1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
10

Which does the histogram resemble the most?

Computers and Technology
1 answer:
ch4aika [34]3 years ago
3 0

The best and most correct answer among the choices provided by your question is the third choice or letter C. A bar graph resembles histogram the most.

A histogram<span> is a graphical representation of the distribution of numerical data. It is an estimate of the probability distribution of a continuous variable (quantitative variable) and was first introduced by Karl Pearson.
</span>
I hope my answer has come to your help. Thank you for posting your question here in Brainly.


You might be interested in
MIPS assembly language
maria [59]

Answer:

the answer is a t t i c

Explanation:

7 0
3 years ago
From the time users first visit a new website, or view a new media piece, how much time will they spend on the site before they
vesna_86 [32]

Answer:

D

Explanation:

They will stay as long because they want to explore and find out new things on that site and if possible compare with the other sites they have seen

7 0
2 years ago
How do i find the greatest common factor of two numbers?
Lilit [14]
You can list the numbers . keep listing them till you find the same numbers
8 0
3 years ago
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName, and who
never [62]

Answer:

Python Program:

if __name__ == '__main__':

   a = input("Enter Name: ")

   b = a.split()

   print(b[2] + ',' , b[0], b[1][0])

Explanation:

The input function will be used to prompt user to enter the name of the person. The person's name will be stored in variable a.

Let us assume that the user entered a name mentioned in the example, which is Pat Silly Doe, Now variable a = 'Pat Silly Doe'.

The function a.split() is used to split a string into a list. The splitting (by default) is done on the basis of white-space character. Therefore, a.split() will give a list

['Pat', 'Silly', 'Doe']

which will be later on stored in variable b.

We can use the subscript operator [] to access the values in a list. Suppose if we have a list a, then a[i] will give us ith element of a, if i < length of a.

Finally, we print the answer. b[2] will give us the last name of the person. We append a comma using '+' operator. b[0] will give us the first name. b[1] will give us the middle name, but since we only need one character from the middle name, we can use another subscript operator b[1][0] to give us the first character  of the middle name.

Note: Characters of strings can be accessed using subscript operator too.

4 0
4 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
Other questions:
  • Describe any four rights of users of information systems.
    8·1 answer
  • Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
    5·1 answer
  • ¿Que es lo que hace tan especial a la tarjeta de video NVIDIA 1080Tt?
    15·1 answer
  • On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way poss
    12·1 answer
  • Which of the following optical storage media has the greatest storage capacity?
    10·1 answer
  • In MLA formatting, which of the<br> following is correct?
    6·1 answer
  • How to shutdow computer
    7·1 answer
  • Brian needs to see the space available to insert content on a slide in his presentation which feature of the presentation should
    10·1 answer
  • How do you enlarge an image to see more detail on it? (1 point)
    14·2 answers
  • Describe the necessary Java commands to create a Java program for creating a lottery program using arrays and methods.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!