1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

What is the most appropriate data type for each of these items?

Computers and Technology
1 answer:
Tom [10]2 years ago
7 0
I may be wrong, BUT here is what i think



b) line graph


d) pie graph
You might be interested in
According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______.
Readme [11.4K]

Answer:

communicate clearly

Explanation:

4 0
3 years ago
Do you agree with the EU's decision that people should be able to ask Google to remove search results that contain incorrect, un
AnnyKZ [126]

Answer: Yes

Explanation: One should not be able to just find negative information on someone just because they googled it (unless they're famous of course)

7 0
3 years ago
Read 2 more answers
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Is Naab a system of an accounting system? A factory operations system? or both? explain your answer
KonstantinChe [14]

Answer:

accounting system

Explanation:

The most common response variable modeled for cropping systems is yield, whether of grain, tuber, or forage biomass yield. This yield is harvested at a single point in time for determinate annual crops, while indeterminate crops and grasslands may be harvested multiple times. Although statistical models may be useful for predicting these biological yields in response to some combination of weather conditions, nutrient levels, irrigation amounts, etc. (e.g., Schlenker and Lobell, 2010, Lobell et al., 2011), they do not predict responses to nonlinearities and threshold effects outside the range of conditions in data used to develop them.

In contrast, dynamic cropping and grassland system models may simulate these biological yields and other responses important to analysts, such as crop water use, nitrogen uptake, nitrate leaching, soil erosion, soil carbon, greenhouse gas emissions, and residual soil nutrients. Dynamic models can also be used to estimate responses in places and for time periods and conditions for which there are no prior experiments. They can be used to simulate experiments and estimate responses that allow users to evaluate economic and environmental tradeoffs among alternative systems. Simulation experiments can predict responses to various climate and soil conditions, genetics, and management factors that are represented in the model. “Hybrid” agricultural system models that combine dynamic crop simulations with appropriate economic models can simulate policy-relevant “treatment effects” in an experimental design of climate impact and adaptation (Antle and Stockle, 2015).

5 0
2 years ago
Why might location be important when searching for a job?
Elan Coil [88]
D I think because none of the others seem like very important things, 
8 0
3 years ago
Read 2 more answers
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Rags or wipes are considered non-hazardous waste when they are
    15·2 answers
  • An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t
    8·1 answer
  • Complete the paragraph to explain how Angelina can notify readers that her report is just a draft.
    6·1 answer
  • Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
    15·1 answer
  • Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
    10·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    10·1 answer
  • Convert hexadecimal number 1AF2 to a decimal number.
    7·1 answer
  • What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
    7·1 answer
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!