Answer:
Makes it easier to read... summarize cite electronic versions of editions
PLEASE HELP!
A primary school teacher wants a computer program to test the basic arithmetic skills of her students.
The program should generate a quiz consisting of a series of random questions, using in each case any two numbers and addition, subtraction and multiplication
The system should ask the student’s name, then ask 10 questions, output if the answer to each question is correct or not and produce a final score out of 10.
The program should save the scores to an external file and offer an option to view the high score table.
Analyse the requirements in detail and design, code, test and evaluate a program to meet these requirements.
The program that will execute as required above is:
import random
def generate_question():
num1 = random.randint(1, 10)
num2 = random.randint(1, 10)
operator = random.choice(['+', '-', '*'])
question = f"What is {num1} {operator} {num2}? "
if operator == '+':
answer = num1 + num2
elif operator == '-':
answer = num1 - num2
else:
answer = num1 * num2
return question, answer
def save_score(name, score):
with open('scores.txt', 'a') as file:
file.write(f"{name}: {score}/10\n")
def view_high_scores():
with open('scores.txt', 'r') as file:
scores = file.readlines()
scores.sort(reverse=True)
print("High Score Table:")
for score in scores:
print(score.strip())
def arithmetic_quiz():
name = input("Enter your name: ")
score = 0
for _ in range(10):
question, answer = generate_question()
user_answer = int(input(question))
if user_answer == answer:
print("Correct!")
score += 1
else:
print("Incorrect!")
print(f"Final score: {score}/10")
save_score(name, score)
option = input("Do you want to view the high score table? (y/n) ")
if option.lower() == 'y':
view_high_scores()
arithmetic_quiz()
What is the objective of the above program?The objective of the above program is to create a computer program that tests the basic arithmetic skills of primary school students.
The program generates a quiz with random arithmetic questions, allows users to answer them, provides feedback on the correctness of their answers, saves scores, and offers a high score table for viewing.
Learn more about program:
https://brainly.com/question/30613605
#SPJ1
Question 3 3.1 Describe the TWO main elements of a CPU 3.2 Describe the fetch/execute cycle 3.3 Convert the binary number 00000011 to a decimal
Answer:
Here are the answers to the questions:
3.1 The two main elements of a CPU are:
The Control Unit (CU): The CU controls and coordinates the operations of the CPU. It is responsible for interpreting instructions and sequencing them for execution.
The Arithmetic Logic Unit (ALU): The ALU executes arithmetic and logical operations like addition, subtraction, AND, OR, etc. It contains registers that hold operands and results.
3.2 The fetch/execute cycle refers to the cycle of events where the CPU fetches instructions from memory, decodes them, and then executes them. The steps in the cycle are:
Fetch: The next instruction is fetched from memory.
Decode: The instruction is decoded to determine what it is asking the CPU to do.
Execute: The CPU executes the instruction. This could involve accessing data, performing calculations, storing results, etc.
Go back to Fetch: The cycle continues as the next instruction is fetched.
3.3 The binary number 00000011 is equal to the decimal number 3.
Binary: 00000011
Decimal: 1 + 2 = 3
So the conversion of the binary number 00000011 to decimal is 3.
Explanation:
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
How can you determine if the story is told in the third person
Answer:
They use pronouns like They, Them, He, She, It.
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
Which describes the outlining method of taking notes?
It is easy to use in fast-paced lectures to record information.
It is the least common note-taking method.
It includes levels and sublevels of information.
It uses columns and rows to organize information.
Answer:
It includes levels and sublevels of information
Explanation:
The Outlining method of taking notes helps the writer to organize his ideas into levels and sublevels of information which gives the piece of writing an added structure.
This can be achieved by the use of the Arabic numbering system, Roman numerals or use of bullets.
Answer:
C : It includes levels and sublevels of information
Explanation:
When searching for image files by typing house in the Search bar, the result will show all image files in what?
A) file name only
B) tag only
C) both file name and tag
D) either file name or tag
The answer may vary depending on the specific search settings and file organization system being used, but the correct answer is D) either file name or tag.
How to explainHowever, typically when searching for image files by typing "house" in the Search bar, the result will show image files that match the search term in either the file name or the tag.
This means that the search results could include image files with "house" in their file names or images that have been tagged with the term "house." Therefore, the correct answer is D) either file name or tag.
Read more about image files here:
https://brainly.com/question/31635598
#SPJ1
survey and describe the system
Survey systems help create, distribute, and analyze surveys by providing a framework for designing questionnaires, managing respondents, and analyzing data.
