A chart is used to represent ______ data in pictorial form
Computer question
From the chapter ms excel pls answer!!

Answers

Answer 1

Answer:Pictorial form is also called a pictogram


Related Questions

can you plz answer me from the photo​

Answers

A. True
B. False
C. True

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

Question 10 :In a word processor, you can use the Word Count function to:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt 1 to alt 9. A count the number of images and animations in a document. B count the number of index entries in a document. C count the number of lines and paragraphs in a document. D count the number of primary and secondary headers in a document.

Answers

Answer:

C. count the number of lines and paragraphs in a document.

Explanation:

A word processor or word processing software application is a type of software designed to enable its users type, format and save text-based documents such as .docx, .txt, and .doc files. Some examples of a word processor are Microsoft Word, Notepad, Sublime text, etc.

In Microsoft Word, the number of words and pages you type in a document are automatically counted and displayed on the status bar at the left-bottom of the workspace.

Basically, you can use the Word Count function of a word processor to count the number of lines, pages, words, characters, and paragraphs in a text-based document.

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

You are planning a program to find the maximum heart rate recommended for patrons of a gym where you have a part-time job. One formula for calculating the maximum heart rate is the difference between 220 and the patron’s age. Some of the steps in your plan are below.

Put them in order of which occurs first. Some steps are not listed.

Answers

Answer:

Age = int(input(Enter your age? "))

print(f"Your maximum heart rate is {220 - age}.")

Explanation:

The programs will be as follows

Age = int(input(Enter your age? "))

print(f"Your maximum heart rate is {220 - age}.")

 

Answer:

got 100 on the quiz

Explanation:

can you help me here please​

Answers

Explanation:

1) ethiCal : he is a good person to be socialized .

unethical : he should not trust the people so easily that he have never met and gave the password to them

2) ethical: she is a good girl to login in time and kepp only respected points

unethical : she should have Ateach her friends that they should not fight and discuss the right answer correctly

what do you mean by professional education? explain with examples.​

Answers

Answer:

prfesssional education is any programs that improve the knowledge,skills and attitudes.

Example include; educational course and training to become a teacher,nursing course,aeronautics engineering,etc.

When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibility falls on you, as the client company?

Answers

Answer:

Software as a service (SaaS) platform would give the client company the responsibility of offering applications over the internet, develop, host, and update the product.

Explanation:

Salesforce is an example of Software as a service (SaaS), offering applications for businesses over the internet.

Software as a Service (SaaS) uses the cloud to host web-based apps and make them available to users over the internet, eliminating the need for users to install and maintain application software. Users only access this service with an internet connection and a web browser.

The cultivation in mountain areas, with their scattered plots of usable land at various altitudes with different climates, landscapes and little margin for mechanization, are managed by family farms in the most efficient and effective way.

Answers

Answer:

Mountain farming

Explanation:

Mountain farming is done in hilly areas of the mountains. It is mainly family farming. The mountain farming is mainly done in the mountains where the paddy fields are scattered and the limited use of the usable lands are available.

It is cultivated in different types of climatic conditions or landscapes with limited use of mechanization or machines. The mountain farming is maintained by the family farms in an effective way.

Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these tags along with the ones you have learned in the lesson and construct a simple web page in HTML.

Some suggestions of simple tags include those which:

create a simple line break;

another way to create bold text;

underline text;

make text within the tag bigger than the rest of the text (specifying the size of the text);

mark or highlight a word or parts of your text;

a short quotation;

subscript text;

and superscript text.


You will only submit your document with the html you have created. However, it is always a good idea to use an HTML test bed to check your work.


Tags we have gone over in this lesson will be in the picture

Answers

<html>

<body>

<h1>Hello, Welcome to this simple website</h1>

<br>

<u>This is a very good <strong>quote<strong></u>

<br>

<blockquote>"Sometimes silence is the best answer"</blockquote>

<br>

<p>This is our 16<sup>th</sup> anniversary<p><br>

<p>H<sub>2</sub>So<sub>4</sub>is highly reactive</p>

</html>

<body>

Which of the following is the BEST example of the principle of least privilege? Correct Answer: Wanda has been given access to the files that she needs for her job. Correct Answer: Mary has been given access to all of the file servers. Correct Answer: Jill has been given access to all of the files on one server. Correct Answer: Lenny has been given access to files that he does not need for his job.

Answers

Answer: Wanda has been given access to the files that she needs for her job.

Explanation:

The principle of least privilege is when a user is only given the minimum level of permissions that he or she needs to perform a particular job function. This helps in reducing the risk of attackers having access to data.

