Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
O add a title to a chart
o change the way a chart looks
change the position of the chart
add a chart to a Word document
change the type of an existing chart

Answers

Answer 1

Answer:

add a title to a chart

change the way a chart looks

change the type of existing chart

Explanation:

i just took it ! remember to stream fine line by harry styles, walls by louis tomlinson , hs1 by harry styles, lp1 by liam payne, mind of mine by zayn , icarus falls by zayn , flicker by niall horan, heartbreak weather by niall horan, up all night by one direction, take me home by one direction, midnight memories by one direction, four by one direction , and made in the am by one direction . :)

Answer 2

Answer:

add a title to a chart

change the way a chart looks

change the type of existing chart

Explanation:

took it on edu 100%


Related Questions

What is the greatest common
factor of the following three
numbers?
12, 18, 32​

Answers

Answer: 2

Explanation:

pls answer fast in five mins​

Answers

The answer is true!! I hope this helps!!

A _____ describes two or more computers connected to each other.

computer network

client

server

switch

Answers

Answer:

C

Explanation:

computer network

What is the purpose of the Chart feature in Word?
O A chart can be used to draw and format a Word table.
O A chart can be used to paste information from a graph.
O Information can be typed into a chart to create a graph.
O Information can be typed into a chart to insert a Word table.

Answers

Answer:

Its the third option.

Explanation:

Answer: its c Information can be typed into a chart to create a graph

Explanation:

If you were to conduct an Internet search on vegetarian restaurants, which of the following searches would be the best
to use?
'vegetarian restaurants
"restaurants
"vegetarians"
all of these

Answers

Answer:

A.

Explanation:

just did it

you really need to ask brainly for this question? obviously its vegetarian restaurants

What does "Forward" in emails do?​

Answers

Basically just want to make your your email is easy

Convert the following into binary system
and vice versa.
106​

Answers

It would be 1101010 in binary
It would be 1101010, I think

Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner?
The corrective action(s) that you need to perform on a computer in case it functions in an unexpected manner is called

Answers

Answer:

Reboot?

Explanation:

Hard to tell from the information provided.

Which of these jobs would be most appropriate for someone who majors in information systems?

Answers

Answer:

An Architect, System Designers, IT business analysts etc...

Explanation:

Answer:An Architect and System Designers someone who studies complex work

Explanation:

it is used to replace numeric number of a website​

Answers

greatflombles or gr8flombles or go2flombles

New technology is driven by new discoveries in the _________ field.
Group of answer choices

finance

geology

mathematics

science

Answers

Answer:

science.......... ..

My study background is business. I am doing a bachelor of business administration. My major course is management information of the system. But I want to do data science. I know the journey is typically hard for me. In future , it will be demandable if I do data science in master's . Have I made a good decision?

Answers

Answer:

Yes,I think your going on right path! Keep up the hard work ! You got this!

what are super computers? what is their application in real life situation​

Answers

Answer:

A supercomputer is a computer with a high level of performance as compared to a general-purpose computer. Common applications for supercomputers include testing mathematical models for complex physical phenomena or designs, such as climate and weather, evolution of the cosmos, nuclear weapons and reactors, new chemical compounds (especially for pharmaceutical purposes), and cryptology.

Which of the following is a correct variable name?
Low temperature
7temperature
low--temperature
o low_Temperature

Answers

Answer:

low_temperature

Explanation:

Required

Select which of the given options is correct

In programming;

Variable names don't contain space; as in Low temperature

Variable names don't begin with numbers; as in 7temperature

Variable names don't contain dashes; as in low--temperature

However, variable names may contain underscore; as in low_Temperature;

Hence;

Option D answers the question

Which of the following is not an operating system
A.LINUX
B.MAC OS
C.NEXUS
D.WINDOWS

Answers

Answer:

C

Explanation:

I hope this helped.

Answer:

I honestly don’t know... But I’m still gettin that credit Broski

Explanation:

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error

Answers

Answer:

The answer is the last choice that is "None of these values will produce a mathematical error".

Explanation:

In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.

Computers can give you a false sense of security. O True False​

Answers

Answer:

True in my opinion is this for a test?

Explanation:

Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about the use of cyberterrorists?

Answers

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

Samantha was working on a Word document and the horizontal and vertical margins disappeared. Which solution will fix the problem? Close the Word document and reopen it. Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen. Double-click in the ruler area to redisplay the ruler. Click on the View Ruler button located at the top left-hand side of the screen that looks like an L.​

Answers

Answer:

B

Explanation:

Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen is the solution will fix the problem. Hence, option B is correct.

What is MS Word DOC?

Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional caliber. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.

Microsoft Word documents can be opened and edited in Docs. Even better, you may download your document as a Word document with a typical Word extension. But Docs also allows you to export other file types.

It is simple to modify huge sections of text, alter the flow between pages, change font sizes and styles, and perform other operations with Word and the DOC format.

Thus, option B is correct.

For more information about MS Word DOC, click here:

https://brainly.com/question/9174181

#SPJ2

Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study
environment?
O phones
O clutter
O noise
O laptops

Answers

Answer:

B. Clutter

Explanation:

I just looked it up on quizlet and quizlet is always right. Helps me on test and everything. But it distracts you unlike phone and laptop because you can not ignore clutter like you can with other things, because clutter makes you confused and wonder what is going on.

