You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and zero. What does the function return if the user enters a negative three? def factorial(number): product = 1 while number > 0: product = product * number number = number - 1 return product strNum = input("Enter a positive integer: ") num = int(strNum) print(factorial(num))
-6
1
-3
There is no output due to a runtime error.

Answers

Answer 1

Answer: well it’s not “There is no output due to a runtime error”

Explanation: Put that and I got it wrong

Answer 2

The Answer Is 1.

Edge 2020.


Related Questions

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.​ a. ​ check list technique b. ​ domain analysis technique c. ​ noun technique d. ​ brainstorming technique

Answers

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a languaage.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and

Describa las características más importantes de cada procedimiento,difencias entre si Procedimiento Bessemer Procedimiento Siemens Martin Procedimiento Horno Electrico

Answers

Answer:

A continuación se explican cada una de las características más importantes de cada  horno:

Explanation:

Procedimiento Bessemer:

En este horno el oxígeno del aire quema el silicio y el manganeso que se encuentra en la masa fundida y los convierte en óxidos., luego el oxígeno comienza a oxidar el carbono.Luego finalmente el hierro se oxida,ya en este punto sin haber oxígeno ahora se añade a esa masa hierro carbono y finalmente manganeso.

Procedimiento Siemens Martin:

A 1800 º C funde la chatarra y lingotes de arrabio solidificado bajo la llama producida en la combustión; se eliminan las impurezas y se consiguen aceros de una gran calidad para fabricar piezas de maquinaria. Este tipo de horno tiene una gran uso en el mercado  ya que pueden fundir latones, bronces, aleaciones de aluminio, fundiciones y acero.

Procedimiento Horno electrico:

Trabaja a una temperatura de  1930 °C, se puede controlar eléctricamente, pueden contener hasta 270 toneladas de material fundido. También en estos hornos se inyecta oxígeno puro por medio de una lanza.

What output is generated by this for loop?

String str = "";

for (int i = 0; i <= str.length() - 1; i++)

{

System.out.println(str.charAt(i) + "-");

}


Group of answer choices


---


No output is generated.


--


-

Answers

Answer:

No output is generated

Explanation:

(1) The first line initialized an empty string, str

(2) The for loop attempts to iterate through the empty string. Since it is an empty string, no iteration will be done.

This implies that, the print statement within the loop block will not be executed.

Hence:

No output is generated

a(n) ________ refers to a memory tool to encode difficult-to-remember information in a way that is much easier to remember.

Answers

A mnemonic refers to a memory tool used to encode difficult-to-remember information in a way that is easier to remember. Mnemonics can be in the form of acronyms, visualizations, rhymes, or other mnemonic devices that help individuals retain and recall information more effectively.

A mnemonic is a memory aid or technique used to encode complex or hard-to-remember information in a more easily recallable format. They help individuals by providing a mental structure or pattern that connects new information with existing knowledge or familiar concepts.

By leveraging these memory aids, individuals can enhance their ability to retain and retrieve information, especially when faced with challenging or voluminous material.

Mnemonics are widely utilized in education, language learning, memorization tasks, and other contexts where effective information recall is essential.

To learn more about remember: https://brainly.com/question/29874885

#SPJ11

Topic: Looking around: D&S Theory as Evidenced in a Pandemic News Article Description: In this reflection you are to find a news article from the pandemic on the web that has some connection to Canada. The goal will be to analyse the change in demand and/or supply of a good/service during the pandemic. Read the article and address the following questions/discussion points: 1. Briefly summarize the article and make note about how your article connects with the theory of supply and demand. 2. Based on the article, what kind of shift or movement along the demand and/or supply curve would be expected? Make sure to explain your reasoning and draw a Demand and Supply graph with the changes shown. Also, address the change in equilibrium price and quantity. 3. How, in the limited amount of economics we have covered thus far, has your perspective on how the economy works changed? Include either a copy of your article in your submission, or a hyperlink embedded in your submission for your professor to access the article. Your reflection should be between 250 and 300 words or one page double spaced, 11 or 12 pt font.

