1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
6

To illustrate a point in a Word document with a simple chart, what command should you select

Computers and Technology
2 answers:
masya89 [10]3 years ago
6 0

for the pennfoster gang its not insert chart > chart type

Zepler [3.9K]3 years ago
3 0
To create a simple chart from scratch in word

Click Insert > Chart.

Click the chart type and then double-click the chart you want.
In the spreadsheet that appears, replace the default data with your own information.

Tip: When you insert a chart, small buttons appear next to its upper-right corner. Use the Chart Elements button to show, hide, or format things like axis titles or data labels. Or use the Chart Styles  button to quickly change the color or style of the chart. The Chart Filters  button is a more advanced option that shows or hides data in your chart.

When you’ve finished, close the spreadsheet.

If you want, use the Layout Options button to arrange the chart and text in your document.




You might be interested in
What is an example of a one-to-many relationship?
jok3333 [9.3K]
Last option o si employee is
8 0
3 years ago
Read 2 more answers
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Write a recursive method to return the number of uppercase letters in a String. You need to define the following two methods. Th
satela [25.4K]

Answer:

<u>Recursive function with two parameters that return the number of uppercase letters in a String</u>

public static int count(String str,int h)//Defining function

{

      if(str.charAt(0)>='A' && str.charAt(0)<='Z')//Checking the characters from A to Z

{

          h++; //incrementing the counter

          if(str.length()>=2){

              return count(str.substring(1),h);//recalling function

          }

      }

      if(str.length()>=2){

              return count(str.substring(1),h); //recalling function

      }

      return h;

  }

This is the recursive function with the name count of return type integer,having parameters str of string type and h of integer type.In this we are checking the characters at a particular position from A to Z.

<u>Recursive function with one parameter that return the number of uppercase letters in a String</u>

public static int count(String str)//Defining function

{

      if(str.charAt(0)>='A' && str.charAt(0)<='Z')//Checking the characters from A to Z

{

          count++; //incrementing the counter

          if(str.length()>=2){

              return count(str.substring(1));//recalling function

          }

      }

      if(str.length()>=2){

              return count(str.substring(1)); //recalling function

      }

      return count;

  }

This is the recursive function with the name count of return type integer,having parameters str of string type .In this we are checking the characters at a particular position from A to Z.

<u>Java program that return the number of uppercase letters in a String</u>

import java.util.*;

public class Myjava{

static int count =0;//Defining globally  

 

public static int count(String str,int h)//Defining function

{

      if(str.charAt(0)>='A' && str.charAt(0)<='Z')//Checking the characters from A to Z

{

          h++;

//incrementing the counter

          if(str.length()>=2){

              return count(str.substring(1),h);//recalling function

          }

      }

      if(str.length()>=2){

              return count(str.substring(1),h);

//recalling function

      }

      return h;

 

  }

  public static void main(String[] args)//driver function

  {

      System.out.println("Enter a string");//taking input

      Scanner scan = new Scanner(System.in);

      String s = scan.nextLine();

      int h =0;

      System.out.println("Counting the Uppercase letters: "+count(s,h));

  }

}

<u>Output</u>

Enter a string  WolFIE

Counting the Uppercase letters: 4

4 0
3 years ago
When you receive a phone call requesting on-site support, what is one thing you should do before you make an appointment?
steposvetlana [31]

Answer:

Ask to the client all the information about the problem and try to solve it by phone.

If its no possible to solve it by phone, then recall all the information about the problem, so the personal doing the on-site supports can pre-diagnose the problem and give an opportunity solution.

4 0
3 years ago
How to get back administrators role form standard user role in window 7?
iris [78.8K]
You click the start thing all the way at the bottom on the left hand corner 
6 0
3 years ago
Other questions:
  • Select the proper ergonomic keyboarding techniques.
    9·1 answer
  • How far is florida from oklahoma?
    10·2 answers
  • . How do you find and remove files whose names contain embedded spaces? What would the Linux command(s) be?
    12·1 answer
  • Haigy Paigy is as a children's invented language which sounds exactly like English, except that "aig" is inserted before the vow
    12·1 answer
  • Can use some help with Computer Networking, with a focus on routing protocols. Part A: Which of these routing protocols is the o
    5·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
  • What are some similarity's between NES console and consoles today
    14·2 answers
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
  • What would the theoretical variance (square of the standard deviation) of the following random values be? rand(Normal(80, 10), 2
    11·1 answer
  • Question2.<br> What are the functions of information technology?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!