1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
9

for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar

ing multiple sets of data d.only for hand drawn charts
Computers and Technology
2 answers:
dexar [7]3 years ago
8 0
The answer should be A. 
Tju [1.3M]3 years ago
8 0

the answer is C.

trust me i took the test!!!

k12

good luck

You might be interested in
The U.S. continues to become more dependent on the global domain within the information environment consisting of the interdepen
cupoosta [38]

Answer:

cyberspace

Explanation:

It is the notional environment in which communication over computer networks occurs.

5 0
3 years ago
Blender questions
Tamiku [17]
<span>14. A mesh represents a(n) _____ object if its faces enclose a positive and finite amount of space. (1 point)

odd

connected

simple

convex



15. Which of the following is the 3-D view port? (1 point)

the standard layout used for new files

the polygon viewing on the default screen

straight line segments connecting two vertices

a single static image in 3-D

The answer for number 1, should be:
SOLID
</span><span>A mesh represents a solid object if its faces enclose a positive and finite amount of space
</span>
The answer for the second question is:
a single static image in 3-D
4 0
3 years ago
Read 2 more answers
If Count = 1 and X = 3, what will be displayed when code corresponding to the following pseudocode is run? Do Set Y = Count + X
kirill115 [55]

Answer:

4 5 6

Explanation:

Since there is a do-while loop, you need to check the values for each iteration until the condition (Count <= X) is not satisfied.

First iteration ->  Count = 1 and X = 3, Y = 1 + 3, Write Y -> 4

Second iteration ->  Count = 2 and X = 3, Y = 2 + 3, Write Y -> 5

Third iteration ->  Count = 3 and X = 3, Y = 3 + 3, Write Y -> 6

After the third iteration count is equal to 4 and X is equal to 3. That is why loop ends.

3 0
3 years ago
Organ transplants are rarely successful.
Maurinko [17]

False......................

6 0
3 years ago
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new val
ankoles [38]

There is block cipher kind of mode of operation. The block cipher mode of operating requires that both the message sender and receiver  is exchanged is the (CTR) Counter.

<h3>What is the Counter (CTR)?</h3>

This is known to be a common block cipher mode of operation. It often needs that both the message sender and receiver to have a kind of access a counter, that helps to computes a new value whenever a ciphertext block is been exchanged.

The disadvantage of CTR is known to be the fact that it needs a synchronous counter necessary for both the sender and receiver.

Learn more about  block cipher mode from

brainly.com/question/9979590

7 0
2 years ago
Other questions:
  • un diagrama de flujo donde se gana una partida de ajedrez teniendo en cuenta los movimientos de la otra persona
    8·1 answer
  • Convert the following numbers. (Please show all steps; no marks will be awarded if no steps are shown) [1.5 x 4 = 6 marks]
    11·1 answer
  • Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
    15·2 answers
  • Which of the following statements best
    9·1 answer
  • Select the best option that should be considered when preparing these images to.be used for the web
    7·1 answer
  • Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
    12·1 answer
  • The graph of which function has an axis of symmetry at x=-1/4​
    15·1 answer
  • The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
    15·2 answers
  • what is a program or collection of programs that enable a person to manipulate a visual images on a computer​
    14·1 answer
  • How can I call moderator in braily app ???
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!