Answers

Article summaryThe article “Canadian small business owners frustrated with customers refusing to wear masks” by Karen Pauls published in CBC News on August 14, 2020.

The article shows how small business owners are grappling with the balance between health and safety for their customers and workers and the economic impact of the pandemic on their businesses. The article connects with the theory of supply and demand as it highlights how the change in demand for products and services offered by small businesses is influenced by changes in customer behaviour and attitudes towards the mandatory use of masks.2. Shift or movement along the demand and/or supply curve

The mandatory use of masks by customers in small businesses would lead to a decrease in demand for products and services offered by the small businesses, resulting in a leftward shift of the demand curve. The decrease in demand would lead to a decrease in the equilibrium price and quantity of products and services. For instance, in the case of small businesses, this would mean a decrease in the quantity of products sold and the price charged for the products.

To know more about article visit:

https://brainly.com/question/32624772

#SPJ11

Which describes a design theme in PowerPoint?

Answers

Not enough information provided

Why do you think they added the wait .5 seconds block?

Answers

Answer:

Satisfaction

Explanation:

People enjoy the sensation of the computer doing something and the feeling that the program is advanced.

One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.

Answers

Answer: B,C,D

Explanation:

Answer:

the answer is B,C,D

Explanation:

which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?

Answers

The correct response is d. Slide Sorter. You may easily rearrange or divide your slides into sections by dragging and dropping them around the grid-like display of your slides thanks to the slide sorter.

You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view. The "Slide Sorter" button in the "Presentation Views" button group on the "View" tab of the Ribbon is another option. The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here. All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in PowerPoint's Slide Sorter view are also available in the Normal view's slide thumbnails pane. Click a slide thumbnail in the Slide Sorter window to choose a slide. Click and drag the slide thumbnails in this view, then release them where you want them to be. This will reorder the order of the slides in your presentation. The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if you choose a slide thumbnail and then press the "Enter" key on your keyboard. In the Slide Sorter window, click the desired slide thumbnail to choose it for deletion. Then, use your keyboard's "Delete" key. Alternatively, you can erase the slide by doing a right-click. then from the pop-up menu, choose the "Delete Slide" option.

Learn more about Slide Sorter here

https://brainly.com/question/16910023

#SPJ4

Which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?

a. Normal

b. Outline

c. Slide Show

d. Slide Sorter

a school uses the array to call an attendance register every morning

Answers

A school uses an array to call an attendance register every morning. In this context, the array is a data structure that organizes and stores the names of students in a fixed-size format. This enables the school to efficiently keep track of attendance and ensure all students are accounted for.

In computer programming, an array is a data structure that stores a collection of elements of the same data type in a contiguous block of memory. Each element in an array is identified by an index or a subscript, which is an integer value that represents its position within the array.

Arrays can be used to store and manipulate data in many different ways, such as storing a list of numbers, a collection of strings, or a matrix of values. They are often used in algorithms and data processing applications, where efficient access to and manipulation of large amounts of data is required.

To learn more about Array Here:

https://brainly.com/question/31605219

#SPJ11

how can you send and share a message information through a phone​

Answers

Answer:

Through text message

Explanation:

Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there.

Through text messages

Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there!

What is a graphics card?

Answers

Answer:

a printed circuit board that controls the output to a display screen.

makes ya games or other things look pog

Explanation:

why is preserving the integrity of data, information, and systems an important cybersecurity goal?

Answers

Additionally, data and information that is not properly protected can be vulnerable to corruption, tampering, or deletion, which can lead to significant data loss or system downtime.

What is vulnerable ?

