1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
13

A large amount of scatter in a scatterplot is a indication that the association between the two variables is

Computers and Technology
2 answers:
Masja [62]3 years ago
8 0

the association between the two variables is very weak

netineya [11]3 years ago
5 0
The association is very weak
You might be interested in
What operating systems are you familiar with?
Andrew [12]

Well there are a few like

Microsoft Windows

Apple iOS

Apple macOS

Linux Operating System

3 0
3 years ago
"There are 1.6093 kilometers in a mile. Create a variable to store a number of miles. Convert this to kilometers, and store in a
Karolina [17]

MATLAB CODE:

%%%%

clc

dist_mile=input('enter the distance in miles') %%%dist_mile stores given distance in miles

dist_km=dist_mile*1.6093 %%coversion of dist_mile into km and storing in dist_km

%%%%

OOUTPUT:

enter the distance in miles

2

dist_km

3.2186

4 0
3 years ago
Customer Service. Is an organization's ability to _______ customers
sweet [91]

Answer:

Serve

Explanation:

Customer Service

5 0
3 years ago
Read 2 more answers
What laptop is the best for programming and hacking​
Archy [21]

Answer:

I would suggest an outdated laptop that can't be updated anymore because it is old and outdated.

Explanation:

If you hack on an old laptop it can't be traced back to you because the servers are shutdown.

3 0
4 years ago
A production house needs an operating system that captures, saves, and generates information within specific time. Which type of
Vlad1618 [11]
For hacking, you can use linux, but for normal use, use windows 8 or 10. Anything older than that is kind of boring
3 0
3 years ago
Other questions:
  • If you want three vertical sections of text on your page, create _____.
    11·2 answers
  • Differentiate the threat to a computer from electrical surges and spikes versus the threat from viruses
    10·2 answers
  • What does it mean when your check engine light is blinking?
    10·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • A raised dot (ú) shows where the ENTER key was pressed. <br> a. True<br> b. False
    15·1 answer
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    7·2 answers
  • What is virtualization?
    11·2 answers
  • Which three statements are true of lossless compression?
    6·1 answer
  • When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
    7·1 answer
  • A company is looking to share data between two platforms in order to extend their functionality. which feature enables communica
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!