1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
4 years ago
6

When adapting graphs for slides,

Computers and Technology
1 answer:
mojhsa [17]4 years ago
7 0
I would say don't use more than 8-9 graph lines

You might be interested in
Suppose you have 9 coins and one of them is heavier than others. Other 8 coins weight equally. You are also given a balance. Dev
sergey [27]

Answer:

Following are the algorithm to this question:

Find_Heavier_Coins(Coin[9]):

   i) Let Coin[] Array represent all Coins.  

   ii) Divide coin[] into 3 parallel bundles and each has three coins, example 0-2, 3-5, 6-8 indicate a1 a2 a3

   iii) Randomly select any two bundles and place them in balance [say a1 and a2]

   iv) If Weigh of a1 and a2 has same:

           // checking that if a3 has heavier coin

           Choose any two 6-8 coins and place them onto balance [say 6 and 8]

           If those who weigh has the same weight:

               Third coin is coin heavier [say 7]

           else:  

               The coin [6 or 8] is the one which is heavier on the balance

       else:

           //The coin has the package which would be heavier on the balance [say a1]

           Select any two coins on balance from of the heavier package [say 0 and 1]

   If they weigh the same weight:

       Third coin is coin heavier [say 2]

   else:

       The coin that is heavier on the balance is the [or 0]

Explanation:

In the above-given algorithm code, a method Find_Heavier_Coins is declared which passes a coin[] array variable in its parameters. In the next step, if conditional block is used that checks the values which can be described as follows:

  • In the first, if block is used that checks a1 and a2 values and uses another if block in this it will print a3 value, else it will print 6 to 8 value.
  • In the another, if the block it will check  third coins value and prints its value if it is not correct it will print first coin value
4 0
4 years ago
When the logging and managing information flow between management hosts and the managed devices travels on a dedicated managemen
kompoz [17]

What must be considered is the number of IPs that are allowed to access the management network.

We can arrive at this answer because:

  • During the management of information flow, it is necessary to guarantee the security of the system, preventing intruders from attacking.
  • This can be done by restricting authorized IPs to access the management interface.
  • This type of security measure is often neglected in systems that use a dedicated management network, as this type of network can only be accessed by a single device in the same VLAN.

However, the IPs restriction must be considered even in this system, as there are software that can provoke invasions that cause the leak of shared information.

You can find more information about software here:

brainly.com/question/24032221

4 0
3 years ago
Page UND
DochEvi [55]

Answer:

d. All of the above

Explanation:

Suppose a student needs help regarding any technical issue like computer is not working, or he/she cannot open the file, or any problem with a link, then he can ask your facilitator for help, or he can call or email the support center, or he can look for help in the student resources section as well of the course. Hence, all the options are correct. And hence the correct answer is d.

6 0
4 years ago
What option defines green computing?
Alina [70]
Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact.
8 0
3 years ago
True or false? A process flow diagram is used to identify the steps an employee takes to complete a job
marissa [1.9K]
The answer is false because……….
8 0
3 years ago
Other questions:
  • 35 points please help!
    13·1 answer
  • 3. What is the purpose of the conclusion in an expository essay? (1 point)
    8·2 answers
  • Which statement are true regarding mainframe computers
    13·1 answer
  • The tax calculator program of the case study outputs a floating-point number that might show more than two digits of precision.
    7·1 answer
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • What is good prossesser
    15·2 answers
  • Write a recursive function, displayFiles, that expects a pathname as an argument. The path name can be either the name of a file
    6·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate secur
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!