Vulnerability is the state of being exposed to potential harm or loss. It is the susceptibility of an individual, group, system, or country to physical, social, economic, or environmental harm or risks. Vulnerability can arise from a variety of factors, including poverty, social exclusion, discrimination, insecurity, climate change, and natural disasters. It can also be caused by a lack of access to resources, services, or infrastructure that can protect people from harm. Vulnerability can lead to losses in health,

To learn more about vulnerable

https://brainly.com/question/13138322

#SPJ4

a Python program to process a set of integers, using functions, including a main function. The main function will be set up to take care of the following bulleted items inside a loop:

The integers are entered by the user at the keyboard, one integer at a time

Make a call to a function that checks if the current integer is positive or negative

Make a call to another function that checks if the current integer to see if it's divisible by 2 or not

The above steps are to be repeated, and once an integer equal to 0 is entered, then exit the loop and report each of the counts and sums, one per line, and each along with an appropriate message

NOTE 1: Determining whether the number is positive or negative will be done within a function; and then a call to that function will be made from within the main function. The following is what you are to do within that function: if an integer is positive, add that integer to the Positive_sum increment the Positive_count by one If the integer is negative add that integer to the Negative_sum increment the Negative_count by one

NOTE 2: Determining whether the number is divisible by 2 or not will be done within a second function; and then a call to that function will be made from within the main function. The following is what you are to do within that function: if the integer is divisible by 2 increment the Divby2_count by one if the integer is not divisible by 2 increment the Not_Divby2_count by on

NOTE 3: It's your responsibility to decide how to set up the bold-faced items under NOTE 1 and NOTE 2. That is, you will decide to set them up as function arguments, or as global variables, etc.

Answers

Here's an example Python program that processes a set of integers entered by the user and determines if each integer is positive/negative and divisible by 2 or not, using functions:

The Python Program

def check_positive_negative(number, positive_sum, positive_count, negative_sum, negative_count):

   if number > 0:

       positive_sum += number

       positive_count += 1

   elif number < 0:

       negative_sum += number

       negative_count += 1

   return positive_sum, positive_count, negative_sum, negative_count

def check_divisible_by_2(number, divby2_count, not_divby2_count):

   if number % 2 == 0:

       divby2_count += 1

   else:

       not_divby2_count += 1

   return divby2_count, not_divby2_count

def main():

   positive_sum = 0

   positive_count = 0

   negative_sum = 0

   negative_count = 0

   divby2_count = 0

   not_divby2_count = 0

   

   while True:

       number = int(input("Enter an integer: "))

       

       positive_sum, positive_count, negative_sum, negative_count = check_positive_negative(

           number, positive_sum, positive_count, negative_sum, negative_count)

       

       divby2_count, not_divby2_count = check_divisible_by_2(number, divby2_count, not_divby2_count)

       

       if number == 0:

           break

   

  print("Positive count:", positive_count)

   print("Positive sum:", positive_sum)

   print("Negative count:", negative_count)

   print("Negative sum:", negative_sum)

   print("Divisible by 2 count:", divby2_count)

   print("Not divisible by 2 count:", not_divby2_count)

if __name__ == "__main__":

   main()

The check_positive_negative() function takes the current integer, and the sum and count of positive and negative integers seen so far, and returns updated values of the positive and negative sums and counts based on whether the current integer is positive or negative.

The check_divisible_by_2() function takes the current integer and the count of numbers seen so far that are divisible by 2 or not, and returns updated counts of numbers divisible by 2 and not divisible by 2.

The main() function initializes the counters for positive and negative integers and for numbers divisible by 2 or not, and then loops indefinitely, prompting the user for integers until a 0 is entered. For each integer entered, it calls the check_positive_negative() and check_divisible_by_2() functions to update the counters appropriately. Once a 0 is entered, it prints out the final counts and sums for positive and negative integers, and for numbers divisible by 2 or not.

Read more about python programs here:

https://brainly.com/question/26497128

#SPJ1

Which of the following are results of technological advancements and increased automation?

