1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
13

Describe some common types of charts.​

Computers and Technology
2 answers:
UkoKoshka [18]3 years ago
6 0

Answer:

The four most common are probably line graphs, bar graphs and histograms, pie charts, and Cartesian graphs. They are generally used for, and are best for, quite different things.

Explanation:

Line chart- A graph with points connected by lines to show how something changes in value: • as time goes by, • or as something else changes.

Example: how you are improving at a quiz each day.

Bar chart- A graph drawn using rectangular bars to show how large each value is. The bars can be horizontal or vertical. It is a really good way to show relative sizes. We can use bar graphs to show the relative sizes of many things, such as what type of car people have, how many customers a shop has on different days and so on.

Histogram- a graphical display of data using bars of different heights. It is similar to a Bar Chart, but a histogram groups numbers into ranges . The height of each bar shows how many fall into each range.

Pie chart- a special chart that uses "pie slices" to show relative sizes of data. It is a really good way to show relative sizes.

Cartesian chart- This is a type of chart that uses coordinates to pinpoint where something is on a map or graph. Using Cartesian Coordinates we mark a point on a graph by how far along and how far up it is.

Mekhanik [1.2K]3 years ago
4 0
Bar chart.
Pie chart.
Line chart.
You might be interested in
the central processing unit(CPU)is responsible for processing all information from program run by your computer.​
olasank [31]

Answer:

This is a true statement.

Further Explanation:

The CPU is technically the brain of a computer, containing all the circuitry required to process input, store data, and output results.

3 0
3 years ago
Ravi is writing an essay on the impact of the internet on business. Help him classify the scenarios he sees around him as positi
Radda [10]

Answer: See explanation

Explanation:

Based on the options given, the positive effects of the internet on business will be:

• He recently bought a second-hand camera online, which he hadn't been able to find in any store.

• His friend sell printed T-shirts online, storing them in his basement and promoting them on social media.

The negative effects of the internet on business will be:

• A bookstore down the road shut down because people preferred the cheaper online bookstores.

• Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office.

• One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

6 0
3 years ago
What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages se
Marta_Voda [28]

Answer and Explanation:

Messages flow across an SDN controller's:  

Northbound APIs:  

• Messages which help in read/write state of the network and developing flow tables within the  

state management layer.  

• Notifications for the state-change events.  

• The interaction between the controller and network control applications is done through the  

northbound interface.  

• Network control applications send messages to the controller.  

Southbound APIs:  

• Messages which help for the up-to-date view of the network's state like message for the  

attached link has gone up or down, new devices are joined the network, or indications of the  

device is up or down.  

• Controller's southbound interface is the communication among the controller and the controlled  

devices. Controlled devices are the recipients of the messages sent form the controller.  

3 0
3 years ago
Multiple Choice
natta225 [31]

Answer:

information technology

6 0
3 years ago
Read 2 more answers
1) What are the six (6) core elements of developing a whole person? Explain
VashaNatasha [74]

Answer:

Here

Explanation:

Hope that was helpful!

4 0
3 years ago
Other questions:
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
    13·2 answers
  • Effective character encoding requires:
    8·1 answer
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza
    6·1 answer
  • (15 POINTS) When an error is made in HTML code, the browser does what?
    11·1 answer
  • In a linked chain implementation of a stack ADT the performance of popping am emtry from the stack is
    10·1 answer
  • A message M is encapsulated by the TCP, IP and Ethernet protocols in that order as it travels down a protocol stack. What does t
    5·1 answer
  • Sypherpk is good go sub 2 him
    6·2 answers
  • Only one person can receive the same email at the same time true or false
    10·1 answer
  • What Is The First Computer Brought In Nepal ? <br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!