1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
11

What would be a situation in which you could use an Excel chart to present your data?

Computers and Technology
2 answers:
MA_775_DIABLO [31]3 years ago
8 0
<h2>Answer:</h2>

<u>Excel chart can be used to determine the Required ingredients for three different kinds of cake</u>

<h2>Explanation:</h2>

Excel charts are used in Excel to communicate data graphically. They can also be used to show comparison between quantities or to differentiate the amount of ingredients in a recipe. Since the first options telling us about the different amount of ingredients so excel chart can be used to show those values in graphical form.

Minchanka [31]3 years ago
5 0
The second one is correct
You might be interested in
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
Which of the following boxes should replace question mark
Rus_ich [418]

Answer:

There is nothing please put it then i will edit this answer.

Explanation:

6 0
3 years ago
If you are writing an algorithm and you aren’t confident that you understand the problem, what can you do?
Zigmanuir [339]

Answer:

divide it into smaller pieces

Explanation:

Usually, the main reason a programmer does not understand a problem fully is that there is too much information. The best way to try and fully understand a problem is to divide it into smaller pieces. Start off by answering the question what is the expected output for an input. Then divide each individual issue within the problem. This will allow you as a programmer/developer to create an individual solution for each individual issue within the problem and then test to make sure that the input gives the correct output.

8 0
3 years ago
Fredrico has to lead a training for his company. He wants to include a visual element to help engage his audience. What type of
andreyandreev [35.5K]
Presentation software is probably his best option. It would allow him to present visual and audio supplements to his audience.
8 0
3 years ago
Read 2 more answers
Need answer ASAP
Alinara [238K]

both software coding and testing occurs during Engineering phase

6 0
2 years ago
Other questions:
  • Which of the following is important to do when downloading a game to your
    8·1 answer
  • An array UnsortedInt consists of integers in random order. Another array SortedInt consists of a sorted list of integers.
    13·1 answer
  • The one place where c++ allows aggregate operations on arrays is the input and output of c-strings.
    8·1 answer
  • What do radio telescopes use to gather and focus radio waves?
    14·2 answers
  • Draw a project network from the following information. What activity(ies) is a burst activity? What activity(ies) is a merge act
    7·1 answer
  • What natural resource are available on the coast but not somewhereelse
    13·1 answer
  • Select the correct text in the passage,
    10·1 answer
  • When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible doma
    12·1 answer
  • How can I call moderator in braily app ???
    5·1 answer
  • For angular how can we set up th edatabse.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!