1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
2 years ago
15

Match the item to the type.​

Computers and Technology
1 answer:
Roman55 [17]2 years ago
3 0
The chart with the circle in the top right is a pie chart

the top left chart on enrollment is a histogram

the bottom chart is a bar chart
You might be interested in
What is Telerobotic?
Dennis_Churaev [7]

Answer:

Telepresence refers to a set of technologies which allow a person to feel as if they were present, to give the appearance that they were present, or to have an effect, at a location other than their true location. Teleoperation is the operation of a machine at a distance.

Explanation:

4 0
3 years ago
Read 2 more answers
If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you
VLD [36.1K]

Answer:

I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.

4 0
3 years ago
Read 2 more answers
97. How many bits is a ki obyte?<br> a. 1000<br> b. 1024<br> c. 8192<br> d. 8124<br> 5
Basile [38]

Answer:

b

1024

is the correct answer

6 0
3 years ago
Read 2 more answers
A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
Anuta_ua [19.1K]

The safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

<h3>What is encryption?</h3>

The process to convert data into a coded message that conceals its real meaning is known as encryption.

As we know,

Key escrow is the security measure that makes it possible for a reliable third party to own a copy of the encryption key.

Electronic cash systems employ encrypting to secure traditional transaction information like account information and activity amounts.

Thus, the safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

Learn more about encryption here:

brainly.com/question/17017885

#SPJ4

7 0
2 years ago
Technology has increased the success of the medical field. Which examples of technology have had a great impact on the medical f
Korolek [52]

Answer:

x-rays and ultrasounds

8 0
3 years ago
Read 2 more answers
Other questions:
  • _______________ is the term for the convergence of real-time and non-real-time communications services such as telephony, instan
    11·1 answer
  • You knew that you had to take this quiz so you logged into Blackboard and went to the quizzes section. In this scenario your com
    11·1 answer
  • This type of handout prints only the text of the presentation.
    7·1 answer
  • How are additional slides added to presentations? select all that apply
    10·1 answer
  • The two main methods of verification
    6·1 answer
  • A hot spot is the __________. A. Point that collides with other objects B. Point an object spins around when it rotates C. First
    8·1 answer
  • A ________ is a single media file including art, sound, animation, or movies.
    9·1 answer
  • Select the correct answer.
    9·2 answers
  • Because mobile users consume information one screen at a time, you should ________ when you're writing to them.
    5·1 answer
  • Which attributes does not come in tag?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!