The best example of the principle of least privilege is Wanda has been given access to the files that she needs for her job. Given access to all of the file servers or access to all of the files on one server is incorrect.

Answer:

Wanda

Explanation:

Reason being is that least privilege gets only the things you need for the job, nothing more or less.

Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController

Answers

od. adding a segue fro. the last viewcontroller

help me pls i beg whoever types first ill mark them brainliest

Answers

Answer:

The answer is "Line 1,4,and 9".

Explanation:

Following are the complete code to the given question:

print ("What is your favourite football team? ")#print message

team = input()#define variable that use input method to input value

#this is the IF statement, If they enter Manchester City

if team == "Manchester City":#use if to check string value

#respond like this

   print ("Manchester City is a great team! ")#print message

#alternatively, respond like this

else: #defining else block

   print("I don't mind "+ team +", but Manchester City is better !")#print message

   #don't forget concatenation!

output:

Please find the code with the output in the attached file.

Please find attached file that will explains errors.

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111

If an if- else statement is true, it will include which kinds of results?

Answers

In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.

Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:

#include <stdio.h>

int main(void) {

int n = 2;

if(n == 3) { // comparing n with 3 printf("Statement is True!\n");

}

else { // if the first condition is not true, come to this block of code

printf("Statement is False!\n"); } return 0;

}

Output:

Statement is False!

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner

>What is the output of the following code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

A Python keyword ______________.

can be user defined

cannot be used outside of its intended purpose

can only be used in the comments section

can be used anywhere in a Python program

Answers

Answer:

cannot be used outside of its intended purpose.

Explanation:

In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.

Keywords cannot be used as variable names, identifiers or functions.

In Python, some of such keywords include;

i. True

ii. False

iii. for

iv. while

v. break

vi. continue

vii. if

viii. else

ix. def

x. pass

i need a constant supply and i am not portable
A. desktop pc
B. smart phone
C. tablet pc
D. laptop​

Answers

the answers desktop pc

Marcia is using the software program Slack. What is she most likely using it for at work?

Answers

Answer:

Communicating with collegues.

Explanation:

Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.

I hope for your success!

Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to

Answers

Answer:

The program in Python is as follows:

#1

for i in range(10):

   print("MrRoyal",end=" ")

print()    

#2

for i in range(1,50,2):

   print(i,end=" ")

print()

#3

for i in range(0,101,5):

   print(i,end=" ")

print()

#4

i = 1

while i <=10:

   print(i,end =" ")

   i+=1

#5

myfile = open("People.txt", "r")

eachLine = myfile.readline()

while eachLine:

   print(eachLine)

   eachLine = myfile.readline()

myfile.close()

Explanation:

The program in Python is as follows:

Program #1

This iterates from 1 to 10

for i in range(10):

This prints the name for each iteration [modify to your name]

   print("MrRoyal",end=" ")

This prints a new line

print()    

Program #2

This iterates from 1 to 49 with an increment of 2

for i in range(1,50,2):

This prints the odd numbers in the above range

   print(i,end=" ")

This prints a new line

print()

Program #3

This iterates from 0 to 100 with a step of 5

for i in range(0,101,5):

This prints every 5th number

   print(i,end=" ")

Print a new line

print()

Program #4

This initializes the number to 1

i = 1

This opens the file in an append mode

f = open("myfile.txt", "a")

This loop is repeated from 1 to 10

while i <=10:

This writes each number to the file

   f.write(str(i))

Increment the number by 1

   i+=1

Close the file

f.close()

Program #5

This opens the file in a read mode

myfile = open("People.txt", "r")

This reads each line

eachLine = myfile.readline()

This loop is repeated for every line

while eachLine:

Print the content on the line

   print(eachLine)

Read another line

   eachLine = myfile.readline()

Close the file

myfile.close()

What should Iris obtain from the client in order to display the work in her portfolio?

Answers

Answer:

depends on the laws of the country in which you are working

Explanation:

This is very vague and usually depends on the laws of the country in which you are working. In some cases, Iris would need permission from the client in order to display the work. In other cases, Iris would not need anything because she is the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract was created between Iris and the client, stating if the content rights where transferred or not.

it is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together​

Answers

Answer:

Cable ties

Explanation:

Used to bundle cables neatly inside and outside of a computer. It is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together.

