1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
3 years ago
13

Kiara is using her software's graphic formats to create a line graph. As she

Computers and Technology
2 answers:
Ad libitum [116K]3 years ago
5 0

Correct the data she entered , and the software will adjust the graph -apex

frosja888 [35]3 years ago
4 0

Answer:

The best way through Kiara can correct her work is to change the data she entered prior and then simultaneously software will alter the output according to corrected data.

Explanation:

from the information given in the question, the output of Kiara's work is incorrect because of the wrong entering of details of the line graph in software graphics.

The best way through Kiara can correct her work is to change the data she entered prior and then simultaneously software will alter the output according to corrected data.

You might be interested in
You need to know the MAC address of a Windows 8 computer. How can you accomplish this?
Gre4nikov [31]

1.press window key + R

2.type cmd and press enter

3. write "ipconfig /all" without quotes and press enter

4. look for physical address word

that's your Mac address

6 0
3 years ago
Insurance can help you:
Blababa [14]
No it can not .............
3 0
3 years ago
An internet address that ends in .com is operated by
ollegr [7]
.com means company, so it is ran by a company.

4 0
3 years ago
Read 2 more answers
Six causes of data lost
Serhud [2]
Hard drive failures

Accidental deletions

Computer viruses and malware infections



Power failures
6 0
3 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
3 years ago
Other questions:
  • Suppose a computer can execute 1 billion instructions/sec and that a system call takes 1000 instructions, including the trap and
    10·1 answer
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • When you are working on an unsaved document on a PC, where is the document temporarily saved?
    5·1 answer
  • what type of clause must you always use with DEKETE or UPDATE to avoid inadvertently changing data elsewhere in the database​
    12·1 answer
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • "Packet switches have multiple links attached to them. For each attached link the packet switch has a/an ____________, which sto
    7·1 answer
  • Python
    6·1 answer
  • What is meant by byte in computer terminology​
    6·2 answers
  • This computer is used by touching your finger.
    14·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!