1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
7

Why are charts and graphs included in documents rather than just raw data?

Computers and Technology
1 answer:
trapecia [35]3 years ago
4 0

Answer:

It's more organized and easier to look at

Explanation:

If it was just the raw data, it would take more time to analize, rather than it already being in a chart or graph

You might be interested in
I need help on this, need answer asap.
FinnZ [79.3K]

Answer:

int main() {

int _2dArray[32][32];

for (int i = 0; i < 32; i++) {

 for (int j = 0; j < 32; j++) {

  _2dArray[i][j] = j + i * 32;

 }

}

return 0;

}

Explanation:

Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.

Good luck!

6 0
3 years ago
What do work places allow a company to do
anygoal [31]
D. They provide a platform for collaboration
8 0
3 years ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
How is kerning used in Word?
kirill115 [55]

Answer: To adjust the spacing between characters that make up a word

Explanation: Kerning refers to the way spacing between two specific characters is adjusted. The idea is to give a better looking result by reducing the spacing between characters that fit together nicely (such as "A" and "V") and increasing the spacing between characters that don't. Select the text that you want to change.

4 0
3 years ago
What would you NOT use a router for? *
Alla [95]

Answer:

<h2><u>A</u><u>.</u><u> </u><u>To</u><u> </u><u>run</u><u> </u><u>applications</u><u> </u><u>on</u><u> </u><u>your</u><u> </u><u>computer</u></h2>

3 0
3 years ago
Other questions:
  • Ian is working as a sales manager. He has to generate sales reports using mathematical data that his team has collected. Which c
    15·1 answer
  • What is client server relationship is the basic form of what
    6·1 answer
  • Write a full class definition for a class named Averager, and containing the following members:______An data member named sum of
    6·2 answers
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds
    9·1 answer
  • Ryan is working on the layout of his web page. He needs to figure out where the title, links, text, and images should go. Which
    15·2 answers
  • Which key must you press after you write into a cell?
    12·1 answer
  • A special type of loans for houses
    9·2 answers
  • Yuygiihjiujjhuuuuykjyt​
    13·1 answer
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!