What is survey?A survey system lets users create surveys with different question types and response options. The system offers multiple ways to distribute surveys, including sharing a web link, email invites, website embedding, and social media.
Data is collected from respondents and stored accurately and securely, with error checking and validation in place. After survey completion, analyze data with summary stats, visualizations, filters, and cross-tabulations for identifying patterns. Survey systems have reporting features to generate detailed reports based on its data, including statistics, graphs, etc.
Learn more about survey from
https://brainly.com/question/14610641
#SPJ1
Which company developed Power Point ?
Answer:
Microsoft
Explanation:
Write a function called max that returns the maximum of the two numbers passed in as parameters
Answer:
Create a new function named max() which accepts two numbers as arguments. The function should return the larger of the two numbers. sorry if wrong Explanation:
Heads of dod components are responsible for establishing component specific procedures regarding transmission and transportation of classified material. What items must be considered when establishing these procedures?
When establishing procedures for the transmission and transportation of classified material, heads of DoD components must consider factors such as security protocols, encryption methods, authorized means of transport, personnel access controls, handling and storage guidelines, and adherence to classification guidelines and regulations.
Security Protocols: Ensure that appropriate security protocols are in place to safeguard the classified material during transmission and transportation.Encryption Methods: Implement secure encryption methods to protect the confidentiality and integrity of the classified material during transit.Authorized Means of Transport: Determine the approved methods of transport, such as secure courier services or encrypted electronic channels, that can be used for transmitting classified material.Personnel Access Controls: Establish strict access controls to restrict access to the classified material during transmission and transportation. This may involve authentication measures, background checks, and need-to-know requirements.Handling and Storage Guidelines: Define guidelines for how the classified material should be handled, packaged, and stored to prevent unauthorized access or loss during transit.Classification Guidelines and Regulations: Ensure compliance with classification guidelines and regulations, including marking, labeling, and packaging requirements for different levels of classified material.By considering these items, heads of DoD components can establish comprehensive and effective procedures to ensure the secure transmission and transportation of classified material.
For more such question on transportation
https://brainly.com/question/28206353
#SPJ8
5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?
Every workplace should have an emergency plan of action.
Please select the best answer from the choices provided
T
F
It is true that every workplace should have an emergency action plan.
What is an emergency action plan (EAP)?
A written document required by specific OSHA standards is an emergency action plan (EAP). [29 CFR 1910.38(a)] An EAP's purpose is to facilitate and organize employer and employee actions in the event of a workplace emergency.
During an emergency, well-developed emergency plans and proper employee training (so that employees understand their roles and responsibilities within the plan) will result in fewer and less severe employee injuries and less structural damage to the facility.
A poorly prepared plan will almost certainly result in a disorganized evacuation or emergency response, causing confusion, injury, and property damage.
So, the correct answer to the question is True (T).
To know more about the emergency action plan, visit: https://brainly.com/question/3238467
#SPJ1
if you wanted a custom dimension that reports membership status for a customer rewards program, which of these scopes would be set? Session
Event
Product
User
The custom dimension known as USER Scope reports the status of a customer rewards program's membership.
Due to the ability to group all of a user's component sessions and hits by a single value through the usage of user-level scope, USER Scope is the custom dimension that reports the status of a customer rewards program's membership. For a particular use, it is perfect for values that do not change regularly. Finally, think about how a game developer may use user-level custom dimensions to compare the number of levels played by trial users and paying customers. Screen views, like in the prior instances, are already used to keep track of how many times each level has been played overall, but the developer now wants to divide screen views by free and paid users.
Learn more about USER Scope here:
https://brainly.com/question/29376396
#SPJ4
State the difference between analog,digital and hybrid computer
Analog computers do not have memory, but digital computers do.
What is the explanation for this?Digital computers count, but analog computers measure. A hybrid computer is one that combines digital and analog components. It combines the best characteristics of both types of computers, i.e.
Hybrid computers combine the characteristics of analog and digital computers. The digital component is often the controller and performs logical and numerical operations, but the analog component is frequently used to solve differential equations and other mathematically challenging issues.
Learn more about Analog Computers;
https://brainly.com/question/30136628
#SPJ1
12 points. Fiona is starting to utilize the protection capabilities of Excel 2016. For the Lock or Unlock Cells function to work, which option should be enabled?
The Protect Workbook function needs to be enabled.
No functions need to be enabled other than the lock or unlock cells options.
The worksheet must be saved before the cells will become locked or unlocked.
The Protect Worksheet function needs to be enabled.
