1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
10

Which of the following sets of data would be represented best in histogram?

Computers and Technology
2 answers:
Crazy boy [7]3 years ago
8 0
The answer is b. i think it is b because i did the calculations
nexus9112 [7]3 years ago
3 0
I think it is B I am pretty sure of it
You might be interested in
You are designing a VPC for a small application. It will operate in a private subnet and needs internet access to software updat
lilavasa [31]

Answer:

Refer below.

Explanation:

VPC, Subnets, Route Table(s), Nat Gateway, and Internet Gateway. These are the least required services to provide internet access to a private EC2 instance. NAT gateway requires an internet gateway.

3 0
4 years ago
Each modern computer system is equipped with a compiler. ___ .
oksano4ka [1.4K]
False, modern computers don't need to compile direct source code from users. There are DUIs (direct user interface) that allows the user to interact with a computer without coding.
6 0
4 years ago
Read 2 more answers
Which correctly shows the configuration of boxes in the View tab that allow the indents to be changed?
den301095 [7]
The correct answer is B. Got it right on my review
4 0
4 years ago
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
How to combine multiple documents into one pdf.
sergeinik [125]

Answer:

How to combine and merge your files into one PDF: Open Acrobat DC to combine files: Open the Tools tab and select "Combine files." Add files: Click "Add Files" and select the files you want to include in your PDF. You can merge PDFs or a mix of PDF documents and other files.

Explanation:

8 0
3 years ago
Other questions:
  • Design a new Triangle class that extends the abstract
    13·1 answer
  • Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen
    5·1 answer
  • How to hard reset a iphone 7 without computer
    8·2 answers
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Is a bottle opener considered an engineered item?
    12·1 answer
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • Which devices are used in networking
    15·1 answer
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
    9·1 answer
  • At year end, Clean123 Inc. has 45500 in cash, 55000 in accounts receivable, 54400 in service equipment, 550 in prepaid insurance
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!