1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
12

This describes what is charted. It can be placed above or below the chart.

Computers and Technology
1 answer:
Tems11 [23]3 years ago
3 0

Answer:

a . chart area

This describes what is charted. It can be placed above or below the chart.

Explanation:

You might be interested in
Write a C++ program to exchange values of two variables using function exchange().
Shkiper50 [21]

Answer:

#include<iostream>

using namespace std;

//create the exchange function

void exchange(int a, int b){

   int temp;  //initialize temporary

   //swap the variables value

   temp=a;

   a=b;

   b=temp;

   //print the output after exchange

   cout<<"a is: "<<a<<endl;

   cout<<"b is: "<<b<<endl;

}

//main function program start from here

int main(){

  //initialization

  int a=3, b=6;

  exchange(a,b);  //calling the function

  return 0;

}

Explanation:

Create the function exchange with two integer parameter which takes the value from the calling function.

and then declare the third variable temp with is used for swapping the value between two variables.

first store the value of 'a' in the temp and then assign the 'b' value to 'a' and then, assign the temp value to b.

for example;

a=2, b=9

temp=2;

a=9;

b=2;

So, the values are swap.  

and then print the swap values.

Create the main function and define the input a and b with values.

Then, calling the exchange function with two arguments.

6 0
3 years ago
In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
ch4aika [34]
The answer here is hacker
6 0
3 years ago
Which of the following best describes a hacktivist? Select one: a. An individual who attempts to destroy the infrastructure comp
brilliants [131]

Answer: (B) An individual who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

 Hacktivist is the defined as an individual that basically hacks the various types of web sites and computer system for promoting the various political ideologies. The hacktivists is the method which include the DDOS attacks (Distributed denial of services).

It basically causes various website and the email with the congestion of traffic with the computer virus and by the data stealing. The denial of services attacks typically considered federal crime and illegal in united state.  

4 0
4 years ago
A style ____ is a series of rules that defines the style for a web page or an entire web site.
inna [77]
Set is the answer have fun 
8 0
3 years ago
Using symbols in a file name is a good idea.<br><br> True<br> False
zavuch27 [327]
False. File names should only contain letters, underscores, periods, and dashes.
4 0
3 years ago
Read 2 more answers
Other questions:
  • The wireless spectrum, as defined by the fcc, spans between which two frequencies?​
    7·1 answer
  • What is the most common drive letter where window stores most data and programs. 1,a 2,b 3,c 4,e
    9·1 answer
  • You want to print only the fourth page of your research document. What would you do?
    9·2 answers
  • What is the difference between the audio mixer and meters panel.
    8·1 answer
  • escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
    10·1 answer
  • A company decides to relocate its operations to another state in order to take advantage of some new business investment credits
    15·1 answer
  • You have a friend that says she is interested in going into web development. She is very knowledgeable in terms of technology an
    13·1 answer
  • 5 advantages in relation to virtual education in times of pandemic.
    10·1 answer
  • Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
    13·1 answer
  • How do I get the pictures from my old Samsung phone to put on my iPhone? The Samsung is turned off. Is there a way to transfer i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!