Answer:
The answer is D
Explanation:
just took the test on ed
In Microsoft Excel 2016, for the Lock or Unlock Cells function to work: D. The Protect Worksheet function needs to be enabled.
Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., to avail its end users the ability to analyze and visualize spreadsheet documents.
In Microsoft Excel, a Lock is used to prevent the editing and deleting of data stored in specific cells and ranges in a protected worksheet.
On the other hand, the Unlock Cells function allows data stored in specific cells and ranges in a protected worksheet to be edited and deleted.
In conclusion, Fiona must enable the Protect Worksheet function for the Lock or Unlock Cells function to work in Microsoft Excel 2016.
Read more: https://brainly.com/question/14299634
Consider a DMA module that is transferring characters (as bytes), one at a time, to main memory from some I/O device connected directly to the DMA device. Suppose that I/O device transfers bit-by-bit at a rate of 19200 bits per second. Suppose the CPU can fetch 1 million instructions per second (with constant use of the system bus and main memory). How much will the processor be slowed down due to the DMA activity
We have that the Processor speed reducing will be is mathematically given as
S=0.24 %.From the question we are told
Consider a DMA module that is transferring characters (as bytes), one at a time, to main memory from some I/O device connected directly to the DMA device. Suppose that I/O device transfers bit-by-bit at a rate of 19200 bits per second. Suppose the CPU can fetch 1 million instructions per second (with constant use of the system bus and main memory). How much will the processor be slowed down due to the DMA activityProcessorGenerally we have that the processor fetches directions at a charge of 1m guidelines per 2d or 1 MIPS.
The I/O machine switch records at a pace of 19200 bits per seconds.
\(\frac{19200}{8} = 2400\)
Therefore
2400 bytes per sec
Since that CPU is fetching and executing guidelines at an common charge of one million directions per 2nd sluggish down or cycle wasted p.c in DMA switch = ( 2400 / 1000000) * 100
= 0.24%
Hence
The Processor speed reducing down will be
S=0.24 %.
For more information on Processor visit
https://brainly.com/question/16517842
If your laptop is not able to connect to your wireless network, which of the
following might be a likely cause of the problem?
A. The laptop is too far away from the source of the signal.
B. The display screen on the laptop is too small.
C. The signal from the wireless source is too strong for the laptop.
D. The laptop is operating from a battery rather than a wall outlet.
Why are problem-solving strategies important? Choose all that apply. ensures important factors are taken into consideration ensures everyone involved in the solution understands the steps that are being taken makes it possible to find all solutions makes it possible to repeat the process to refine the solution DONE
Answer:
A,B,D
Explanation:
Answer:
A: ensures important factors are taken into consideration
B: ensures everyone involved in the solution understands the steps that are being taken
D: makes it possible to repeat the process to refine the solution
cal address EtherAddr. What would happen if, when you manually added an entry, you entered the correct IP address, but the wrong Ethernet address for that remote interface
Learn more:
brainly.com/question/7342246
The Address Resolution Protocol ARP cache maintained by ARP keeps a record of IP addresses and their corresponding Media Access Control, MAC address
The correct response to what would happen if the wrong EtherAddr is
entered into the arp-s InetAddr EtherAddr command is that;
The system will not be able to connect to the IP address linked to the wrong Ethernet address.
The reason the above response is correct is as follows:
Characteristics of the ARP protocol;
The ARP protocol is a protocol that has a high level of control such that
the reply is trusted and can be used to redirect traffic through spoofing of
the responses to ARP which are then stored in the cache.
Functioning of the arp -s InetAddr EtherAddr command;
The command arp -s InetAddr EtherAddr command inputs a manual entry
into the ARP cache that works to assign the inputted IP address in InetAddr
to the MAC physical address in EtherAddr.
The ARP provides the translation from physical MAC addresses of Layer 2
to the IP address of Layer 3 by mapping the MAC address to the IP
address.
Solution:
What would happen if, when you manually added an entry, you entered the correct IP address, but the wrong Ethernet address for that remote interface is as follows;
When the wrong Ethernet address is entered in the arp -s command, the
IP-address is resolved as belonging to the wrong Ethernet or MAC
address, and if the address does not exist, it will not be possible to
connect to the correct or desired IP address.
Learn more about ARP here:
https://brainly.com/question/13068535
https://brainly.com/question/22696379
https://brainly.com/question/12975431
Use the {blank} to view your presentation the way an audience will see it.
A. Slide Show Button
B. Play Button
C. Tools Menu
D. View Menu
Answer:
A. Slide Show Button
Explanation:
Individuals and organizations are moving to highly integrated enterprise systems
Select one:
True
False
The statement "Individuals and organizations are moving to highly integrated enterprise systems" is true.
