1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
6

Which of the following is not a data visualization technique?

Computers and Technology
1 answer:
Minchanka [31]3 years ago
3 0

Answer:

Normalization

Explanation:

From the options given :

Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.

Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.

Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.

Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.

You might be interested in
In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
Assoli18 [71]

Answer:

result = 0

i = lo

while i <= hi:

       result = result + i

       i += 1

Explanation:

Initialize the <em>result</em> as 0 to hold the summation value.

Since we are asked not to change the value of <em>lo</em> and <em>hi</em>, our loop control variable is <em>i</em> and initially it starts from <em>lo.</em>

Since we are asked to add the number from <em>lo</em> to <em>hi, </em>while loop condition checks it.

While the condition satisfies (during each iteration), the value of <em>i</em> is added to the result and the value of <em>i</em> is incremented by one.

7 0
3 years ago
Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
Rainbow [258]

Answer:

C.

Explanation:

edg 2020

3 0
3 years ago
Read 2 more answers
Information Security
ziro4ka [17]

Answer:

THEUNITEDSTATESWASATPEACEWITHTHATNATIONANDATTHESOLIC ITATIONOFJAPANWASSTILLINCONVERsATIONWITHITSGOVERNMEN TANDITSEMPERORLOOKINGTOWARDTHEMAINTENANCEOFPEACEINTH EPACIFICINDEEDONEHOURAFTERJAPANESEAIRSQUADRONSHADCOM MENCEDBOMBINGINOAHUTHEJAPANESEAMBASSADORTOTHEUNITEDS TATESANDHISCOLLEAGUEDELIVEREDTOTHESECRETARYOFSTATEAF ORMALREPLYTOARECENTAMERICANMESSAGEWHILETHIsREPLYSTAT EDTHATITSEEMEDUSELESSTOCONTINUETHEEXIsTINGDIPLOMATIC NEGOTIATIONsITCONTAINEDNOTHREATORHINTOFWARORARMEDATTACK

Explanation:

Use this mapping:

abcdefghijklmnopqrstuvwxyz

kfazsrobcwdinuelthqgxvpjmy

6 0
3 years ago
A program has a infinite while loop. How can you interrupt it?
MrRa [10]

Answer:

The <em>break</em> keyword is how you interrupt a while loop.

the syntax looks like this ↓

Python ↓

while <em>true</em>:

<em>break</em>

Java script ↓

while (<em>true</em>);

<em>break</em>

6 0
2 years ago
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
Other questions:
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • What is the main purpose of broadcasting via satellite? A. To enable signal reception at night B. To convert analog signals to d
    5·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • When you collaborate or meet with a person or group online, it is called
    12·2 answers
  • The right to make others do things is referred to as _________.
    14·2 answers
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you i
    13·1 answer
  • How do i dos someone? I wanna mess with my friend
    10·1 answer
  • Avi does not want to save his internet browsing details on his computer. What should he do?
    11·1 answer
  • In the computer science industry, the process of finding and removing errors from computer hardware or software is known as
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!