1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
11

When a chart is selected, numerous customization options can be found on which Chart Tools tabs?

Computers and Technology
2 answers:
Anika [276]3 years ago
5 0

Answer

When a chart is selected, numerous customization options can be found on design and format chart Tool tabs.

Explanation

The Chart tools comprises of two tabs; Design and Format. Click the chart and chart tools will displace to enable you add the Design, Layout and Format tab. On the Format tab, check the current selection group, click chart element to enable you to change the formatting style.


Finger [1]3 years ago
3 0

When a chart is selected, numerous customization options can be found on which the Chart Tools tabs: Design and Format . Correct answer:B This tab enables you to choose predefined layouts and styles , to change the layout of chart elements manually, to change the formatting style but also to save a chart as a chart template.

You might be interested in
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
If Johanna wants to label the x- and y-axes in Excel she should click Layout, then what?
denis-greek [22]
<span> If Johanna wants to label the x and y axes in an Excel chart, she should click anywhere on the chart, then click on the Layout tab. Under Labels, she should click on Axis Titles, and select the Secondary Horizontal Axis Title for x axis or <span>Secondary Vertical Axis Title for y axis. She should then select the text that is in the Axis Title box, and type the title name that she wants.</span></span>


6 0
3 years ago
Elena is used to kissing her friends on both cheeks as a form of greeting in her native country. She notices that her new friend
Veseljchak [2.6K]

Answer:

c. Norms.

Explanation:

When Elena noticed her friend getting uncomfortable when she kisses him on the cheeks as a form of greeting she was violating his norms.

Norms are something that is standard or typical.

In USA there they not used to kiss on the cheeks to greet their friends there would be some other norm of greeting someone.

5 0
4 years ago
1.
Vlad1618 [11]
A. Since it tells about how people think she’s lesser because she’s a women.
7 0
3 years ago
What is an information​ system? A. Information databases B. Information technology C. Hardware and software components D. Comput
Tom [10]

Answer:

Option E Components that interact to produce information

Explanation:

Information system is a system to collect, analyze and disseminate information. An information system consists of five components that work with each other to produce information:

  1. Computer hardware - physical machine that works with information
  2. Computer software - a set of computer instructions that tell computer hardware how to perform a task
  3. Telecommunications - components that connect a group of hardware as to establish a network. This usually includes WiFI technology.
  4. Databases and data warehouses - the place where the digital data are kept and retrieved.
  5. Human resources and procedures - human expertise that run the system by following some standard procedures.
5 0
3 years ago
Other questions:
  • That is Entrepreneur ? ?<br>​
    8·1 answer
  • What is the height of the tallest possible red-black tree containing 31 values?
    7·1 answer
  • Chdtp aoxophg gr72 ae9&gt;3 zqqz
    12·1 answer
  • What is the process of comparing data with a set of rules or values to find out if the data is correct?
    8·2 answers
  • What is the maximum transmission speed for bluetooth v3 and v4 devices?
    12·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • Which of the following is an example of a long-term goal?Developing a lifetime savings plan
    11·1 answer
  • Red + blue =<br>Red + green =<br>Magenta - blue =<br>Yellow - green =<br>Cyan - blue =​
    9·1 answer
  • What is the second row of letters in the keyboard called?
    6·1 answer
  • Consider the following statements regarding computers:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!