Kara's teacher asked her to create a chart with horizontal bars. Which chart or graph should she use?
1.) Bar graph
2.) Column chart
3.) Line graph
4.) Pie chart

Answers

Answer 1

Answer:

Line graph

Explanation:

Horizontal bar graphs represent the data horizontally. It is a graph whose bars are drawn horizontally. The data categories are shown on the vertical axis and the data values are shown on the horizontal axis.

Line is horizontal

Answer 2
Answer 4 the pie chart

Related Questions

You send a friend a private message about something personal that is going on with you. Without permission, she forwards your text to everyone on her contact list.

What would you do? Why?

Answers

Answer:

Ask the person to remove the imagePut pressure on the person to remove the message though their peer group and carers.Tell a trusted adult about what is happening and explain the situation, they might have advice tailored to your specific situation.Report it to the social networkIf appropriate then tell the police

Explanation:

Start up a dialogue with the person to find out if they would be willing to take down the message, and find out why they did it as this could prevent a similar situation happening in the future.

Applying pressure though their peer group to conform to your standards is also a good measure to take as they would not want to feel left out.

If any images that you have taken are being shared then you can try to have them taken down under copyright. If personal information was shared then did that breach the laws in your or their jurisdiction?

The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.

Answers

Answer:

The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.

Explanation:

The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.

In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:

Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.

This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.

In addition to assessing whether each of your independent variables has an effect on the dependent variable, a factorial ANOVA also allows you to:
A) use multiple dependent measures in a single analysis.
B) control for a third variable that might be related to your dependent measure prior to
investigating the independent variable of interest.
C) determine whether the effects of one factor depend on the other factor.
D) partition out the variability due to individual differences and the variability due to
measurement error.

Answers

Answer:

C) determine whether the effects of one factor depend on the other factor.

Explanation:

ANOVA is analysis of variance which helps to understand whether the population mean are equal or not. It is statistical model which is used by the businessmen to analyze their business performance. ANOVA also determines whether the effect of one factor are related or dependent on other factor.

~50 points~
how do you merge shapes in powerpoint

Answers

Answer:

Select the shapes to merge. Press and hold Shift to select multiple shapes. The Shape Format tab appears. ...

On the Shape Format tab, click Merge Shapes, and then pick the option you want. The order in which you select the shapes to merge may affect the options shown to you.Explanation:

Everytime a friend thies. to select something in
Windows, she gets a menue popping up Explain
to her what she is doing whing and why
she
cannot
select the objeto

Answers

Answer:

Please write properly your sentence is incomplete

Which line of code will create an instance of the pet class?

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

myPetA = pet('dog', 'Spot'), myPetA = pet(self, 'dog', 'Spot'), myPetA = new pet('dog', 'Spot'), myPetA .pet() = 'dog', 'Spot'

Answers

Answer:

myPetA = pet(self, 'dog', 'Spot')

Explanation:

I mite be wrong

The line of code that will create an instance of the pet class is myPetA = pet (self, 'dog', 'Spot'). Option B is correct.

What is code?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples.

Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code (Cascading Style Sheets)

Therefore Option B is correct.

Learn more about code:

https://brainly.com/question/17204194

#SPJ2

what is a major difference between cyber vandalism and online priacy

Answers

Answer:

There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Answer:

Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Explanation:

a p e x

you would use conditional formatting on a cell when you want to _____

Answers

Answer:

to format a cell based on the value in it

Explanation:

you would use conditional formatting on a cell when you want to format a cell based on the value in it.

Reason -

Conditional formatting allows you to format a cell based on the value in it.

For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.

How would you highlight cells with negative values in it?

You can use conditional formatting.

The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.

Answers

Answer:

(a): Replace

(b): Hyperlinks

(c): Document Inspector

(d): Compatibility checker

(e): Accessibility checker

Explanation:

You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.

However, further explanation is as follows;

(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.

(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.

(c): Document inspector checks hidden data such as personal information.

(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.

(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.

The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;

REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKER

A) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.

B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.

C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.

D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.

E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.

Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179

Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming

Answers

-D. Scamming- like when a telemarketer called you and tries to get you to give personal information

Answer:

its D

Explanation:

ive done this before i remeber i got d

grouping keywords into separate lists for different sections for a website is known as

a. researching
b. comparing
c. organizing
d. brainstorming

Answers

Answer:

C

Explanation:

A is when you surf the web for facts.

B is just finding the difference between 2+ things.

D is when you think of a bunch of ideas firsthand before officially planning anything.

