1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
4 years ago
7

How do i make the lines on a google sheets bar graph skinnier

Computers and Technology
1 answer:
expeople1 [14]4 years ago
8 0
Go to chart settings, customize, then gridlines section. Thats the only way I know to change them. Please leave a thanks or brainliest, thanks!
You might be interested in
What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
KIM [24]
A denial-of-service (or DoS) attack is where one single computer continuously sends information to a particular IP address in an attempt to overload the network, and take it down. It is called denial-of-service, because you are literally preventing other legitimate users from accessing the server. DoS attacks are not as commonly done professionally today, due to modern technological advances where these servers are able to cope with lots of junk packets from one user, and will often times just block their IP address if the packets are sent too frequently.

A distributed denial-of-service attack is where an IP address is overloaded from multiple users at the same time, often general users like you and I. The way this is accomplished is through botnets, which are simple non-malicious programs that are retrieved through downloading things on the internet, often things like torrents, and they are hard to remove due to them being non malicious. A botnet simply routes internet traffic from the user's computer to the victim's IP address, and due to the nature of a botnet being able to spread to multiple computers very quickly via the internet, DDoS'ing is a much more potentially devastating attack, and loads of junk packets coming from tons of different users compared to one user in a DoS attack is much more likely to take down a server or a network. Additionally, the victim server is unable to distinguish the difference between an attacker and a legitimate user, as the packets are not sent too frequently from each user as to not get IP blocked, but the attack rather relies on the fact that there could sometimes be hundreds of thousands of users all at once, attacking a single IP address.
6 0
3 years ago
What year did the first hovercraft sail on water
UNO [17]
1959!!!!!!!!!!!!!aksksid
7 0
3 years ago
Tom wants to find a number so that the sum of the digits of a two-digit number is 7. When reversing the digits, the number shoul
Rudik [331]
A VARIABLE is used to represent an unknown number.
3 0
3 years ago
Different between internet and email​
pentagon [3]

Answer:

The internet allows you to connect with people and information around the world. The internet is more broad and could include searching things up or message-based websites. Emails is more specific, with it being when you send someone a message (called an email) on a mail website (that allows you to get messages from other people, websites, etc.)

Explanation:

In my answer.

5 0
3 years ago
So i'm trying to figure out why this code wont run can anyone help me
MaRussiya [10]

Answer:

<em><u>use</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>ope</u></em><em><u>ning</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>cl</u></em><em><u>osing</u></em><em><u> </u></em><em><u>tags</u></em><em><u> </u></em>

<em><u>[</u></em><em><u>Tex]</u></em><em><u> </u></em><em><u>[</u></em><em><u>\</u></em><em><u>t</u></em><em><u>e</u></em><em><u>x</u></em><em><u>]</u></em><em><u> </u></em><em><u>ok</u></em>

8 0
3 years ago
Other questions:
  • Which information is considered free for use?
    9·2 answers
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • If a table is designed so that every determinant is a candidate key, then that relation is in ________.
    14·1 answer
  • PLEASE HELP!<br> How do you "brainliest" an answer?
    13·2 answers
  • One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but
    15·1 answer
  • I NEED HELP ASAP!
    6·2 answers
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • g 'write a function that takes as input a list and outs a new list containing all elements from the input
    5·1 answer
  • What are the concerns surrounding 5G cellular networks?​
    6·1 answer
  • Electronic mail is a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!