1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
9

for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar

ing multiple sets of data d.only for hand drawn charts
Computers and Technology
2 answers:
dexar [7]3 years ago
8 0
The answer should be A. 
Tju [1.3M]3 years ago
8 0

the answer is C.

trust me i took the test!!!

k12

good luck

You might be interested in
Computer identity theft differs from theft in the real world in what major way?
CaHeK987 [17]

Answer:

The answer is B

5 0
2 years ago
Read 2 more answers
You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while se
wolverine [178]

The options are missing from the question,below are the options to choose from;

A) incorrect (or missing) routes in a routers routing table

B) incorrect DNS configuration on the PC

C) incorrect default gateway configuration on the PC

D) duplicate IP addresses on your LAN

Answer: The correct answer to the question is option A

INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.

Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.

5 0
3 years ago
30 points! Help me out, please! I need help with this!
White raven [17]

Answer:

Both are touchscreen.

Tablets are seen more as an entertainment device (tv, games, etc.).

Phones are smaller, and used more for everything; you can take phones anywhere you go, whereas tablets are more difficult to transport.

7 0
3 years ago
5 potential Challenges of Collaborative Tools
Mice21 [21]

You have most probably used some variation of collaboration tools like Slack, Basecamp, and Trello at some office gig. Working within a few of these tools might sometimes have a lot of problems.

1. Forced collaboration on Employees.

Some companies may sometimes fail to notice that some employees do not want to constantly have real-time notifications popping up every minute. They may fail to recognize what is important and what is not and end up wasting money on these tools.

2. The roll-out

These tools might represent awesome business productivity growth but sadly, a huge portion of the employees will be like, what is this? If management decides to use collaboration tools, they should explain what they are and the purpose of using them.  

3. Lack of User Training.

Organizations that do not offer strong training programs for these tools can see problems arise very quickly. This could help gain insight on whether or not employees want to collaborate in the first place.

4. The “reduction in email” argument

People might positively accept these tools and become a bit connected. However, the downside to it is that, whenever something big is due, everyone falls back to email. Users need to seriously use these tools  across a variety of contexts.  

5. The overloading of documents and files.

If collaboration tools are rolled out for the sake of process documents and burdensome tracking sheets, people might head right back to their email and full meeting schedules and collaboration will die in the flood.  

5 0
2 years ago
Please tell fast plzzzzzzzzzz​
Svetlanka [38]

Answer:

<!DOCTYPE html>

the declaration ye

Explanation:

probably it ye

3 0
3 years ago
Other questions:
  • You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
    8·1 answer
  • Which of the following is the BEST example of a strong password. Question 8 options: brian12kate5 chEwbAccAp!zza w3st! 123abccba
    10·2 answers
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • Match the job titles to the tasks
    11·2 answers
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • Plz go sub 2 "Shyy096" he is a 11 y/o boy and makes music fortnite vids, it would rly help him if u subscribe cuz he only has 8.
    10·1 answer
  • 7. Write a Qbasic program to read the value
    8·1 answer
  • Which of the following is a property of TCP?
    8·1 answer
  • Question 2 of 10
    15·1 answer
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!