1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka57 [31]
3 years ago
7

Based on the chart below, which pie flavors make up approximately one-half of the total? A pie chart shows the following pie fla

vor and percentages: coconut (9%), cherry (14%), strawberry rhubarb (12%), banana cream (10%), pumpkin (11%), chocolate mud pie (23%), and other (21%) Image © 2010 zemanta Creative Commons coconut, cherry, and strawberry rhubarb cherry, strawberry rhubarb, banana cream, pumpkin, and chocolate mud pie chocolate mud pie, other, and coconut other, coconut, cherry, strawberry rhubarb, and banana cream
Computers and Technology
2 answers:
Vladimir [108]3 years ago
8 0
Based on the data, a combination of strawberry rhubarb (12%), chocolate mud pie (23%) and cherry (14%) would amount to 49% which is close to half of the pie chart or 50%. Another probable answer is the combination of coconut (9%), banana cream (10%), pumpkin (11%), and other (21%) which is equal to 51%.
nalin [4]3 years ago
6 0

Answer:

.

Explanation:

You might be interested in
windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
mixer [17]

Windows 8's Desktop Mode is a graphical user interface (GUI) environment for quickly gaining access to frequently used programs and services.

<h3>What is Desktop mode?</h3>

In all Windows versions prior to Windows 8, Desktop Mode functions and looks much like a standard desktop, but with a few minor differences.

One of Windows 8's two available GUI interfaces is Desktop Mode. The tiled screen menu is the alternative.  Windows 8 typically launches in the tiled screen user interface (UI), but a user can choose to launch it in desktop mode, which closely mimics the desktop present in earlier

Windows versions. re-use of. re-use re- re- – –. in to –. Additionally, the majority of the features in desktop mode may be accessible using non-touch input devices, like a mouse and keyboard, in contrast to the new Windows 8 app menu.

Therefore, Windows 8's Desktop Mode is a graphical user interface (GUI) environment for quickly gaining access to frequently used programs and services.

To learn more about windows 8, refer to the link:

brainly.com/question/13544399

#SPJ1

7 0
1 year ago
Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and remo
telo118 [61]

Answer:

Answered below

Explanation:

public ArrayList<Integer> removeRange(ArrayList<Integer> X, int min, int max){

int i; int j;

//Variable to hold new list without elements in //given range.

ArrayList<Integer> newList = new ArrayList<Integer>();

//Nested loops to compare list elements to //range elements.

if(max >= min){

for( i = 0; i < x.length; I++){

for(j = min; j <= max; j++){

if( x [i] != j){

newList.add( x[i] );

}

}

}

return newList;

}

}

5 0
2 years ago
Rags or wipes are considered non-hazardous waste when they are
nalin [4]
Under the Solvent-Contaminated Wipes Rule (also known as the “Wipes Rule”), solvent-contaminated wipes sent for cleaning or disposal are conditionally excluded from hazardous waste regulation. As long as the solvent-contaminated wipes meet those conditions mentioned above, they are not considered hazardous waste Under the Resource Conservation and Recovery Act (RCRA),
4 0
3 years ago
Read 2 more answers
HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
joja [24]

The primary key is the block under the Movie ID column.

The Field is the Movie Name.

The Record is the block that goes with the first row of data.

The Table is the bottom block in the center.

4 0
3 years ago
Read 2 more answers
Why computer known as tool of information​
S_A_V [24]

Answer:

because it has the ability to capture the whole information you need or downloaded

8 0
2 years ago
Other questions:
  • What is a common method for testing a spot weld?
    13·1 answer
  • What was the impact of the rise of the Japanese auto industry and the semiconductor industry in south eastern​ Asia? A. It incre
    13·1 answer
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • For the function definition int SomeFunc( /* in */ int alpha, /* in */ int beta ) { int gamma; alpha = alpha + beta; gamma = 2 *
    6·2 answers
  • Ten examples of an interpreter
    8·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
  • File:///media/fuse/drivefs-0142e6928396ed2afff070ead0fbbbcd/root/JerooLessonFourLabA_1.pdf
    6·1 answer
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • Choose the answer.
    15·1 answer
  • When you use the predict step in the IPDE process you
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!