Increased labor demand

Decreased productivity

Increased cost

Increased productivity

Answers

Answer:

increased productivity

Explanation:

sorry if i am not correct

increased productivity.

Help please answer the question 1 2 3 4 5 6

Help please answer the question 1 2 3 4 5 6

Answers

Answer:1. A 2. C 3. B

Explanation: just did it

Write a while loop that prints from 1 to user_num, increasing by 1 each time. Sample output with input: 4 1 2 3 4

Answers

To solve the problem of printing numbers from 1 to a user-specified number using a while loop, we need to understand the basic structure of a while loop and how it can be used to achieve this task.

A while loop is a type of loop that executes a block of code repeatedly as long as a specified condition is true. In this case, we want to print numbers from 1 to user_num, so we can use a while loop to repeat this process until we reach the specified number.

To do this, we first need to prompt the user to input the desired number. We can then use a variable to keep track of the current number we are printing, and loop through each number from 1 to the user-specified number using a while loop.

Here's the code to achieve this:

user_num = int(input("Enter a number: ")) # prompt the user for input
i = 1 # set the starting number to 1

while i <= user_num: # loop through each number until we reach the user-specified number
   print(i) # print the current number
   i += 1 # increment the number by 1 for the next iteration

In conclusion, we have used a while loop to print numbers from 1 to a user-specified number. The code prompts the user for input, initializes a variable to keep track of the current number, and then uses a while loop to loop through each number and print it.

To learn more about while loop, visit:

https://brainly.com/question/15690925

#SPJ11

What actions can you take from the Go To tab? Check all that apply.
O moving to a specific page
O moving to a specific line
moving a file to a new folder
moving a specific number of pages ahead of the current position
moving to a new document

Answers

Answer is

Moving to a specific page
Moving to a specific line
Moving a specific number of pages ahead of the current position



HOPE THAT HELP YOU!

Moving to a specific page and moving to a specific line as the moving a specific number of pages ahead of the current position.

When is the use of file?

When you need to move a file from the document folder to the new folder you just created can be done by different methods and when you click right button of mouse there is a list pop up in which many options flashes you should choose either cut or copy from the list.

1)Choose 'cut' then paste it in the new folder. If you choose cut the file it will be removed from the document folder.

2)Choose 'copy' then paste it in the new folder. If you choose  copy the file the file  will remain in the document folder and also in the new folder.

An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security. A VPN can safely link a user to the internal network of a business or to the Internet at large. Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.  

Therefore, Moving to a specific page and moving to a specific line as the moving a specific number of pages ahead of the current position.

Learn more about VPN on:

https://brainly.com/question/29432190

#SPJ2

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

when the growth of a small network is being planned, which design element will include the physical and logical topology of the network?

Answers

A network's overall design, including its physical and logical topology, communication channels, network protocols, and hardware and software components, is referred to as its architecture.

What is the name of a network's logical or physical layout?

The physical and logical configuration of a network's nodes and links is known as its topology. Typically, nodes contain switches, routers, and software with switch and router functions.  A graph is a common way to represent network topologies.

What distinguishes logical from physical network design?

Using physical elements like ports, cables, racks, and more, a physical network diagram shows the topology of the network. On the other hand, a logical network diagram displays the "invisible" components and connections that pass through the network's physical objects.

To know more about network's visit:-

https://brainly.com/question/14276789

#SPJ4

what powershell cmdlet can be used to add a static route?

Answers

The PowerShell cmdlet used to add a static route is "New-NetRoute". The New-NetRoute cmdlet allows you to create a new static route entry in the routing table of a Windows computer.

It provides flexibility in defining the destination network, next hop, and other properties of the route.Here's an example of how to use the New-NetRoute cmdlet to add a static route:New-NetRoute -DestinationPrefix 192.168.10.0/24 -InterfaceIndex 2 -NextHop 192.168.1.1

In this example, the static route is being added for the destination network "192.168.10.0/24" with the next hop IP address "192.168.1.1". The "InterfaceIndex" parameter specifies the index number of the network interface through which the traffic should be routed.