What is enterprise system integration?An ERP system tells you exactly how much stock you need for each job and when you need it. ERP software also enables you to automate many of your procedures, resulting in increased efficiencies across the manufacturing process.
This implies less duplication, better resource scheduling, and less downtime. Enterprise integration allows for smooth cooperation by merging functionality and data interchange across many apps.
Therefore, the correct statement is true.
To learn more about enterprise, refer to the link:
https://brainly.com/question/18551533
#SPJ1
PLEASE HELP IN JAVA
A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.
Ex: If the input is:
3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank
the output is:
867-5309
Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)
Hint: Use two arrays: One for the string names, and the other for the string phone numbers.
Answer: import java.util.Scanner;
public class ContactList {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
// Read the number of word pairs in the list
int n = scnr.nextInt();
scnr.nextLine(); // Consume the newline character
// Read the word pairs and store them in two arrays
String[] names = new String[n];
String[] phoneNumbers = new String[n];
for (int i = 0; i < n; i++) {
String[] parts = scnr.nextLine().split(",");
names[i] = parts[0];
phoneNumbers[i] = parts[1];
}
// Read the name to look up
String name = scnr.nextLine();
// Call the getPhoneNumber method to look up the phone number
String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);
// Print the phone number, or "None" if the name is not found
if (phoneNumber != null) {
System.out.println(phoneNumber);
} else {
System.out.println("None");
}
}
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {
// Search for the name in the array and return the corresponding phone number
for (int i = 0; i < arraySize; i++) {
if (nameArr[i].equals(contactName)) {
return phoneNumberArr[i];
}
}
// If the name is not found, return null
return null;
}
}
Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.
In cell E13, create a formula using the AVERAGE function
to calculate the average of the values in the range E4:E11.
The average function in Microsoft Excel calculates the mean of the cells.
The required formula is: =AVERAGE(E4:E11)
The syntax of the average function is: =AVERAGE(cells-range)
From the question, the cell range is: cell E4 to cell E11
This means that, the average formula would be:
=AVERAGE(E4:E11)
Hence, the formula to enter in cell E13 is:
=AVERAGE(E4:E11)
Read more about Excel formulas at:
https://brainly.com/question/1285762
Internet Retailing
Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.
Activity
Answer the following questions: What do they have in common? Why are they appearing on that page?
When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it. The reason they are appearing on that page is because the product are similar.
What is E-commerce site website?The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.
Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.
So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.
Learn more about e-commerce Web site from
https://brainly.com/question/23369154
#SPJ1
The function localtime()
always return the same value
might return a different value but might return the same value as the last time you used it
returns a different value everytime you use it
Answer:
Imma assume python as your last question was python as well.
The answer is C
Explanation:
This is because when used against an epoch, it gives you the amount of time that has passed since the epoch.
Reusing PCBs of destroyed processes instead of freeing up the data structures eliminates the overhead of dynamic memory management but is likely to use more memory. Assume the following: • . The number of processes to be created and destroyed over a period of time is 10,000. The average number of processes coexisting at any given time is 100. The maximum number of processes coexisting at any given time is 600. Allocating and freeing a PCB take the same amount of time.
Question 1: How many memory operations (allocate or free) will be performed without PCB reuse?
Question 2: How many PCBs will coexist in memory, on average, during the entire run without PCB reuse?
Answer:
Question 1. A maximum of 600 PCBs will be needed, all of which will be freed at the end of the run. The total is 2*600 = 1,200 memory operations.
Explanation:
Since 100 processes will coexist at any given time, 100 PCBs will reside in memory on average.
You are testing the user experience.
Which of these are issues that affect the user experience?
Select 2 options.
You did not use comments to document your code.
A user complained about the language used in the program.
The variables do not have meaningful names.
The program should have used a loop for a repetitive process.
The numerical results are not calculated correctly.
Answer:
You can answer this very easily by considering which of the circumstances affect the end user and which affect the developer:
1) Didn't use comments in the code
- affects developers
2) User complaints about language used in the program
- affects users
3) The variables have meaningless names
- affects developers
4) The program should have used a loop
- affects developers
5) The numeric results are incorrect
- affects users
Your answers then are 2 and 5, spoken languages and incorrect output will very much affect the user experience.
The issues that affect the user experience user complained about the language used in the program. The numerical results are not calculated correctly. The correct option is B and E.
What is user experience?The term "user experience" describes how a product, application, system, or service makes the user feel.
