1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
13

Which of the following identifies the patterns used for each data series in a chart?

Computers and Technology
1 answer:
Andreyy893 years ago
5 0
Answer: B. The horizontal and vertical axes
You might be interested in
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
write a pseudo code and flow chart that take a number as input and prints multiplication table up to 10
Troyanec [42]

PSEUDOCODE:

1. DECLARE number: INTEGER

2. DECLARE multiple: INTEGER

3. INPUT number  

4. FOR counter FROM 1 TO 10 DO

5.     multiple <-- number * counter

6.     PRINT number, " * ", counter, " = ", multiple

7. ENDFOR


<em>1. declaring a variable "number" as an Integer</em>

<em>2. declaring a variable "multiple" as an Integer</em>

<em>3. The user inputs the value of number</em>

<em>4. FOR loop where variable "counter" increments by 1 after every iteration</em>

<em>5. sets the value for variable "multiple" as the value of number * counter</em>

<em>6. prints out for example "3 * 1 = 3" and will continue till counter reaches 10</em>

<em>7. Ends the for loop</em>

FLOWCHART below

hope it helped

8 0
2 years ago
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
Lena [83]

Answer:

True is the correct Answer for the above question.

Explanation:

  • Computer security is a security in which data of the computer is secured from the access of unauthorized users. It is primarily achieved to stop the access grant to the unauthorized user.
  • It means that there is an authorization point which decides that the user is authorized or not. If the user is authorized then only he can enter the system otherwise he can not able to enter the system.
  • It helps to secure the data and the data is the important point of the computer system.
  • The question also states the same which is described above. Hence true is the correct answer.

3 0
3 years ago
Write the steps of applying background colour to the document?​
krok68 [10]

Answer:

Select add color

Explanation:

depends the program u are using

7 0
3 years ago
Read 2 more answers
In Microsoft word,when you highlight existing text you want to replace ,you’re in?
Lerok [7]

In Microsoft Word, when you highlight existing text you want to replace, you are in overtype or typeover mode. However, this may also be the case when you are in the Find and Replace tool, where you will type in all the exact phrases or words that will eventually be highlighted and then be replaced in just one click.

5 0
2 years ago
Other questions:
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • Universal Containers has a sales team focused on renewals. They will use many of the same Opportunity fields as other teams, but
    13·1 answer
  • __________ is a very simple form of lossless data compression in which runs of data (that is, sequences in which the same data v
    6·1 answer
  • Image
    9·1 answer
  • The purpose of a software design is to enable programmers to implement the requirements by designating the projected parts of th
    14·1 answer
  • Write programs in python to display “Valid Voter”. (condition : age of person should be
    15·1 answer
  • Describe the different non-printing characters,​
    11·1 answer
  • What does a for loop look for in the sequence of data? Check all that apply.
    6·2 answers
  • What is block chain?
    5·2 answers
  • Hazel has taught herself a variety of computer languages. She enjoys using her knowledge to write the programs for applications
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!