1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
4 years ago
13

Kara's teacher asked her to create a chart with horizontal bars. Which chart or graph should she use?

Computers and Technology
1 answer:
cricket20 [7]4 years ago
4 0

Answer:b

Explanation:

You might be interested in
_____ lets you look at two documents at the same time.
jasenka [17]
B. Side by side view
6 0
3 years ago
In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a)
scZoUnD [109]

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

7 0
3 years ago
Write steps: To open an old documents​
myrzilka [38]

Answer:

1.Click.

2.Choose “All Programs”

3.Then select, the “Microsoft Office” folder.

4.Now, open your desired Office application. 5.for e.g Microsoft Word 2010.

6.Once the application opens, select.

Click.

7.Now, select the document you wish to open in Office 2010 and click.

3 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Which function is going to find the lowest value in a range of numbers? MIN MAXAVERAGE COUNT
never [62]
Min is the correct bicycle
8 0
4 years ago
Other questions:
  • What is a common source of connection problems with ethernets?
    9·2 answers
  • Media messages are communicated through which of the following:
    8·2 answers
  • What cannot be performed using windows task manager
    10·1 answer
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    6·1 answer
  • WHAT THE DEFINITION OD ENGINEER. No CHEAT
    5·2 answers
  • Select the correct answer.
    6·2 answers
  • Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last
    15·1 answer
  • Consider the following correct implementation of the selection sort algorithm.
    5·1 answer
  • A. All methods in an interface must be _________________ _________________________.
    5·1 answer
  • Draw
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!