1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dolphi86 [110]
3 years ago
14

To display the Color gallery, with the graphic selected, click the Color button in the ____ group on the PICTURE TOOLS FORMAT ta

b.

Computers and Technology
1 answer:
Wittaler [7]3 years ago
6 0

Answer:

shape styles

Explanation:

when you select the chart, a contextual tab will appear at the top right of your title bar (chart tools) in the sub tab creation there is a styles chart

You might be interested in
Find the inverse function of f(x)= 1+squareroot of 1+2x
Svetllana [295]

Answer:

Therefore the inverse function of  f(x)=1+\sqrt{1+2x} is \frac{x^2-2x}{2}

Explanation:

We need to find the inverse of function f(x)=1+\sqrt{1+2x}

Function Inverse definition :

\mathrm{If\:a\:function\:f\left(x\right)\:is\:mapping\:x\:to\:y,\:then\:the\:inverse\:functionof\:f\left(x\right)\:maps\:y\:back\:to\:x.}

y=1+\sqrt{1+2x}\mathrm{Interchange\:the\:variables}\:x\:\mathrm{and}\:y

x=1+\sqrt{1+2y}

\mathrm{Solve}\:x=1+\sqrt{1+2y}\:\mathrm{for}\:y

\mathrm{Subtract\:}1\mathrm{\:from\:both\:sides}

1+\sqrt{1+2y}-1=x-1

Simplify

\sqrt{1+2y}=x-1

\mathrm{Square\:both\:sides}

\left(\sqrt{1+2y}\right)^2=\left(x-1\right)^2

\mathrm{Expand\:}\left(\sqrt{1+2y}\right)^2:\quad 1+2y

\mathrm{Expand\:}\left(x-1\right)^2:\quad x^2-2x+1

1+2y=x^2-2x+1

\mathrm{Subtract\:}1\mathrm{\:from\:both\:sides}

1+2y-1=x^2-2x+1-1

\mathrm{Simplify}

2y=x^2-2x

\mathrm{Divide\:both\:sides\:by\:}2

\frac{2y}{2}=\frac{x^2}{2}-\frac{2x}{2}

\mathrm{Simplify}

y=\frac{x^2-2x}{2}

Therefore the inverse function of f(x)=1+\sqrt{1+2x} is \frac{x^2-2x}{2}

4 0
3 years ago
Which protocol can be used to send ipv6 packets over an ipv4 network?
Mariana [72]
There are three tunneling protocols. They are ISATAP, <span>teredo and 6TO4</span><span />
4 0
3 years ago
When you gather primary or secondary data, what part of the market information management process are you participating in?
Umnica [9.8K]

Answer:

Heyyyooo!

The answer is market research.

Hope this helps!

Explanation:

Market research is the way toward gathering, analyzing and interpreting data about a market, about an item or administration to be offered available to be purchased in that advertise, and about the past, present and potential clients for the item or administration; examination into the attributes, ways of managing money, area and necessities of your business' objective market, the industry all in all, and the specific contenders you confront.  

3 0
3 years ago
What is the output of the following code snippet? double income = 45000; double cutoff = 55000; double minIncome = 30000; if (mi
MissTica

Answer:

Income requirement is met.

Explanation:

(minIncome > income) will evaluate to false

(cutOff < income) will evaluate to false

the else portion will be executed which is "Income requirement is met"

7 0
3 years ago
What are they ethical issues with Drones?
guajiro [1.7K]
They may invade privacy rights of air space and be used for other unintended acts such a bombings and espionage
4 0
3 years ago
Other questions:
  • A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known a
    10·1 answer
  • In order to make burger a chef needs the following ingredients one piece of chicken meat 3 lettuce leaves 6 tomato slices Write
    8·1 answer
  • Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
    6·1 answer
  • List the step in turning on a computer
    6·1 answer
  • Check my work a(n) ________ reference is an automatically created variable that holds the address of an object and passes it to
    15·1 answer
  • Yall like portal 1 or 2
    8·1 answer
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • Consider the following correct implementation of the selection sort algorithm.
    5·1 answer
  • Rosanna is a middle school teacher. She has installed a spreadsheet program in her computer that tracks the grades and attendanc
    10·1 answer
  • in a small town, there are two providers of broadband internet access: a cable company and the phone company. the internet acces
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!