>3

[tex]\boxed{Parts\: organizer}[/tex] is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

Write a HTML code for displaying the following​

i need an answer urgently

Answers

Answer:

Following are the code to the given question:

Explanation:

<html>

<body>

<p align="center" >VOCATIONAL SUBJECT</p>

<table align="center" border="2">

 <tr>

   <td rowspan="2">YEAR</td>

   <td colspan="5">Vocational course</td>

 </tr>

<tr>

   <td rowspan="1">IT</td>

   <td rowspan="1">CS</td>

   <td rowspan="1">EL</td>

</tr>

    <tr>

   <td colspan="1">2016</td>

   <td colspan="1">66</td>

   <td colspan="1">68</td>

   <td colspan="1">60</td>

 </tr>

 <tr>

   <td colspan="1">2017</td>

   <td colspan="1">77</td>

   <td colspan="1">78</td>

   <td colspan="1">80</td>

 </tr>  

 <tr>

   <td colspan="1">2018</td>

   <td colspan="1">60</td>

   <td colspan="1">67</td>

   <td colspan="1">70</td>

   </tr>

</table>

</body>

</html>

What are the uses of DVD Ram​

Answers

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

DVD Ram Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

. A store offers a deposit of 6% on the cash price of $462. The deposit amount is?​

Answers

I got $27.72 is 6% of $462.

Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of perfect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 3*3, 4*4, 5*5, 6*6 respectively).) Associate the number you compute with the variable q. For example, if k and m had the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36,.

PYTHON CODING

Answers

Answer:

import math  

def isPerfectSquare(n):

 s = int(math.sqrt(n))

 return n == s*s

def countPerfectSquares(k,m):

 q = 0

 for i in range(k,m):

   if isPerfectSquare(i):

     q=q+1

 return q

print(countPerfectSquares(10,40))

Explanation:

Note that this is including the k, but excluding m. If you want to include m, write m+1 in the range expression.

Other Questions
Hello, Flashligh explain where the energy comes from and how it is affecting change or putting an object in motion How does replanting trees increase the sustainability of forestland?A. Replanting reduces the consumption of wood.B. Replanting reduces the demand for wood.C. Replanting increases the cost of wood.D. Replanting increases the supply of wood. If distance between two charges increased by 2 times then force Which sentence is punctuated correctly What was the big lesson that came for Max after not placing for the 3x3 in the 2019 World Championships? Find the equation of the line that passes through the points (4,11) and (-1,1). Write your answer in slope-intercept form. Bonus points forwriting it in the two other forms (make sure you label which form is which). A watermelon is thrown off of a roof to the ground. Its momentum changed from 50kgm/s to 2kgm/s. What is the impulse? Which of the following actions by the Fed would cause the money supply to increse? How to find the slope of a line passing through (-3,3) , (-5,9) What are control criteria for a control system? A hot air balloon is released and it rises at a speed of 15 mph. Aweather pattern introduces a wind headed west at 20 mph. Thehot air balloon is now redirected. What is the new direction of thehot air balloon? - Me escuchas?-S, ____ escucho atentamente.A. losB. nosC. meD. te Help will mark brainliest #7,8 Tokyo, Japan, one of the largest cities on Earth, is home to more than 12 million people. To assess the hazard to Tokyo from Mt. Fuji, consider that the prevailing winds are expected to blow the cloud from a major eruption to the east, dumping up to a meter of ash more than 100 km from the volcano. Measure the distance and direction from the volcano to the urban center of Tokyo. Which of the following statements is most consistent with this information?a. Mt. Fuji is too far away from Tokyo to pose a sig- nificant hazard. b. The volcano poses a significant hazard to Tokyo because it is close to the city and because the pre- vailing winds are likely to blow an eruption cloud in its direction. c. The volcano poses only a moderate hazard to Tokyo; it is close enough, but the prevailing winds are likely blow any eruption cloud away from the city. d. The volcano is not a hazard to Tokyo because it is -vel was extinct and not expected to erupt. CAN SOMEONE HELP THANKS 14 POINTS Which element of the map tells you what the colored areas mean?A. scaleB. legendC. longitude and latitude D. compass help me with this please According to recent data, only 36 percent of Uber's current employees are women. How do you think this situation helped perpetuate a flawed corporate culture? The morphogical characteristics of plant plantain... A bonds is generally $1,000 and represents the amount borrowed from the bonds first purchaser. A bond issuer is said to be in if it does not pay the interest or the principal in accordance with the terms of the indenture agreement or if it violates one or more of the issues restrictive covenants. The contract that describes the terms of a borrowing arrangement between a firm that sells a bond issue and the investors who purchase the bonds is called . A bonds allows a bondholder or preferred stockholder to convert their bond or preferred share, respectively, into a specified number or value of common shares.