1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
4 years ago
8

In a paragraph of no less than 125 words, describe how you would insert a graph in your word-processing document.

Computers and Technology
2 answers:
slavikrds [6]4 years ago
5 0

I would move into another program, preferably a program with graph-making capabilities built in, and make the graph there. I would then copy the image of the graph or save the image of the graph and paste or insert it into my word-processing document.

xenn [34]4 years ago
3 0

Explanation:

Step 1: Open the word processing document and click in the document where you want to insert the graph.

Step 2: Go to insert tab and from the options, click ‘chart’

Step 3: A pop-up will open, from the options, select the type of your graph e.g. Pie chart, Line chart, Column chart, Area chart, Bar chart etc.

Step 4: A new window will open with generic data, you can change this data and customize according to your needs.

Step 5: You can change the number of entries, change the names of axis, font, size, color, style etc

Step 6: Close the data window and you are done.

Note: If you want to make any further changes then click on the graph and options will appear on the right side of graph.

You might be interested in
Write a java program that asks the student for his name and Favorite basketball team. The program should then welcome the studen
bixtya [17]

The java program is an illustration of sequential programs

<h3>What are sequential programs?</h3>

Sequential programs are programs that do not require loops or conditions

<h3>The actual program</h3>

The program written in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 //This creates a Scanner Object

 Scanner input = new Scanner(System.in);

 //This declares the variables

 String name, team;

 //This prompts the user for name

 System.out.print("Name: ");

 //This gets an input from the user

 name = input.nextLine();

 //This prompts the user for favorite team

 System.out.print("Favorite team: ");

 //This gets an input from the user

 team = input.nextLine();

 //This prints the required output

 System.out.print("Welcome, "+name+". Cheers to "+team+" team");

}

}

Read more about sequential programs at:

brainly.com/question/26642771

7 0
3 years ago
Read 2 more answers
The limit for characters in modern file systems is too small to accommodate keywords in titles
Nata [24]
The limit for file names on modern file systems is usually at least 255 bytes.
3 0
4 years ago
Read 2 more answers
Digital Subscriber Line (DSL) is a way for traditional telephone companies to provide Internet access a way for traditional cabl
zvonat [6]

Answer:

Option A is correct

Digital Subscriber line is a way where telephone companies provide internet access for connection.

It is a communication medium used to transfer digital signals. DSL is one of the most popular broadband internet access.

Explanation:

DSL stands for Digital Subscriber Line. DSL works with high-speed bandwidth that connects from a phone jack to a telephone network. DSL works within frequencies. You can use the DSL while making phone calls.

6 0
3 years ago
Read 2 more answers
Server virtualization in windows server 2012 r2 is based on a module called the
alexgriva [62]
<span>Server virtualization in windows server 2012 r2 is based on a module called the</span> hypervisor.
3 0
3 years ago
What are web protocols.
RoseWind [281]

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

7 0
2 years ago
Read 2 more answers
Other questions:
  • __________ involves analyzing a large amount of data to extract knowledge and insight
    13·1 answer
  • Which of the following tasks is least effective at preventing a computer virus?
    14·2 answers
  • Lines s, t, and u are perpendicular bisectors of the sides FGH and meet at J. If JG=2x+2, JH=2y-4, JF=8 and HI=3z-3, find x, y,
    15·2 answers
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • Explain the term software dependability. Give at least two real-world examples which further elaborates
    9·1 answer
  • Which of the following is NOT AN EXAMPLE of personal identifying
    9·2 answers
  • Large and fast disks should be used for as doing so will ensure work is done as quickly as possible?
    8·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!