1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
8

You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?

Computers and Technology
1 answer:
allsm [11]3 years ago
7 0
Option D, The Rudolph Rule is the correct answer.
You might be interested in
A method can not be made final until whole class is madefinal.TrueFalse
Blababa [14]

Answer:

True.

Explanation:

A method can not be made final until whole class is madefinal.

4 0
3 years ago
You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his works
WARRIOR [948]

Answer:

Calmly ask him for his name and a more detailed explanation of the problem.

Explanation:

Since in the question,  it is mentioned that the anger use who fails to identify himself and claim that his workstation is malfunctioning and want to fix it now

Now the action which would be taken is to ask his name in a calmy manner and understand what the actually problem he is suffering by understanding it in a detailed way

Therefore according to the given case, the correct option is d.

3 0
3 years ago
Which NIMS communication principle ensures that communications and information systems can be expanded to support any situation,
madam [21]

Answer: Portability

Explanation: National; approach to incident management(NIMS) principle named as portability is responsible for the supporting the system in any situation. It lets an individual to access the equipment that are familiar.

Portability helps in moving the flow of the communication and resources with easiness and information system can be extended till the requirement to support the incidental situation.

8 0
3 years ago
In access, all the tables, reports, forms, and queries that are created are stored in a single file called a ____
julia-pushkina [17]
Folder or text document

7 0
3 years ago
You are carrying out the last round of testing for your new Web site before it goes live. The Web site has many subpages and con
dsp73

Answer:

CSRT Cross site request forgery

Explanation:

So your website is vulnerable to cross site request . In this you have find out form action of website and then use it to your own site before goes live. It is a security laravel default.

3 0
3 years ago
Other questions:
  • What will happen if you type pseudocode in another language's programming environment and try to run the
    11·1 answer
  • Write the function lettersOnly(s) that takes in a string called s, and returns a string containing only the alphabetic character
    8·1 answer
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • Use the drop-down menus to complete the statements about creating a table of contents in Word 2016.
    14·1 answer
  • During early recording, microphones picked up sound waves and turned them into electrical signals that carved a _______ into the
    10·1 answer
  • How do you resolve conflicts in your life??
    11·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • what is cicada 3301? i will give brainliest if you give me a correct answer (not copy and pasted) and somewhat well detailed, i
    8·1 answer
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
  • security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!