1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
2 years ago
6

What should a pie chart represent?

Computers and Technology
1 answer:
Crazy boy [7]2 years ago
7 0

Answer:

Data that adds up to 100%

Explanation:

You might be interested in
Why is it important to know who reviews the information posted on a Web site?​
Aleks [24]

.bordered {    width: 200px;    height: 100px;    padding: 20px;    border-width: 6px;    border-color: pink;    border-style: dashed solid double;  }Why there is a need of concrete and coherent presentation ? ( class 9 ) {information technology}

5 0
3 years ago
hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
shusha [124]

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

7 0
3 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
To share a server folder, access the ____ tab in the folder properties dialog box and click the share button (or from the window
anygoal [31]
Oh lord I have no idea :/ I suck at this yeah idk
5 0
3 years ago
Louis has entered a column of expense values. What feature can he use to insert the total expenses at the end of the column?
vovangra [49]
I think it’s B tho I’m not really sure
5 0
3 years ago
Other questions:
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • Under the assumption that there exists an unknown Turing machine encodableinc1bits that decides3-SATis inO(n10) time, give imple
    7·1 answer
  • What would be a reason for using a workstation rather than a personal computer?
    7·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • 2 ways to make your computer work faster ( please help asap )
    6·1 answer
  • What is the behavior of an element with static positioning in regard to the page layout?
    12·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
    10·2 answers
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • How to create drop down list in excel with multiple selections.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!