1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
3 years ago
13

Which are guidlines for using themes? Check all that apply

Computers and Technology
1 answer:
Andreyy893 years ago
7 0

Answer: A. Using different cell styles can help you differentiate different types of data.

B. Fonts should be easily readable and of appropriate size.

D. Be consistent with themes across worksheets and workbooks.

Explanation:

A theme refers to the preset package that contains functionality details and graphical appearance.

The guidelines for using themes include:

• Using different cell styles can help you differentiate different types of data.

• Fonts should be easily readable and of appropriate size.

• Be consistent with themes across worksheets and workbooks.

Therefore, the correct options are A, B and D.

You might be interested in
Which of the following is not a data visualization technique?
Minchanka [31]

Answer:

Normalization

Explanation:

From the options given :

Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.

Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.

Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.

Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.

3 0
3 years ago
They are correct? thank you!
vredina [299]

Answer:

<em>Yes</em><em> </em><em>they</em><em> </em><em>are</em><em> </em><em>correct</em><em>.</em><em> </em><em>welcome</em><em>.</em><em>.</em><em>.</em><em>.</em>

8 0
3 years ago
The eight great ideas in computer architecture are similar ideas from other fields. Match the eight ideas from computer architec
andrew11 [14]

Answer:

following are the answer to this question:

In option a, "Performance via Pipelining".

In option b, "Performance via Parallelism".

In option c, "Performance via Prediction".

In option d, "Make the Common Case Fast".

In option e, "Hierarchy of Memories".

In option f,  "Design for Moore’s Law".

In option g, "Dependability via Redundancy".

In option h, "Use Abstraction to Simplify Design".

Explanation:

Automotive assembly lines are Efficiency through pipelines.

The cable bridge suspension is used to Perform by Parallelism.  

The aircraft and navigation systems are designed to integrate and use through simulation wind information.  

The fast and the common Case is used to express lifts in the building.  

The Memory hierarchy library is used for the reserve desk.  

Extending the port area of a CMOS transistor to reduce Moore's Law Design for Moore's legislation switching sequence.

Increasing energy generation from the latest reactor technology dependability through redundancy. It enables the addition of electrical aircraft slingshots, which are electrically powered as opposed to the earlier steam models.  

It Constructs cars that depend on existing sensor systems, like automatic braking devices or clever speed control systems, that already have installed their monitoring system throughout the base vehicle by Using abstraction to ease the model.

7 0
4 years ago
Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal A
Vikentia [17]

Answer:

a. device administration

Explanation:

Device Administration is a powerful API feature on the Android framework which was first introduced in Android version 2.2. It offers some features at the system level that enables some other key features such as the storage on a device, remotely wiping or enforcing password policies.

It is also utilized in uninstalling your application from the device or to capture a picture by the use of camera when screen is lock.

7 0
3 years ago
A firewall relies on or a that determine what traffic should or should not be allowed to pass through
likoan [24]
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.
5 0
4 years ago
Other questions:
  • What policy definition can help remind employees in the User Domain about what constitutes suitable use and improper use of corp
    14·1 answer
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • What is displayed in the alert dialog box after the following code is executed? var items = 3; for (var i = 1; i &lt;= items; i+
    8·1 answer
  • You may see the term FAQ on websites which stands for Frequently Asked Questions this is an example of which type of mnemonic?
    9·1 answer
  • A manger wants to hire a new technician for the desk that typically assists clients with simple computer problems over the phone
    9·1 answer
  • Choose the words that make the following sentence true.<br> Primary memory is
    5·1 answer
  • Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to oper
    5·1 answer
  • Juan has performed a search on his inbox and would like to ensure the results only include those items with attachments which co
    14·2 answers
  • HTML, the markup language of the web, specifies colors using the RGB model. It uses a two-digit hexadecimal (that is, base 16) r
    13·1 answer
  • When i add someone to canvas course, do they get an invitation?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!