1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
12

describe how t - charts and star charts can be used to organize information into cause and effect relationships

Computers and Technology
2 answers:
laiz [17]3 years ago
7 0

Describe how T-charts and Star Charts can be used to organize information into cause and effect relationships.

Answer:

These two charts show both cause and effect relationships. T-charts, for instance, compares one word and contrast the other. It can help graphically make decisions by comparing resulting advantages and disadvantages or explaining the strengths and weaknesses of a piece of writing. The same case goes to the use of a star chart. A star chart is a map of the night sky that astronomers use to divide into grids for comparison. It turns the night sky into a readable map that helps humans travel the world just by using the stars.

Explanation: I GOT <u>100%</u>

soldier1979 [14.2K]3 years ago
6 0

These two charts show both cause and effect relationships. T-charts, for instance, compares one word and contrast the other. It can help graphically make decisions by comparing resulting advantages and disadvantages or explaining the strengths and weaknesses of a piece of writing. The same case goes to the use of a star chart. A star chart is a map of the night sky that astronomers use to divide into grids for comparison. It turns the night sky into a readable map that helps humans travel the world just by using the stars.

You might be interested in
The part of the computer that contains the brain or central processing unit is also know as the
mart [117]
The part of the computer that contains the brain is called the motherboard.
3 0
3 years ago
Read 2 more answers
I need help!! I decided to go back to college this year and am taking Intro to Logic and Programming. I have an assignment due t
Artist 52 [7]

Answer:

Monday Video: 5.4.20 Section 18.5

Work due: 18.5 Worksheet

CW

Tuesday Video: 5.5.20 Section 18.6

Work due: 18.6 Worksheet

HW

Wednesday Video: 5.6.20 Section 18.7

Work due: 18.7 Classwork

CW

Thursday Video: 5.7.20 Section 18.7

Work due: 18.7 Homework

HW

Friday Video: 5.8.20 Section 18.5-18.7

Work due: Textbook page 615 #5-19 (not #13)

HWaccuracy

Explanation:

7 0
3 years ago
Select the correct answer.
TiliK225 [7]

A group of reviewers with your highest ratings

3 0
3 years ago
HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
joja [24]

The primary key is the block under the Movie ID column.

The Field is the Movie Name.

The Record is the block that goes with the first row of data.

The Table is the bottom block in the center.

4 0
3 years ago
Read 2 more answers
#Write a function called "in_parentheses" that accepts a
zimovet [89]

Answer:

import regex as re

def in_parentheses(a_string):

   regeX = re.compile(".*?\((.*?)\)")

   result = re.findall(regeX, a_string)

   return str(result).replace("[","").replace("]","")

print("test 1: "+in_parentheses("Open ( only"))

print("test 2: "+in_parentheses("This is a sentence (words!)."))

8 0
3 years ago
Other questions:
  • Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
    11·1 answer
  • Variable names may contain spaces and punctuation symbols. True False
    15·1 answer
  • Which of the following is the main consideration when choosing an appropriate outlet box?
    7·2 answers
  • Most browsers allow you to maintain your most frequently visited websites. what is this called? Special place holder, secret lis
    6·2 answers
  • Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
    11·1 answer
  • What will you see on the next line?
    6·2 answers
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure
    13·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
  • Please solve this in JAVA<br><br> Please see the attachment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!