1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
5

Por qué es importante modificar la apariencia de un gráfico

Computers and Technology
1 answer:
Karolina [17]3 years ago
4 0

do you talk English:) could you translate

You might be interested in
The key invention that enabled computers going to every home and office it is what
Dafna1 [17]
It would be, <span>the <span>microprocessor.
</span></span>
It is also a multipurpose and programmable device that accepts inputted data and process the data to provide an output. 

Hope this helps!
4 0
3 years ago
thick is incorrect does anybody know the correct answer? please don’t send any files i can’t open them
77julia77 [94]

Answer:

i think its new

Explanation:

if this is incorrect i apologize

7 0
3 years ago
Fuel-pressure regulators on fuel-return-type fuel-injection systems are installed
Natalija [7]
1) The correct answer is <span>B. at the end of the fuel rail.
2) The one who is correct is the Technician A.</span>
5 0
3 years ago
Read 2 more answers
Help me help you...........
lyudmila [28]

Answer:

the 4th answer

Explanation:

w stage for width, h for height.

6 0
2 years ago
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
Other questions:
  • Write a program in pascal to solve a quadratic equation
    12·1 answer
  • When viewing data entered into a spreadsheet, the columns identify _____.?
    5·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • Write the definition of a method min that has two int parameters and returns the smaller.
    9·1 answer
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • When assigned to a cell, the __________ function returns a number that corresponds to the system date and time beginning with De
    12·1 answer
  • A file with a com extension is most likely to be a(n) ___ file.
    13·2 answers
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • What best describes the ability to increase the access to server resources and provide fail-safe services by linking two or more
    13·1 answer
  • A file extension of. Xlsm indicates what type of workbook.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!