1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
15

Which type of data is is usually collected as numerical data that can be presented in a graph or chart?

Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
8 0

Answer:

Quantitative data

Explanation:

Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.

You might be interested in
The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
max2010maxim [7]
It is eather pythone or html
8 0
3 years ago
Read 2 more answers
The three basic processes of memory are ______.
marysya [2.9K]

Answer:

The correct answer is letter "C": encoding, storage, retrieval.

Explanation:

In psychology, the stages of memory are <em>encoding, storage, </em>and <em>retrieval</em>. Encoding refers to changing the information as it is received so it can be stored in the memory and imply inputs in three kinds: <em>visual (pictures), acoustic (sounds), </em>and<em> semantic (meaning)</em>. Storage is the stage in which the input is retained in the memory, where it is stored, and for how long. Finally, retrieval implies organizing information stored in the memory to recall it.

6 0
3 years ago
True or False <br><br> Rootkits are only made by black-hat hackers.
andreyandreev [35.5K]

Answer:

True

Explanation:

Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.

Rootkit tools:

1. Keyloggers

2. antivirus disablers

3. password stealers

4. banking credential stealers

5. bots for DDoS attacks

8 0
3 years ago
Minerals that contain the elements silicon and oxygen are called ______.
mojhsa [17]
Silcates are minerals with silicon bonded with oxygen.
7 0
3 years ago
Which option ensures that different parts of the document can have different page layouts? ​
Mice21 [21]

Answer:

77777777777777777

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • Most sus color in Among Us? Red is safe I saw him scan. I'll give brainliest because why not. I'm bored.
    14·2 answers
  • A company wants to inform a select list of it's regular customers about a flash sale. Which type of platform will it use to send
    9·1 answer
  • Drag each label to the correct location on the image.
    7·1 answer
  • In this exercise, you will get some practice with the __add__ method by implementing it for a class called ContactBook. This cla
    12·1 answer
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
    12·1 answer
  • A person's oral communication skills can give either a positive or negative first impression.
    12·1 answer
  • What is the index of 7 in this list?
    10·1 answer
  • 5. Write the name of the tab, command group, and icon you need to use to access the
    11·2 answers
  • ____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!