1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
4 years ago
15

You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha

t percentage each category represents. Which type of chart would be best for this purpose?
Computers and Technology
2 answers:
aliya0001 [1]4 years ago
7 0

Answer:

Pie chart.

Explanation:

The best chart to use is a pie chart. A pie chart is a circular statistical diagram used to represent variables and their measurement in a data distribution. A variable is an element that has a value. The variables here are running, lifting weights, yoga and stretching. A pie chart can be drawn on Microsoft Excel. First, you input the individual variables and their percentages in an excel chart. Then use the tools on the excel page to draw the pie chart. The pie chart is in slices with each portion indicating the different percentages for each variable. The sizes of the pie vary according to the difference in percentages for each variable.

Harrizon [31]4 years ago
5 0

The best chart to see the data distribution for the exercise routine would be a pie chart. Using Microsoft Excel, you can input each data point you have for all you exercise routine category, and generate a pie chart which will show you the percentage for each category in comparison to the total.


You might be interested in
A student will not be allowed to sit in exam if his/her attendance is less than 75% .
Oxana [17]

Answer:

Sorry, this is too vague to understand as you don’t have any charts, graphs, or anything

Explanation:

6 0
3 years ago
When you call one of the Scanner class's methods to read a primitive value, such as nextInt or nextDouble, and then call the nex
Rzqust [24]

The answer is true.

Explanation:

The scanner class's methods are the methods in java.util, which allows the user to read values of various types. If the nextLine is issued after a numeric read and the numeric value is at the end of the line, nextLine returns the empty string.

The problem occurs when you click the enter key which is a new line \n character. nextInt() has only the integer but skips the new line \n.

To solve this problem, you have to add the input.nextLine() after reading the int it will consume the \n.

Hence, make input.nextLine(); call after input.nextint(); which reads till end of life.

5 0
4 years ago
Caroline is building an expert system for wartime defense. Which of these is true about the system she is building?
Alik [6]

Answer:

The true statement about the system she is building is;

B. The expert system can make autonomous decisions with no human intervention

Explanation:

A computer program known as an expert system is a system that emulates the human or organizational, decision making, judgement and behavior that has gained the knowledge and experience of an expert by analyzing information categories using if then rules of artificial intelligence technologies and not procedural code

Therefore, an expert system of wartime defense can make decisions on its own without the input of a human administrator

5 0
3 years ago
Suppose a file system can have three disk allocation strategies, contiguous, linked, and indexed. We have just read the informat
otez555 [7]

Answer:

Since we are using three disk allocation strategies,continuous linked and indexed,therof to process and read allocation strategies we need 99830 disk blocks.

6 0
4 years ago
Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
Afina-wow [57]

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

7 0
4 years ago
Other questions:
  • How can you create balance to your drawing using only grayscale values?
    12·1 answer
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • If you are creating a new document that you know will be turned into a Web page, it is a good idea to start in _____.
    8·1 answer
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • Omar is preparing to deliver a presentation to his class. It is about a program to collect samples from an asteroid that has bee
    13·1 answer
  • Select the correct answer from each drop-down menu.
    10·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • Hue purchased 50 shares of stock on April 24, 2019. The price skyrocketed, so she decided to sell the stock in April of 2020. Wh
    12·1 answer
  • what motivators should the action section of your sales message include? check all that apply. a satisfaction guarantee a proof
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!