You can customize the command based on your specific requirements, such as modifying the destination network, next hop, or interface index.

Please note that adding routes usually requires administrative privileges. Therefore, make sure to run the PowerShell command prompt as an administrator before using the New-NetRoute cmdlet.

Learn more about Windows here

https://brainly.com/question/29892306

#SPJ11

who is springtrap from five night at freddy 3

Answers

Answer:

Purple Guy (or William Afton).

Explanation:

(The man behind the slaughter.)

Answer:

well i believe that is william afton

Explanation: he killed the kids and then after that the crying childs scared him into the room with the spring bonnie costume then he put it on and then boom the gears killed him and springtrap was born

you need to connect a router to a subnet. the subnet uses the ip address 192.168.12.0/26. you are instructed to assign the last ip address on the subnet to the router. which ip address will you use?

Answers

The IP address 192.168.12.62 can be used as per the given scenario.

What is IP address?

IP stands for "Internet Protocol," which is a set of rules that governs the format of data sent over the internet or a local network.

In essence, IP addresses are the identifiers that allow information to be sent between devices on a network: they contain location information and make devices available for communication.

The broadcast address is the last IP address in a subnet. You can calculate it by taking the network address (the first address in the subnet), adding the number of addresses in the subnet, and then subtracting one.

Thus, as per the above method, the IP address that can be used is 192.168.12.62.

For more details regarding IP address, visit:

https://brainly.com/question/16011753

#SPJ1

Why are digital signals a reliable way to create, store, and transmit information?

Answers

Answer:

Digital signals are a more reliable form of transmitting information because an error in the amplitude or frequency value would have to be very large in order to cause a jump to a different value. Signals are composed of infinite possible values. Signals are composed of only two possible values

How globalization is related to communication technology?

Answers

Answer:

hey mate there is your answer

How globalization is related to communication technology?

For this challenge you will need to write a program that will produce the display for the individual frames, given the user inputting the number of pins knocked down in each frame of bowling.
Rules:
• The game of bowling consists of 10 frames, where a player gets 2 attempts to knock down 10 pins.
• If the player knocks down all 10 pins on the first roll, that should be displayed as X, and the next number will be the first roll of the next frame.
• If the player doesn't knock down any pins, that should be displayed as -
• If the player gets a spare (knocks down the remaining pins on the second roll of the frame, that should be displayed as /
The user will input integers tha represent the number of pins that have been kncked down on each roll. The list is not a fixed size, as bowling a perfect game requires only 12 rolls, while most games would use more rolls. Use anvil to make this and send the link.

Answers

This method takes a list of numbers that represent how many pins were knocked down on each roll and outputs a string that displays the separate frames in accordance with bowling rules.

In bowling, how many pins are there?

At the start of each frame, ten pins are placed at the end of the bowling lane. With the triangle's point towards the bowler, they are positioned in a triangle arrangement.

function score(display frames):

body num = 1

0 for roll num

Result: ""

range(len(scores)) for I

If roll num = 3 and frame num = 10:

break

If roll num = 1 and scores[i] = 10:

result += "X "

frame num plus one

if roll num == 1, then

score(s[i]) + output += str(i) + " "

roll num plus one

else:

if scores[i-1] plus scores[i] equal 10, then

result += "/ "

else:

score(s[i]) + output += str(i) + " "

frame num plus one

0 for roll num

bring back output.strip ()

# A sample of usage

Result = [10, 7, 3, 9, 0, 10, 0, 8, 8, 2, 0, 6, 10, 10, 10, 8, 1]

print(display frames(scores)) # Results: X 7/9 - X 0/8 - X X/X/X 8 1

To know more about outputs  visit:-

https://brainly.com/question/19088371

#SPJ1

What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.​

Answers

Answer:

Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.

Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.

Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.

Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.

which of the following best describes a bastion host? group of answer choices a host with two or more network interfaces a computer on the perimeter network that is highly protected a computer running a standard os that also has proxy software installed a computer running only embedded firmware

Answers

A bastion host is best described as a computer on the perimeter network that is highly protected. The correct answer B.

It is often used as a gateway between an internal network and the internet, and is designed to withstand attacks from outside the network. It is typically configured with additional security measures, such as firewalls and intrusion detection systems, to protect the internal network from potential threats.

The purpose of a bastion host is to provide secure access from the internet to specific resources on the internal network, while also protecting the internal network from potential threats. To achieve this, a bastion host is typically configured with additional security measures, such as firewalls and intrusion detection systems, to prevent unauthorized access. The correct answer B.

Learn more about bastion host:

https://brainly.com/question/6582462

#SPJ11

readfiles: this command should read the historical price data from the two files. the command takes 2 arguments, the pathname of the mrna data file and the pathname of the pfe data file.

Answers

The "readfiles" command reads historical price data from two files, using the mrna data file and the pfe data file as arguments.

The "readfiles" command is designed to retrieve historical price data from two separate files. It requires two arguments: the first argument is the pathname (file path) of the mrna data file, and the second argument is the pathname of the pfe data file. By providing the correct file paths, the command will access the specified files and extract the historical price data from them. This data can then be used for analysis, comparison, or any other relevant purposes.

For more information on command visit: brainly.com/question/32674229

#SPJ11

-Create a module in Excel
-Use an input box to ask for a phrase of at least 10 characters For now, don’t worry about checking it if it has 10 characters
-Display messages to user (not in immediate window):
-number of characters in the
-phrase
-First 4 characters
-Last 6 characters
-Character number 5
-All but the first and last characters

Answers

Creating a module in Excel is pretty simple. Before starting, you should know that a module is a component of Excel that stores functions or procedures that you have built-in Visual Basic for Applications.

In other words, a module is a collection of macros, which you can run from various Microsoft Office programs, such as Excel, PowerPoint, and Word, among others. Here are the steps you need to follow to create a module in Excel: Step 1: First, open Microsoft Excel.

Note that each of these functions returns a string that contains the message you want to display to the user. You can call these functions from a button or a macro in Excel. I hope this helps! Let me know if you have any questions.

To know more about display visit:

