizen.
A person who gets pleasure out of hurting people online and starting conflicts is a troll.
Explanation:
A troll is someone who posts inflammatory, off-topic, or offensive messages in online forums or discussion boards, often with the intent of causing disruption or starting conflicts. They often hide behind anonymity and use the internet as a tool to hurt people or cause trouble. They don't have the same goal as an advocate, who is someone who actively works to support a cause or policy, or a bystander, who is someone who is present during an event but doesn't take part in it. On the other hand, a positive digital citizen is someone who use digital technology responsibly and ethically, who respect other people's rights and privacy and is aware of the impact of their actions online.
What type of 3-phase connection requires only two transformers?
The use of two single-phase transformers to step down a high 3-phase voltage to a lower 3-phase voltage is possible using a rudimentary configuration dubbed an "open delta."
What is a single-phase transformer?For industrial applications, three phase transformers perform significantly better. Most heating, air conditioning, lighting, and house applications employ single phase systems in residential settings. When compared to low-power industrial systems and machines, they are less productive. A specific type of transformer called a single phase transformer functions using only one phase of power. This device carries electrical power from one circuit to another by the mechanism of electromagnetic induction. It is a passive electrical device. A transformer cannot change single-phase electricity into three-phase power, even if single-phase power can be produced from a three-phase power source. Phase converters or variable frequency drives are needed to convert single-phase electricity to three-phase power.To learn more about single phase transformers, refer to:
https://brainly.com/question/29665451
All of the data stored and transmitted by digital devices is encoded as bits.A. TrueB. False
Answer:
A. True
Explanation:
A digital device is an electronic device that has the ability and capability to receive, store, process and transmit data to another device.
Since the processing device in the digital device understands only zeros and ones which are binary numbers (also called bits), transmission and storage of data in these devices should be encoded in bits.
Examples of digital devices are;
i. flash drives
ii. mobile phones
iii. speakers
iv. printers
v. scanners
Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolute value of x, and the square root of (x * y to the power of z).
Output all results with five digits after the decimal point, which can be achieved as follows:
Put result to output with 5 decimal places
Ex: If the input is:
5.0 2.5 1.5
the output is:
55.90170 579.32402 5.00000 6.64787
To output the results with five decimal places, you can use the format specifier %.5f for the printf function in C or the format method in Python. Here is an example of how to calculate and output the results in C:
#include <stdio.h>
#include <math.h>
int main() {
double x = 5.0, y = 2.5, z = 1.5;
double result1 = pow(x, y);
double result2 = pow(x, pow(y, z));
double result3 = fabs(x);
double result4 = sqrt(pow(x * y, z));
printf("%.5f %.5f %.5f %.5f", result1, result2, result3, result4);
return 0;
}
What is the program about?Below is an example of how to calculate and output the results in python:
x = 5.0
y = 2.5
z = 1.5
result1 = x ** y
result2 = x ** (y ** z)
result3 = abs(x)
result4 = (x * y ** z) ** 0.5
print("{:.5f} {:.5f} {:.5f} {:.5f}".format(result1, result2, result3, result4))
Therefore, In both examples, the output will be "55.90170 579.32402 5.00000 6.64787".
Learn more about coding from
https://brainly.com/question/16397886
#SPJ1
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
and write down the specification according to?
*Operating System
*Storage capacity
*Memory Capacity
*Wi-Fi connectivity
*Installed application
Answer:
For this i will use my own PC.
OS - Windows 10
Storage Capacity - 512 GBs
Memory - 16 GB
Wi-Fi - Ethernet
Installed Application - FireFox
Explanation:
An OS is the interface your computer uses.
Storage capacity is the space of your hard drive.
Memory is how much RAM (Random Access Memory) you have
Wi-Fi connectivity is for how your computer connects the the internet.
An installed application is any installed application on your computer.
The software used to provide visual support such as slide show during lectures
Answer:
microsoft powerpoint
Explanation:
The American Red Cross wants you to write a program that will calculate the average pints of blood donated during a blood drive. The program should take in the number of pints donated during the drive, based on a seven hour drive period. The average pints donated during that period should be calculated and displayed. Use a loop in the program to run multiple times.
Answer:
The program in Python is as follows:
num_pints = int(input("Pints: "))
sum_pints = 0
for i in range(num_pints):
blood = int(input("Blood Donated: "))
sum_pints += blood
print("Average: ",sum_pints/num_pints)
Explanation:
This prompts the user for number of pints
num_pints = int(input("Pints: "))
This initializes the sum to 0
sum_pints = 0
This iterates through the number of pints
for i in range(num_pints):
This gets input for each blood donated
blood = int(input("Blood Donated: "))
This adds up all blood donated
sum_pints += blood
This calculates and prints the average
print("Average: ",sum_pints/num_pints)
what is a computer?
hope it helps
#carry on learning
Which of the following choices BEST explains the purpose of developing a research plan?
