1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
13

Describe some common types of charts.​

Computers and Technology
2 answers:
UkoKoshka [18]3 years ago
6 0

Answer:

The four most common are probably line graphs, bar graphs and histograms, pie charts, and Cartesian graphs. They are generally used for, and are best for, quite different things.

Explanation:

Line chart- A graph with points connected by lines to show how something changes in value: • as time goes by, • or as something else changes.

Example: how you are improving at a quiz each day.

Bar chart- A graph drawn using rectangular bars to show how large each value is. The bars can be horizontal or vertical. It is a really good way to show relative sizes. We can use bar graphs to show the relative sizes of many things, such as what type of car people have, how many customers a shop has on different days and so on.

Histogram- a graphical display of data using bars of different heights. It is similar to a Bar Chart, but a histogram groups numbers into ranges . The height of each bar shows how many fall into each range.

Pie chart- a special chart that uses "pie slices" to show relative sizes of data. It is a really good way to show relative sizes.

Cartesian chart- This is a type of chart that uses coordinates to pinpoint where something is on a map or graph. Using Cartesian Coordinates we mark a point on a graph by how far along and how far up it is.

Mekhanik [1.2K]3 years ago
4 0
Bar chart.
Pie chart.
Line chart.
You might be interested in
Which type of operating system requires a keyboard in order to issue commands?
kicyunya [14]

Answer:

I said CLI.

Explanation:

''A command-line interface (CLI) processes commands to a computer program in the form of lines of text.''- Wikipedia

4 0
3 years ago
Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
Katyanochek1 [597]

If the question is asking whether it is true or false, the answer is false because worms are not responsible for disguising when they are sending data by using bogus ip addresses but it is the Trojan horses in which they are the one responsible for misleading users from the true intent or the real data.

5 0
3 years ago
Which of the following would be considered a subtopic for a mind map?
Grace [21]

Answer:

C) Plants

Explanation:

"Ecosystem" is the topic. Then "Plants" is the sub topic. Next the "Number of trees" and "Number of shrubs" branch out from there (Pun intended (; ).

4 0
3 years ago
Which characteristic of a company suggests that it has an informal work culture?
goldenfox [79]
The main characteristic of a company with suggests that it operates with an informal work culture is flexible working hours. With this kind of work culture, <span>workers are allowed to alter their workday start and finish times; and are not required to strictly follow the traditional work arrangements of the standard 9 a.m. to 5 p.m</span>
6 0
3 years ago
Which of the following statements contains an error?
ASHA 777 [7]
I. is syntactically correct if genderString exists. if genderString, for example, is "Male", then char gender would be the character at index 0 (the first character), meaning 'M'.

II. is incorrect. It is using the comparison operator (==) instead of the assignment operator (=). It is also setting a boolean variable to a String value of 'F'. Boolean values cannot hold string values, and can only hold true & false. 

III. is correct if ageString only contains numbers (presumably, it does, as it's called ageString). Integer.parseInt is a function that converts String values to integer values if the string values only contain numerical characters.

The answer in this case should be B. II only.
5 0
3 years ago
Other questions:
  • Make three statements about technology
    9·1 answer
  • A slightly tapered thread is characteristic of a _______ tap.
    15·1 answer
  • Write the Python code to implement each step of the following algorithm. Your code should use descriptive variable names and per
    7·1 answer
  • After Lola gave her friend the password to a protected website, her friend was able to remember it only long enough to type it i
    7·1 answer
  • Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
    13·1 answer
  • What do flowcharts communicate to programmers ?
    10·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • There are many best practices for digital recordings. Select the three best practices from the list below. select the best micro
    14·1 answer
  • What should you do when you are working on an unclassified system and receive an email.
    10·1 answer
  • How to print<br> 1<br> 321<br> 54321<br> 7654321<br> triangle pattern in python
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!