1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
4 years ago
15

You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha

t percentage each category represents. Which type of chart would be best for this purpose?
Computers and Technology
2 answers:
aliya0001 [1]4 years ago
7 0

Answer:

Pie chart.

Explanation:

The best chart to use is a pie chart. A pie chart is a circular statistical diagram used to represent variables and their measurement in a data distribution. A variable is an element that has a value. The variables here are running, lifting weights, yoga and stretching. A pie chart can be drawn on Microsoft Excel. First, you input the individual variables and their percentages in an excel chart. Then use the tools on the excel page to draw the pie chart. The pie chart is in slices with each portion indicating the different percentages for each variable. The sizes of the pie vary according to the difference in percentages for each variable.

Harrizon [31]4 years ago
5 0

The best chart to see the data distribution for the exercise routine would be a pie chart. Using Microsoft Excel, you can input each data point you have for all you exercise routine category, and generate a pie chart which will show you the percentage for each category in comparison to the total.


You might be interested in
What kind of material is used for DRAM (dynamic random-access memory)?
Alex Ar [27]

The kind of material that is used for DRAM (dynamic random-access memory) is metal-oxide-semiconductor.

<h3>What is DRAM?</h3>

DRAM was invented in 1968. It is a type of RAM used in modern computers and laptops. It is a type of random access memory. Its name is dynamic random access memory.

Metal-oxide-semiconductor is used in making the transistors and capacitors of the DRAM, which are used to store the data. They hold a bit of the data in these capacitors and transistors.

Thus, the material that is used is metal-oxide-semiconductor to make DRAM (dynamic random-access memory).

To learn more about DRAM, refer to the link:

brainly.com/question/20216206

#SPJ1

3 0
1 year ago
An organization needs to maintain data files of its employees in the form of tables. They also need to access and update over th
MrMuchimi
Database software seems to be the most logical.
5 0
3 years ago
Read 2 more answers
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices. True or false?.
kati45 [8]

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices is a True statement.

<h3>Are embedded computers small?</h3>

Embedded computers are known to be machine that is said to be in smaller form  of their factor motherboards. An example is Mini-ITX .

Note that there are lot of Different forms of  embedded computers that has their specific innovative enclosure designs.

Therefore, based on the above, Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices is a True statement.

Learn more about Embedded computers  from

brainly.com/question/9706390

#SPJ1

5 0
2 years ago
Which of the following is an example of cyberharassment?a. Someone sends you a credible threat that they are "out to get you."b.
Marta_Voda [28]

Answer:

D

Explanation:

In order for it to be considered harassment, it has to happen on more than one occasion.

7 0
3 years ago
How are phishing, ransomware and distributed- denial of service attack alike and different?
Aleks04 [339]

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

8 0
3 years ago
Other questions:
  • An ______ is a simplified image. [4 letters]​
    7·2 answers
  • Henry Ford would have been most interested to bring which modern innovation to his automotive factories?
    5·2 answers
  • Modern ancestor of the typewriter
    12·2 answers
  • According to the Bureau of Labor Statistics, how
    14·1 answer
  • class student_record { public: int age; string name; double gpa; }; Implement a void function that has five formal parameters: a
    15·1 answer
  • What is microsoft certification?
    8·1 answer
  • Which of the following is based on the visibility and location of an object’s features?
    15·1 answer
  • Dione has created a PowerPoint presentation that has several common nouns, names of products, etc. He is
    12·2 answers
  • Cual es el procedimientos para asistir en el transporte publico a personas discapacitadas
    6·1 answer
  • _______ refers to the use of gps or rfid technology to create virtual boundaries that enable software to trigger a response when
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!