It is a general term that can refer to anything, including how easily a user can navigate a product, how simple it is to use, how pertinent the shown content is, etc.
Information architecture, interaction design, and graphic design are the three primary subfields of UX design.
The focus of interaction design is on how customers engage with a given good or service. This covers the creation of user interfaces, including buttons and menus.
The problems affecting user experience The program's wording was criticized by a user. The numerical outcomes are incorrectly calculated.
Thus, the correct option is B and E.
For more details regarding user experience, visit:
https://brainly.com/question/29352526
#SPJ2
Which errors need to be corrected on this bibliography page? Check all that apply.
The errors need to be corrected on this bibliography page are:
A. The page title should not be bolded and underlined.
C. The second entry needs a hanging indent.
D. The last entry needs to have a date accessed.
E. The citations should be in alphabetical order.
What is bibliography?The sources you utilized to gather information for your report are listed in a bibliography. It appears on the final page of your report, near the finish (or last few pages).
A bibliography is a list of all the sources you utilized to research your assignment. The names of the authors are typically included in a bibliography. the names of the pieces. the names and locations of the businesses that released the sources you used for your copies. 3
The things to write on a bibliography page are:The author name.The title of the publicationThe date of publication.The place of publication of a book.The publishing company of a book.The volume number of a magazine or printed encyclopedia.The page number(s)Learn more about bibliography page from
https://brainly.com/question/27566131
#SPJ1
See options below
Which errors need to be corrected on this bibliography page? Check all that apply.
The page title, “Bibliography,” should not be in bold or underlined.
The first entry needs the author’s name.
The second entry needs a hanging indent.
The last entry needs to show the date it was accessed.
The citations should be in alphabetical order.
Answer:
What is the purpose of a bibliography or a works-cited list? Check all that apply.
to credit an author’s original idea or information
to avoid plagiarism
to organize source material
to direct readers to sources
Explanation:
1. Jacob Sherman is the director of sales for Lighting Designs, a store and website that caters to building contractors in five locations in the Seattle area. Jacob asks for your help in producing a sales report. He wants to analyze sales for the past year and project future sales for all the stores. To create the report, you need to import data from various sources and use the Excel Power tools. Go to the Sales Summary worksheet, where Jacob wants to display a summary of the company's annual sales since the first store opened in the year 2000. He has a text file that already contains this data. Use Power Query to create a query and load data from a CSV file into a new table as follows: a. Create a new query that imports data from the Support_EX19_10a_Summary.csv text file. b. Edit the query to remove the Units Sold and Notes columns. c. Close and load the query data to a table in cell A2 of the existing worksheet. 2. Go to the Previous Year worksheet, which lists the sales per month for the previous year in a table and compares the sales in a chart. Jacob imported this data from the Orders table in an Access database. He wants to track the changes in monthly sales and project the first six months of this year's monthly sales. Create a forecast sheet as follows to provide the data Jacob requests: a. Based on the data in the range A2:B14, create a forecast sheet. b. Use 6/30/2022 as the Forecast End date to forecast the next six months. c. Use Six Month Forecast as the name of the new sheet. d. Resize and move the forecast chart so that the upper-left corner is within cell C2 and the lower-right corner is within cell E12. 3. Go to the Stores worksheet. Jacob wants to display information about lighting products purchased according to store and manufacturer. He has been tracking this data in an Access database. Import the data from the Access database as follows: a. Create a new query that imports data from the Support_EX19_10a_LD.accdb database. b. Select the 2021_Orders, Products, and Purchases tables for the impo
Based on the information provided in your question, it appears that you need to perform the following tasks in Microsoft Excel:
Create a Power Query to import data from a CSV file (Support_EX19_10a_Summary.csv) into a new table, and then remove the "Units Sold" and "Notes" columns from the imported data. Finally, load the query data to a table in cell A2 of the Sales Summary worksheet.
What is the database?Others are:
Create a forecast sheet based on data in the range A2:B14 of the Previous Year worksheet, with a forecast end date of 6/30/2022, and name the new sheet "Six Month Forecast". Resize and move the forecast chart within the range C2:E12.
Create a new query to import data from an Access database (Support_EX19_10a_LD.accdb) and select the 2021_Orders, Products, and Purchases tables for import.
Please note that specific steps for performing these tasks may vary depending on the version of Microsoft Excel you are using. It is recommended to refer to Excel's official documentation or seek assistance from a qualified Excel user if you are not familiar with these tasks.
Read more about database here:
https://brainly.com/question/518894
#SPJ1