1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
7

For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s

hows what the progress looks like over time. Which application is best suited for this effort?
Question 1 options:



Writer or Word



Calc or Excel



Impress or PowerPoint



none of these
Computers and Technology
2 answers:
Naya [18.7K]3 years ago
8 0
Calc or Excel is the application best suited for this effort.
Bingel [31]3 years ago
7 0

I took the quiz, its excel. also go here if your taking computer literacy for 2.04. All the answers are there. https://quizlet.com/189776981/204-computer-lit-flash-cards/  


Mark me brainliest?

You might be interested in
You need to trace the route that a cat 6 utp cable takes through the ceiling and walls of your building. which tool should you u
Veronika [31]

We should use Tone Generator to to trace the route that a cat 6 utp cable takes through the ceiling and walls of your building. The tone generator can be used to test the speakers and their electrical wiring, as well as to find the frequency of hearing loss and tinnitus.

A sinusoidal signal is produced by a tone generator at the selected frequency. Can be used as a learning tool for physics as well as to test audio equipment like speakers or earbuds. You may also test the frequency range of tablet speakers.

Learn more about tone generator brainly.com/question/28017740

#SPJ4

4 0
1 year ago
Stephen needs to insert a field into a building block that will contain variable data. Which keyboard shortcut can he use to tog
STatiana [176]

Answer:

Alt + F9

Explanation:

The Keyboard shortcut that Stephen can use use to toggle between data and the field codes is Alt + F9. This is in regards to Microsoft Word Fields for both Windows and Mac operating systems. Although ALT + F9 will toggle between these two but for all the fields within the document. If you want to toggle between a single or various fields it would be Shift + F9.

8 0
3 years ago
Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
grin007 [14]

The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

<h3>What is this cloud about?</h3>

A hybrid cloud is known to be a system or a model which is said to be a form of a private cloud that is linked with public cloud infrastructure, and it is one that tends to give room for an organization to act workloads in two environments.

Note that In this model, the public cloud is known to be one that is seen and it is one that becomes an extension of the private cloud to make a single, uniform cloud.

Hence, The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

Learn more about hybrid cloud from

brainly.com/question/27838623

#SPJ1

7 0
1 year ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
I will give free brainiest if you guess my favorite car among these 3
erastovalidia [21]

Answer:

LaFerrari

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • "the file that specifies how netbeans builds and deploys the application when you run the application is called the ____________
    8·1 answer
  • The title of a Web page is the text that appears on the title bar and taskbar of the browser window. *
    13·1 answer
  • Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
    15·1 answer
  • What does "CPU" stand for?
    15·2 answers
  • What is a computer OPERATING SYSTEM?
    5·1 answer
  • How to open a new word proccessing document
    9·1 answer
  • What is food technology​
    5·1 answer
  • Can you predict what changes will come to data storage in the next decade? 
    12·1 answer
  • Complete the following sentence by choosing the best answer from the options listed below.
    11·2 answers
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!