1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
4 years ago
14

To remove an embedded chart, you should _____ it and press the DELETE key.

Computers and Technology
2 answers:
loris [4]4 years ago
7 0
To remove an embedded chart, you should highlight it and press the DELETE key.
choli [55]4 years ago
3 0
Place the mouse cursor over the chart's border. Do not place it within the chart; this may select individual chart elements, such as the legend box or headings. Click the mouse. Excel will select the chart, surrounding it with a thicker, light grey border. Then press delete or backspace. Hope this helped. :)
You might be interested in
What is the value of creating recurring tasks?
scoundrel [369]

Answer:

✔️saves time spent manually creating multiple tasks

Explanation:

I did it on edge

4 0
3 years ago
Read 2 more answers
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
When was the phone Built
quester [9]
The first phone was made in 1854 by <span>Antonio Meucci.

Other inventors like </span>Johann Philipp Reis, <span>Alexander Graham Bell, Elisha Gray, and Thomas Edison reinvented the telephone or enhanced it.</span>
3 0
3 years ago
Read 2 more answers
How is technology used in the voting process?
Semmy [17]
Each person has a electronic chip-enabled ID card, which lets them vote on the internet. The ID card is put into the card reader that is connected the computer. :)
7 0
3 years ago
What is a problem? Give an example of abusiness problem and discuss how acomputer-based information system couldsolve it.
Naily [24]

Answer:

A problem is a challenging task or process that needs resources not available to the individual or group responsible for the task.

An example of a business problem is data analysis.

Explanation:

A business enterprise is driven by profit making. Investing in a business opportunity requires or demands for feasibility study. Without the right computer skills, a company dives into various physical forms of survey like giving questionnaires to potential clients.

This form of survey requires a lot of time and money that should be invested in other assets in the company and the data acquired, sometimes  is not enough to make long term business decisions.

On the other hand, when a spreed sheet application is used (like microsoft excel) by a business data analyst with big data and data visualization skills, large data could be accessed online and analysed of a fast and efficient descriptive and predictive analysis for long term business decisions.

7 0
3 years ago
Other questions:
  • To create an individual version of a slide, you would click
    9·1 answer
  • 50 pts DO NOT ANSWER FOR POINTS
    9·1 answer
  • Plese give three examples of specilized servers.
    13·2 answers
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • 1.) what is the minimum number of bits required to represent -3,997 using 2's complement form?
    6·1 answer
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • Does anyone know a way to skip the videos on Edgnuity?
    15·1 answer
  • Difference between a software package and Integrated software and why users would choose one over the other
    8·1 answer
  • PlZZZZZZZ help will give Brainliest
    8·2 answers
  • I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!