https://brainly.com/question/33443880

#SPJ11

Other Questions
What is global environment degradation? Briefly outline thecauses, evidences, and progression of global environmentaldegradation. PLEASE HELP ME ANSEWR Q3 Ace Cable TV offers two monthly plans. Plan A costs $55 a month plus $3 for each premium channel the customer selects. Plan B costs $25 a month plus $8 for each premium channel the customer selects. Write an expression for the cost for Plan A, the cost for Plan B, and at what point will the two plans cost the same? In what way did Neolin and Pontiac think it was best to deal with the American settlers?A. They wanted the Indigenous Americans to band together and stay separate from the American settlers.B. They wanted to make alliances with the settlers to fight against other Indigenous groups.C. They encouraged the Indigenous Americans to blend into the new American settlers' society.D. They thought the old ways needed to be forgotten and new ways should be accepted.NO LINKS! MARK YOU THE BRAINLIEST Cienna gets paid weekly on Thursdays, and on Friday she checks her bank account to make sure the money is there. Cienna's behavior is BEST described as being influenced by which type of reinforcement schedule? the hydration of ion: what interactions are at work in an aqueous salt solution to promote hydration? read the article and answer these questions:Take a look at the map from the article. Based on the map and information in the article, what can the reader talk about the state where Harriet Tubman was born?Group of answer choicesIt bordered a free state to the west.It had some plantations where African Americans were free.It had some cities where African Americans were free.It bordered a free state to the north.Flag question: Question 2Question 20 ptsIf the author were to add another section to this article, the section would most likely discuss an African American who ____________.Group of answer choicesServed in the government and worked to preserve all existing laws.Bravely fought against unfair laws in the interest of civil rightsSpoke out against the government and worked to eliminate all existing laws.Violently fought against others in the interest of personal gainFlag question: Question 3Question 30 ptsWhich quality did Harriet Tubman maintain throughout her life?Group of answer choicesThe desire to criticize others.The desire to deceive others.The desire to protect those in power.The desire to protect those in need.Flag question: Question 4Question 40 ptsBased on the article, the reader can tell that after Frederick Douglass escaped from slavery, his most important goal was to__________.Group of answer choicesWrite to make a living.Hide to protect his familyOrganize peaceful protests.Work to outlaw slaveryFlag question: Question 5Question 50 ptsWhich of these is an example of Harriet Tubman's ingenuity?The word ingenuity is in your dictionary.Group of answer choicesDeciding to run away from the plantation.Wearing disguises while travelingExperiencing unpredictable blackoutsDedicating her life to winning more rights for allFlag question: Question 6Question 60 ptsMartin Luther King said that people had "the moral responsibility to disobey unjust laws." What did he mean?Group of answer choicesDisobeying laws that are new is legal.Disobeying laws that are new is the right thing to do.Disobeying laws that are unfair is legal.Disobeying laws that are unfair is the right thing to do.Flag question: Question 7Question 70 ptsWhich of these is a synonym for the word illicit?Group of answer choicesIllegalSincereEnergeticHinderedFlag question: Question 8Question 80 ptsThe reader can predict that if Martin Luther King were alive today, he would most likely be __________.Group of answer choicesWorking on behalf of all people who lack powerAdvocating obeying laws in all casesAdvocating using force in some casesWorking on behalf of all people who break lawsFlag question: Question 9Question 90 ptsResearch another famous African-American or person of African descent from history. Give a brief description of their life and their significance. Then, compare or contrast this figure to the above three people. Your response should be 8-10 sentences. You MUST site your source of your research as well as evidence from the article.due by tomorrow night!! 30 points!! Extra credit. Put the following in Ascending order:54%, 2/5, .45Help please what were teh three models of dna replication that the meselson stahl experiments were testing for HELPPPPPPPPPPPPPPPPPPPPPPP A loud factory machine produces sound having a displacement amplitude in air of 1.00 mum. but the frequency of this sound can be adjusted. In order to prevent ear damage to the workers, the maximum pressure amplitude of the sound waves is limited to 10.0 Pa Under the conditions of this factory, the bulk modulus of air is 1.29 x 10^5 Pa. The speed of sound in air is 344 m/s. What is the highest-frequency sound to which this machine can be adjusted without exceeding the prescribed limit? Part B Is this frequency audible to the workers? The peoples call themselves the Akimel O'odham, which means "riverpeople."OA. MojaveOB. HopiC. NavajoOD. Pima4 What is a good asset turnover ratio formula? Calculate the amount of heat needed to melt 35.0 g of ice at 0C. Express your answer in kilojoules. Brenda purchased five computers whose total list price was $3,300. She received a 20% trade discount. What did Brenda pay for the computers? Multiple Choice $2,640 $2,440 $660 $860 As the Director of your daycare or preschool, you just had a parent come to you and donate $2,000. What would you do with that money? Make a list or chart of what you will do with the money your received. Be sure to include the items and cost. (Ex: teacher bonuses, items to be fixed at your school, school supplies, etc..) Based on the measuresprovided in the diagram,determine the measure ofBC.(You may assume that point A is thecenter of the circle.)O 130O 25O 50O 100 A student knows the mass of one of the reactants of a chemical reaction and wants to calculate the mass of one of the products of the reaction. which process should the student follow? Which pictures below show pure substances? how did the moderate social democrats in germany put down the communist spartacist uprising?