1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
2 years ago
13

If you select one slice of pie in a pie chart, you have selected a ____

Computers and Technology
2 answers:
nydimaria [60]2 years ago
5 0

Answer:

a date point I think I don't really know

dolphi86 [110]2 years ago
5 0
I believe it’s data series.
You might be interested in
Select one type of mobile phone connectivity you can use to stream videos on a smartphone
Oksi-84 [34.3K]

Answer:

Think is Wan or 4G

Explanation:

7 0
3 years ago
Read 2 more answers
Which two components are configured via software in order for a PC to participate in a network environment
dalvyx [7]

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

6 0
3 years ago
One of the primary principles of the Rapid Application Development methodology is early prototyping of the _______ in the develo
Oliga [24]

Answer:

Software Applications

Explanation:

Rapid Application Development (RAD) also is an agile project management strategy used in the development of software. RAD is also referred to as Rapid Application Building (RAB).

Its greatest advantage is that it reduces the time taken to churn out a program and this is why a lot of developers are now adopting it.

This is made possible by reducing the amount of time and effort spent on planning and increasing the amount of energy spent on creating prototypes.

Other merits of this methodology are:

  1. It reduces the risk associated with the project by ensuring that the program is first used as a prototype rather than the real deal.
  2. It ensures better quality. When users interact with the prototypes, they are able to provide very useful feedback that goes back into development to enhance the quality of the project.

Cheers!

3 0
3 years ago
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
3 years ago
During her presentation, Marie wanted more freedom to move about the room and interact with her audience. She can use _____.
S_A_V [24]

Answer:

The correct answer is:

"a laser pointer and a remote control"

Explanation:

Let us look at the options one by one.

notes pages and an LCD projector

When she is using these options, she cannot have the freedom to move as she has to operate the projector somehow.

laptop computer and a pointer

In this case she has to operate laptop so movement will be reduced.

<u>A laser pointer and remote control</u> will give her a lot of freedom to move as she can use the remote control to operate the slides and the pointer to point stuff ont the slides.

Hence,

The correct answer is:

"a laser pointer and a remote control"

5 0
3 years ago
Other questions:
  • ll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. Select one: A. turn on secu
    9·1 answer
  • What font option will elevate part of the text to a higher level and decrease its size? A. Subscript
    8·1 answer
  • Which one of the following parts of a universal motor does not move? A. The armature B. The field coil C. The shaft D. The commu
    5·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • What percentage of business are using social media today
    14·1 answer
  • To access documents stored on a "cloud", you'll
    12·1 answer
  • Write a Java program that launches 1000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum
    11·1 answer
  • How do you give people a brianly i am knew as u can tell
    6·2 answers
  • Differentiate between patent and copyright.
    6·2 answers
  • If you want to remove the autocorrect options button from the screen, you can press the ____ key.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!