Brainliest? (❁´◡`❁)

help Which of the following triangles can be proven similar through AA?
Question 1 options:

A)

image

B)

image

Answers

A as in Ate my food ya know

1. Let’s assume you have a folder named “stuff” and you wish to make “stuff” readable and writable for the owner, readable by groups and others, how would you do this?



2. Interpret these permissions: dr-xrw--w-

Owner:

Group:

Other:

Answers

Answer:

it is owner

Explanation:

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible

Answers

Answer:

Explanation:

Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.

The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.

To do this, one must:

Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordingly

Cheers

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white

ASKING AGAIN CAUSE I GOT A WEIRD LINK

HTML5 allows web pages authors to place a/an _________ element around a block-level element that contains child elements
a. nav
b. div
c. h1
d. a

Answers

Answer:

A. Nav

Explanation:

....,..........

Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Accountants? Select four options

mathematics
reading comprehension
equipment maintenance
quality control analysis
active listening
writing

Answers

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

O*NET is the short for Occupational Information Network and it is a comprehensive online database that is uniquely designed to provide information about job requirements, staff competencies, work styles, abilities, skills and other resources. Thus, O*NET is the primary source of occupational information for the private and public sector of the United States of America. Also, it helps to identify and develop the work styles, skills, activities and abilities of various occupations of the American workforce.

According to O*NET, some common skills needed by Accountants include the following;

I. Mathematics: an accountant is required to have a good knowledge of different mathematical concepts such as arithmetic, calculus, algebra, statistics, etc., as well as their application to the field of accounting.

II. Reading comprehension: he or she should be able to read and understand the informations contained in all work-related documents.

III. Active listening: accountants are required to pay adequate attention to the informations that are given by the customers without interjections.

IV. Writing: they should be able to compose well-written and clear textual informations about work-related activities.

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice that the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client

Answers

Answer: • Control access to the work area with locking doors and card readers.

• Relocate the switch to the locked server closet

Explanation:

Based on the information given, the security-related recommendations that should be made to this client include:

• Relocate the switch to the locked server closet: Since the organization's network switch is kept in an empty cubicle that is adjacent to the office manager's workspace, it can be easily accessible by anyone and this could lead to an external attack. Therefore, it should be moved to the locked server closet to prevent external attack.

• Control access to the work area with locking doors and card readers- Thus us necessary so that the work area won't be accessible to just anybody.

What is the "thinking work" of the computer? How does it help the computer?

Answers

Answer:

El pensamiento computacional es una forma de pensar que utiliza habilidades propias de las ciencias de la computación, como la descomposición y resolución de problemas, lógica, el reconocimiento de patrones y la abstracción

Explanation:

Un computador sirve para guardar los teléfonos de tus amigos, las tareas del colegio, los trabajos de tu papá y mamá y hasta las cartas que le envías a tu novia.

Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in the file. Which shortcut can Brenda use to find this information quickly?

Answers

Brenda should use the Ctr+F shortcut to quickly find a specific information in the spreadsheet file.

What are some other sites similar to brainly? By similar I mean being able to ask a question and answer them based on categories.

Answers

Answer:

jiskha.com

Explanation:

Answer:

Quora and Yahoo answers are alright

What file format would be required a coworker need to edit a layer in a photoshop file 
-png
-psd
-pdf
-jpeg

Answers

psd, others can’t save photoshop data, only the image as a whole

PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST

Answers

1.His story is told here deep detailed history of the company’s you love coming in everyday.

2.The contribution was the computer
Oct 4 1903-June 15 1995

What should I watch on Netflix (shows for a 14 year old) ?

Answers

Answer:

The flash

Explanation:

Answer:

Im not a big horse fan but loved this show its called free rein

Explanation:

loved itttttt!

What is strFirst? def username (strFirst, strLast): return strFirst + strLast[0] answer = username ('Joann', 'Doe') print (answer) strFirst is a A. Parameter B. Return value C. Function

Answers

The answer is B as in Boy

Professional communication must be objective,
, and unemotional.

technical

informal

rational

Answers

it’s between technical and rational

Answer:

rational

Explanation:

Physical Geography of the Middle East

Answers

Answer:

Explanation:

He’s wright SS7G5 The student will locate selected features in

Southwestern Asia (Middle East).

a. Locate on a world and regional political-physical map:

Euphrates River, Jordan River, Tigris River, Suez Canal,

Persian Gulf, Strait of Hormuz, Arabian Sea, Red Sea, and

Gaza Strip.

b. Locate on a world and regional political-physical map the

nations of Afghanistan, Iran, Iraq, Israel, Saudi Arabia, and

Turkey

HURRY HURRY
HURRY HURRY

when designing a website whom do you need to consider

a. individuals
b. yourself
c. site owner
d. reviewer

Answers

Answer:

reviewer

Explanation: cause they will be the ones using the website

31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure

Answers

Answer:

