1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
8

He would like to get rid of the graph. What will accomplish

Computers and Technology
1 answer:
Troyanec [42]3 years ago
3 0

Answer:

All options may be incorrect

Explanation:

In ribbon tab there is page layout please select if end-user using word 2007 or word 2010

And if the end-user has to choose a design tab from the ribbon tab if he or she using word 2013 or word 2016.

Change the color setting to no color by click on page click and page background group end-user can get rid of the graph in the word document

After doing all the above method still, graph chart is visible better to close word document  and open the different template and try this last option to rid of the graph in a word document

You might be interested in
Informs the network interface card to pass packets sent to that address to the ip stack so their contents can be read, and tells
Lesechka [4]
The answer to this question is Registration
Registration on the network interface will allow computer users all around the world to access a certain information stored within a certain address in that network which most people know as a website.
Today, to do a network registration, people just need to contact a hosting service that will take care of everything for us, and we just need to provide the content.


6 0
3 years ago
A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
Delicious77 [7]

Answer: True

Explanation:

 Yes, the given statement is true, as the bastion host basically require two individual firewall that connect with the internal network and perimeter network by using the perimeter configuration.

Perimeter network basically isolate the the bastion host from the internal network. Bastion host is the serve as the host that connect with the external world. As, perimeter network is one of the type of the firewall network system.

Therefore, the internal network and the perimeter network basically connect with the firewall by using bastion host.

3 0
3 years ago
Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
Umnica [9.8K]

Answer:

Virtual team

Explanation:

A virtual team is also known as a remote team, where every member of the team is working from different geographic locations. Usually, the communication channel is through voice/video conferencing or email.

Each member of the team is given unique roles and these roles are delivered optimally within the specified time frame.

For instance, Malcolm does not meet with other members of the team, yet they are working on a project (a smartphone app to track traffic patterns). Following standards that would have applied if they were working at a specific location.

Thanks to Information and Communication Technology (ICT), virtual jobs are on the increase, providing jobs to a lot of people not minding their geographic location.

7 0
3 years ago
12. Your project specifications call for a business rule that the database design can't
fomenos

A lot of business rules needs to be triggered so as to run.

In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.

The trigger options differs  based on the type of rule you are interested in.  One can also use multiple triggers when using a single rule.

Learn more about rules from.

brainly.com/question/5707732

8 0
3 years ago
Write a program that (a) generates a vector with 20 random integer elements with integers between -29 and 30, (b) replaces all t
Ghella [55]

Answer:

import random

randomlist = []

for i in range(0,20):

n = random.randint(-29,30)

if n < 0 :

n = 100

randomlist.append(n)

print(randomlist)

Explanation:

The random module is first imported as it takes care of random. Number generation.

An empty list called randomliay is created to hold the generated random integers.

Using a for loop, we specify the range of random numbers we want.

Inside the for loop ; we attach our generated random integer which will be in the range (-29 to 30) in a variable n

For each n value generated, if the value is less than 0( it is negative, since all the values are integers), replace the value with 100.

5 0
3 years ago
Other questions:
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • 4. Together, what do the divisions of the DHSMV do? A. Make sure lines are long B. Use more money than other government organiza
    14·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • With Voice over Internet Protocol (VoIP), _____. a. voicemails cannot be received on the computer b. call quality is significant
    6·1 answer
  • A ______________ is a way of taking a screenshot or a picture of your computer screen. ​
    14·1 answer
  • For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False
    12·1 answer
  • PLEASE HURRY 30 POINTS
    15·2 answers
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the
    9·1 answer
  • 4.5 code practice computer science
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!