1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
13

How are PivotCharts different from regular charts?

Computers and Technology
1 answer:
AnnZ [28]3 years ago
6 0

Answer:

The answer is a on edge2020.

:D have a great day and stay safe <3.

You might be interested in
Do anti viruses install themselves on other computers in the network
egoroff_w [7]
Not usually. Normally, an Antivirus requires a paid licence per computer. If an "Antivirus" is spreading via the network, it's a safe bet it's either a rogue Antivirus, or an infection disguised as an Antivirus.
4 0
4 years ago
The smallest unit of storage in the following list is a
crimeas [40]
A: The smallest unit<span> of measurement used for measuring data is a bit. A single bit can have a value of either 0 or 1. It may contain a binary value (such as On/Off or True/False), but nothing more. Therefore, a byte, or eight bits, is used as the fundamental </span>unit<span> of measurement for data.</span>
6 0
3 years ago
Sarah has entered data about football players from team A and team B in a worksheet. She enters names of players from team A wit
deff fn [24]
I believe the answer is freeze pane view

7 0
3 years ago
Read 2 more answers
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
What does XD mean? I keep seeing people say it and I dont know what it means
Anna007 [38]

Answer: xD = haha

Explanation:

XD looks like a haha face laughing :P

have a good day :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
    15·1 answer
  • A newspaper publishes a negative editorial on how local politicians are dragging their feet in building a new bridge. Select the
    5·2 answers
  • TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you think the TCP designers cho
    13·1 answer
  • The different types of DDR modules are easily identifiable because of what factor?
    8·2 answers
  • List at least five tasks a layer performs. Could one (or more) of these tasks could be performed by multiple layers?
    13·1 answer
  • 25 points!!!!!!!!!!!!!!!!!!!!!
    9·2 answers
  • John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, televisions and many oth
    6·1 answer
  • List at least five smaller behaviours you could break the complex behaviour ""brushing my teeth"" into.
    6·1 answer
  • Imagine that a time machine has transported you back to an earlier civilization or historical era. Poking through your backpack,
    12·1 answer
  • PLEASE HELP! :)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!