1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
9

) A popular PivotChart that is used in Access is (Points : 4) column.

Computers and Technology
1 answer:
Sidana [21]3 years ago
4 0

Answer: D) All of the above

Explanation:

 Pivot chart basically provide the graphical representation of the information and the data in the pivot table of the report. It is also known as associative pivot chart graph report. By using the pivot chart we can easily represent the data in the segments.

It includes all the access that is column, line and pie so that it provide an efficient representation of the numerical data. Pivot chart is one of the important tool that specifically provide analytical data or information.

You might be interested in
Type the correct answer in the box. Spell all words correctly.
marissa [1.9K]

Answer:

GIF

Explanation:

The Graphic Interchange Format (GIF) is the image format that supports small animations made out of sequential frames played in sequence and possibly in loops, depending on the parameters saved in the file.

The Animated GIFs are seen everywhere these days on social medias, where people use them to express their emotions in bigger and  more elaborate ways then emoticons.

6 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
Can someone please answer this for me I will answer one of yours.
julsineya [31]
4 is preview i think.
4 0
4 years ago
For most people, the most effective way to save is:
oksian1 [2.3K]
I would say it's by creating a spending budget. 
3 0
3 years ago
Threads in the ____ are idle, pending availability of a cpu.
slava [35]
Run queue. They can also be waiting on I/O.
7 0
4 years ago
Other questions:
  • The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
    13·1 answer
  • Which steps would you take to determine how much an employee should be paid? Select all that apply.
    9·1 answer
  • I like potatoes do you like potatoes
    15·2 answers
  • Which one of the following analog VOM ranges would be selected to measure a DC
    13·1 answer
  • Fill in the blank <br>computers are closed in......​
    6·1 answer
  • If you used a peach as a model of an animal cell, what would the peach's skin represent? A.nucleus B.cell wall C.cytoplasm D.cel
    10·2 answers
  • Ok I'm sorry to all those who are trying to messasge me on brainly my brainly inbox is not working and hasn't work since the beg
    12·2 answers
  • Which of the following are pointers?
    9·1 answer
  • Before a computer can use a router, what configuration information must it be provided?
    9·1 answer
  • List and describe with details at least three approaches to selecting processes from priority-based multi-level queues.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!