A.
Research plans are ONLY used by teachers to plan their daily classroom activities.
B.
Research plans are ONLY used by experts who have to write articles for scholarly journals in various fields.
C.
Research plans are used by any person who is critically evaluating a topic; since research papers involve multiple stages and multiple sources, the writer uses the plan for time management.
D.
A research plan is the term to describe the research paper and the bibliography.
Please select the best answer from the choices provided
A
B
C
D
Answer:
C
Explanation:
Because the research is for everybody
What is an example of a one-to-many relationship?
O products to orders
customer to orders
O primary key to primary key
O employee ID to employee ID
Answer: customer to orders
Explanation:
Question 2 Below is a Unified Modelling Language (UML) diagram of an election class. Election - candidate String - num Votes: int >+ Election () >+ Election (nm : String, nVotes: int) + setCandidate( nm : String) + setNum Votes(): int + toString(): String [30 marks] Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks]
A good example of the implementation of the Election class based on the above UML diagram is given below
What is the Unified Modelling LanguageThe Election class is known to be one that is defined in the given code and it known also to be one that includes its constructor, getter and setter methods, and ToString() method.
Furthermore, it showcases the process of generating Election entities, defining their features, and preserving them within an ArrayList. Lastly, it produces the specifics of every Election object enlisted in the ArrayList.
Learn more about Unified Modelling Language from
https://brainly.com/question/15078406
#SPJ1
What is the importance of studying Duty-Based Ethics for future
professionals?
Studying Duty-Based Ethics is important for future professionals due to several reasons. Duty-Based Ethics, also known as Deontological Ethics, is a moral framework that focuses on the inherent nature of actions and the obligations or duties associated with them.
Understanding and applying this ethical approach can have several benefits for future professionals:
1. Ethical Decision-Making: Duty-Based Ethics provides a structured framework for making ethical decisions based on principles and rules. Future professionals will encounter situations where they need to navigate complex moral dilemmas and make choices that align with their professional obligations.
Studying Duty-Based Ethics equips them with the tools to analyze these situations, consider the ethical implications, and make informed decisions guided by their duties and responsibilities.
2. Professional Integrity: Duty-Based Ethics emphasizes the importance of upholding moral principles and fulfilling obligations. By studying this ethical perspective, future professionals develop a strong sense of professional integrity.
They understand the significance of adhering to ethical standards, maintaining trust with clients, colleagues, and stakeholders, and acting in a manner consistent with their professional duties.
3. Accountability and Responsibility: Duty-Based Ethics highlights the concept of accountability and the responsibility professionals have towards their actions and the consequences they bring.
By studying this ethical approach, future professionals learn the significance of taking ownership for their decisions and behaviors. They understand that their actions have moral implications and can impact others, motivating them to act responsibly and consider the broader ethical implications of their choices.
4. Ethical Leadership: Future professionals who study Duty-Based Ethics gain insights into the ethical dimensions of leadership. They learn how to uphold ethical principles, set a moral example, and inspire others to act ethically.
This knowledge equips them to become ethical leaders who prioritize ethical considerations in decision-making processes, promote fairness, and encourage ethical behavior among their teams.
5. Professional Reputation and Trust: Ethical conduct based on Duty-Based Ethics contributes to building and maintaining a strong professional reputation and trust.
Clients, employers, and colleagues value professionals who act ethically and fulfill their obligations. By studying Duty-Based Ethics, future professionals develop a solid ethical foundation, enhancing their credibility and trustworthiness in their respective fields.
In summary, studying Duty-Based Ethics is essential for future professionals as it provides them with a framework for ethical decision-making, fosters professional integrity, promotes accountability and responsibility, cultivates ethical leadership skills, and contributes to building a positive professional reputation based on trust and ethical conduct.
For more such questions on Duty-Based Ethics
https://brainly.com/question/23806558
#SPJ11
Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
5 3
9 3
5 7
9 7
Answer:
I took a screenshot of the test withe that question
Explanation:
The use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users. These concepts have led to the development and evolution of web-based communities and _____________ services, such as social-networking sites, wikis, blogs and _________.
Answer:
1. Hosted services
2. Folksonomies
Explanation:
Prior to the invention of Web 2.0, Web 1.0 was in existence. Web 2.0 is a new age technology and system of communication that allows its users to create content on their own and interact more freely with each other. Before this time, user participation in topics posted online was limited. But today web 2.0 enables such participation with the invention of blogs, and social media sites.
Creativity is seen in the fact that people are more prone to express themselves through writing, animations, videos, and other forms of communication. Information on new and trending stories are shared through these channels. Ideas are also exchanged by participants.
Question 2 Multiple Choice Worth 5 points)
(04.01 LC)
Computers take in and process certain kinds of information
O at the same rate as humans can
O in the same way humans can
much faster than humans can
O much more slowly than humans can
Answer:
Answer:much faster than Humans can
Answer:
c
Explanation:
What are the difference between data and information?
