1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
14

Which type of chart or graph uses vertical bars to compare data? a Column chart b Line graph c Pie chart d Scatter chart

Computers and Technology
2 answers:
Mrac [35]3 years ago
6 0

Answer:

Column Chart

Explanation:

DiKsa [7]3 years ago
6 0

Answer:

A. Column chart

Explanation:

I got it right in a test.

You might be interested in
Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
frozen [14]
<span>The sentence method is writing every new thought as an individual sentence. The advantage of this is that it is much easier to go back and find where a specific topic's notes are as opposed to having to read through a paragraph of notes. The disadvantage of it is that it's harder to convey a deeper meaning when every thought is written in its own line.</span>
3 0
3 years ago
Read 2 more answers
What is a preemptive CPU scheduling algorithm? Give an example and explain.
Blizzard [7]

Answer:

preemptive scheduling follows round robin where each process is given for some amount of time to execute

Explanation:

In this scheduling algorithm , the CPU allocates limited time for the process to execute. The execution of the process interrupted in middle if any high priority one comes in to the queue. Here context switching will save the current state of the process and resumes later. In general the process moves from ready to waiting and vice versa. It has overhead of scheduling the process and is cost associated with it

3 0
3 years ago
Write a program that includes functions to calculate feet to inches, inches to feet, feet to yards, and yards to feet. Then, acc
RoseWind [281]

Answer:

The program with all the functions implemented in Java programming language is given in the explanation section

Explanation:

import java.util.Scanner;

public class num11 {

   public static double feetToInches(double feet){

       return feet*12;

   }

   public static double inchesToFeet(double inches){

       return inches/12;

   }

   public static double feetToYard(double feet){

       return feet/3;

   }

   public static double yardToFeet(double yard){

       return yard*3;

   }

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter length in feet");

       double lenFeet = in.nextDouble();

       System.out.println("The equivalent in Inches is "+feetToInches(lenFeet));

       System.out.println("The equivalent in yard is "+feetToYard(lenFeet));

       System.out.println("enter value in Inches");

       double lenInches = in.nextDouble();

       System.out.println("The equivalent feet is "+inchesToFeet(lenInches));

       System.out.println("enter value in Yards");

       double lenYard = in.nextDouble();

       System.out.println("The equivalent feet is "+yardToFeet(lenYard));

   }

}

7 0
4 years ago
Read 2 more answers
if you could take on the role as game designer and could change or add some type of financial aspect about the game what would b
natulia [17]
I would put adverts in i dont know how that would affect the game as i dont know what it is
3 0
3 years ago
4) Short answer questions<br>c) What is Cyber Law?​
Kamila [148]

Answer:

Kindly check explanation

Explanation:

Laws refer to legal rules and regulatory framework which is used as a guiding principle to define the actions and behavior which may lead to incurring penalties if boundaries are trespassed.

The word 'Cyber' is popularly used to describe activities, actions and interactions involving the internet. With the burst and continous pace of digital transformation, the internet also called Cyberspace is in a world of its own. Hence, the creation of rules to govern internet interactions.

Cyber laws may thus be explained as codified laws which are designed and implemented to govern all forms of possible online interaction or transactions in other enhance cyber security to protect the interest of persons and data from various forms of internet threats. Cyber laws include ; Data protection laws, Computer crime laws, telecommunication laws and so on.

6 0
3 years ago
Other questions:
  • Create short names for the terms below based on the naming conventions rules.
    14·1 answer
  • 1. Information integrity ensures that data can be modified only by appropriate mechanisms.
    9·2 answers
  • Why is the wizard able to install the printer when an actual print device is not connected to the computer??
    11·1 answer
  • #include
    11·1 answer
  • "Packet switches have multiple links attached to them. For each attached link the packet switch has a/an ____________, which sto
    7·1 answer
  • In Microsoft Word you can access _ the command to the mini toolbar
    14·2 answers
  • Define client and.server​
    13·1 answer
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​
    5·1 answer
  • A__ is a part of a GUI that allows a specific type of interaction with the user.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!