31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;

a) Something the individual knows;

The Personal Identification Number (PIN)

The password to an account

Answer to a (complete) set of questions

b) Something the individual possesses

An ATM card

A SIM card

Other examples includes;

Physical keys to a lock

Smart cards

Electronic Key-Card used for physical entrance into an apartment

c) Something the individual is (Static biometrics)

The fingerprint

Face recognition

Retina recognition

d) Something the individual does (dynamic biometrics);

Recognition of typing rhythm

Characteristics of the users handwriting

Voice pattern recognition

32) a) Specific account attack

A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password

Countermeasure;

Limiting the number of password guesses

The use of strong passwords having over 8 characters that includes special characters

Use of multi-factor authentication

b) Workstation Hijacking

The attacker takes advantage of an logged-in unattended workstation

Countermeasure;

The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device

c) Password Guessing

Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password

Countermeasure;

The use of a two or more of authentication method also known as a multi-factor authentication MFA

Explanation:

Other Questions
Question 5 Multiple Choice Worth 1 points)(05.02 MC)Find the measure of angle x in the figure below.5259X63O 35O 480 69O 789 Read the following sources and then synthesize three of the sources into a well developed essay that evaluates the most important factors a school should consider before implementing technology into curriculum and instruction. Ensure that you develop a clear position for your essay. Use the sources to develop your position. Avoid summarizing the sources. Provide citations for the sources that you useSources:https://www.kpbsd.k12.ak.us/Workarea/DownloadAsset.aspx?id=35129 Solve each equation by completing the square : Miss Owens has a coupon for 40% off a pair of shoes she pays $111.79 for a pair of shoes and a dress after using the coupon. The dress costs $64.99. Which equation can be solved for x, the retail price of the shoes? Please help Ill give brainlist!!!!!!!Match each inference strategy with its description.Drag the correct tile to each box. Carlos transfers property with a tax basis of $750 and a fair market value of $1,200 to a corporation in exchange for stock with a fair market value of $975 and $75 cash in a transaction that qualifies for deferral under section 351. The corporation assumed a liability of $150 on the property transferred. What is the corporation's tax basis in the property received in the exchange how do people in cuba survive their comand economy? 10 points, giving brainliest to a correct answer. thanks :) In the diagram, AABC ~ ADEF. Find the value of x.A12BCO9C CD3624E27FThe value of x iswhats the value of x? . A rectangle's length is 1 feet shorter than 3 times its width. If we use w torepresent the rectangle's width, use a polynomial to represent therectangle's area in expanded form.area =square feet Is a system software that manages the hardware resources and provides services 5o the application software 100 Points for thisThis series of transformations is performed on a quadrilateral:a dilation by a factor of 4 with the origin as the center of dilationa reflection across the y-axisa 90 counterclockwise rotation about the origina translation 3 units downArrange the functions representing these transformations in the order in which the transformations occur.(The tiles are)f(x, y) = (-4x, 4y)g(x, y) = (4x, -4y)h(x, y) = (4x, 4y)i(x, y) = (4y, 4x 3)j(x, y) = (4y, 4x)k(x, y) = (-4y, -4x)l(x, y) = (-4y, -4x 3) Which part of the sentence is a compound subject?The skin and hair are damaged..are damagedOB.the skinO c. skin and hairODhair are damaged What is the probability of selecting an orange candy Solve for x. PLEASE ANSWER I WILL GIVE BRAINLIEST!! Calculate the percent composition of C in carbon dioxide. A rectangle prism has a length of 10m, a height of 9m, and a width of 15m. What is its volume, in cubic meters (CORRECT ANSWER GETS BRAINLESS!!) Read the excerpt from "Healthy Eating."But no one can ignore the damage being wrought by all this bad eating. More than one out of three adults in the United States -- 37.5 percent -- are obese, according to the Centers for Disease Control and Prevention. Some of the leading causes of death -- heart disease, stroke and type 2 diabetes -- are directly linked to obesity. And childhood obesity has tripled in the last 30 years. With more than a third of kids between 6 and 19 considered obese, the CDC reports, they are at substantially more risk for developing cardiovascular disease, diabetes, bone and joint conditions, and cancer.Which statement best describes the author's argument in this part of the article?Eating a poor diet can have harmful effects on people's health. Eating healthier foods is not as easy as some might think.Children should be required to maintain a healthy diet.Eating habits have changed significantly in recent years. Rewrite this in your own words Given the arithmetic sequence of -21,-6,9,24,... , find an explicit rule for the nth term