Answer
The terms data and information can mean different things in different contexts, but the main differences between them are: Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized.
Which search strategy is most similar to greedy search?
A.
depth-first search
B.
breadth-first search
C.
bidirectional search
D.
uniform-cost search
Answer:
I think the answer would be A.
Explanation:
If I'm wrong plz let me know (I think I may be wrong)
what is a computer based system that allows people to communicate simoltaneously from differetn locations
Answer:
Electronic conferencing
Explanation:
Electronic conferencing is a form of a computer-based system that allows people to communicate simultaneously from different locations, with the aid of the Internet, which can be done through telephones, emails, or video chats. It is a commonly known Virtual Meeting.
Hence, the right answer, based on the definition or description given in the question is ELECTRONIC CONFERENCING
There are many different types of simulations for training, as there are many different fields that stand to benefit
from simulation training programs. Name three of the professions that use simulation training programs, and
briefly explain why these fields benefit from such games.
help
Answer: Three of the professions that use simulation training programs are healthcare, aviation, and military.
Explanation: Simulation training programs are educational interventions that use realistic scenarios and environments to mimic real-world situations and challenges. Simulation training programs aim to enhance the knowledge, skills, and attitudes of learners in a safe and controlled setting, where they can practice, receive feedback, and improve their performance. Simulation training programs can also facilitate teamwork, communication, problem-solving, and decision-making skills among learners.
Simulation training programs are widely used in various professions that require high levels of technical competence, situational awareness, and crisis management. Some examples of these professions are:
Healthcare: Healthcare professionals use simulation training programs to learn and practice clinical skills, procedures, and interventions on mannequins, task trainers, virtual patients, or standardized patients (actors who portray patients). Simulation training programs can also help healthcare professionals develop teamwork and communication skills in interprofessional scenarios, such as cardiac arrest, trauma, or obstetric emergencies. Simulation training programs can improve patient safety and quality of care by reducing medical errors, enhancing clinical competence, and increasing confidence among healthcare professionals.Aviation: Aviation professionals use simulation training programs to learn and practice flight skills, procedures, and maneuvers on flight simulators, which are devices that replicate the cockpit and environment of an aircraft. Simulation training programs can also help aviation professionals develop teamwork and communication skills in crew resource management scenarios, such as engine failure, weather hazards, or air traffic control issues. Simulation training programs can improve aviation safety and efficiency by reducing accidents, enhancing pilot performance, and increasing situational awareness among aviation professionals.Military: Military professionals use simulation training programs to learn and practice combat skills, tactics, and strategies on computer-based simulations, live simulations, or virtual reality simulations. Simulation training programs can also help military professionals develop teamwork and communication skills in joint operations scenarios, such as counterterrorism, peacekeeping, or humanitarian missions. Simulation training programs can improve military readiness and effectiveness by reducing casualties, enhancing operational competence, and increasing adaptability among military professionals.Hope this helps, and have a great day! =)
The term management information systems refers to a specific category of
information system serving. Discuss
Information systems specifically designed to support management-level tasks are referred to as management information systems (MIS).
What is meant by a management information system?Management information systems is the study of people, organizations, technology, and their relationships (MIS). The return on investments in people, equipment, and company operations are maximized by businesses with the help of MIS specialists. MIS is a people-oriented field with a focus on providing technology-enabled services.
How crucial is a management information system?A management information system boosts an organization's competitiveness. What is working and which isn't is reported and identified. Owners can use these reports to get the data they require to make decisions and raise employee and company performance.
Briefing:Information systems specifically designed to support management-level tasks are referred to as management information systems (MIS). In most cases, MIS generates summary reports from enormous amounts of input data. MIS are virtually entirely focused on internal events rather than environmental or outside ones.
To know more about Management information systems (MIS) visit:
https://brainly.com/question/16131934
#SPJ10
how do you fill different data into different cells at a time in Excel
The way that you fill different data into different cells at a time in Excel are:
Click on one or a lot of cells that you want to make use of as the basis that is needed for filling additional cells. For a set such as 1, 2, 3, 4, 5..., make sure to type 1 and 2 into the 1st two cells. Then pull the fill handle .If required, select Auto Fill Options. and select the option you want.How do you make a group of cells auto-fill?The first thing to do is to place the mouse pointer over the cell's bottom right corner and hold it there until a black + symbol appears. Drag the + symbol over the cells you wish to fill in while clicking and holding down the left mouse button. Additionally, the AutoFill tool rightly fills up the series for you.
Note that Excel data entering can be automated and this can be done by: On the Data tab, select "Data Validation," then click "Data Validation." In the Allow box, select "List." Enter your list items in the Source box, separating them with commas. To add the list, click "OK." If you wish to copy the list along the column, use the Fill Handle.
Learn more about Excel from
https://brainly.com/question/25879801
#SPJ1