You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production? A. commercial virtual reality B. telecommuting C. computer-aided manufacturing D. automated vehicles

Answers

Answer:

The correct answer is option C. computer-aided manufacturing.

Explanation:

Computer-aided manufacturing (or CAM for short) is the use of numerical control (NC) software applications with the aim of creating detailed instructions (G code) that drive computer numerical control machine tools ( CNC) for fabrication parts. Manufacturers in many different industries rely on CAM capabilities to produce high-quality parts.  

A broader definition of CAM may include the use of computer applications to define a manufacturing plan for tool design, computer aided design (CAD), model preparation, NC programming, inspection programming coordinate measuring machines (CMM), machine tool simulation or post-processing. The plan is then executed in a production environment, such as direct numerical control (DNC), tool management, CNC machining, or CMM execution.

how many 16ths are in 3/8 of an inch

Answers

Answer:

0.375

Explanation: i think

Question 1 (1 point)
Which word means "many different kinds?"
a
b
variety
vertigo
extraordinary
с
d
vast

Answers

Answer:

Variety is many different kinds.

Variety is the answer. It means different kinds


Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols group?

Answers

Answer:"TM"

Explanation:

Answer:

TM

Explanation:

because its used to identify, trademarks and etc. mark brainliest! i also got 100 on the quiz

how do you get people to add you?

Answers

Answer:

go to their profile and click the person icon and done

Explanation:

choose the types of work a person in the network systems administration field might go on a regular basis. check all boxes that apply
A. troubleshooting the network when there are problems with connectivity.
B. improving the speed of the network.
C. helping users install word-processing software.
D. developing video games​

Answers

Answer:troubleshooting the network when there are problems with the connectivity |||||| improving network speed

Explanation:

In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
100,000
1 billion
1 million
1000

Answers

Answer:

The correct answer is D) 1 Million

Explanation:

It has been predicted that in about five years the Information Technology sector in the United States will have about 1 million unfilled roles in computer science.

Cheers!

What were precomputed tables and why were they necessary?​

Answers

Yesterday’s comment is a good idea to have you on in your life if I can find a good job in the world of the control you can get in your life if you’re a real life or you can get your own job

Precomputation in algorithms refers to the act of running an initial computation ahead of run time to create a lookup table that may be used by an algorithm to avoid running the same computation repeatedly each time it is executed.

What is algorithm?

An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

Algorithms are procedures for resolving issues or carrying out tasks. Algorithms include math equations and recipes.

Algorithms are used in programming. All online searching is done using algorithms, which power the internet.

The term "precomputation" in the context of algorithms refers to the act of performing an initial computation before the algorithm is actually used.

This creates a lookup table that the algorithm can utilise to avoid performing the same computation repeatedly each time it is used.

Thus, this way, precomputed tables are essential.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ2

What are some cowboy ethics??

Answers

Answer:

giv meh a min plsssss

Explanation:

(minimum 4 sentences) What is cyber security and why is it important

Answers

Answer:

A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have  cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.

Explanation:

Other Questions
can someone help me cause apparently nobody knows how to do this s the result of hundreds of years of assimilation with Spanish culture, the most common religion in Latin America is __________.A.ProtestantismB.Roman CatholicismC.IslamD.Eastern Orthodox Which line from the selection provides the best evidence that Framton is a troubled andanxious man?"Privately he doubted more than ever whether these formal visits on a succession of totalstrangers would do much towards helping the nerve cure which he was supposed to beundergoingO "He made the last statement in a tone of distinct regret.""Framton wondered whether Mrs. Sappleton, the lady to whom he was presenting one of theletters of introduction came into the nice division.""Framton shivered slightly and turned towards the niece with a look intended to conveysympathetic comprehension." Graduate school is not required for engineering. True Falsepleasehelp Choose the Spanish-speaking country that best fits this description: La capital del pas es Santo Domingo y es un centro popular del ecoturismo. A. Chile B. La Repblica Dominicana C. Ecuador D. El Salvador The most recent financial statements for Schenkel Co. are shown here: Income Statement Balance Sheet Sales$14,500 Current assets$12,000 Debt$16,500 Costs 8,400 Fixed assets 29,000 Equity 24,500 Taxable income$6,100 Total$41,000 Total$41,000 Taxes (40%) 2,440 Net income$3,660 Assets and costs are proportional to sales. Debt and equity are not. The company maintains a constant 30 percent dividend payout ratio. No external equity financing is possible. What is the sustainable growth rate? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) Sustainable growth rate % The Pax Romana is a name historians give to a period ofA. civil warB. Roman peaceC. Roman conquestD. barbarian invasions A 3-column table with 4 rows. Column 1 has entries Computer repair, sales tax, gratuity, shipping. Column 2 is labeled Store A with entries 1,200 dollars, 6 percent, 15 percent, Free. Column 3 is labeled Store B with entries 1,350 dollars, 7 percent, 15 percent, 2 percent of total price.What is the amount of sales tax charged on the repaired computer at Store A? Graph the function y = 4x4 8x2 + 4. Which lists all of the turning points of the graph? (0, 4) (1, 0) and (1, 0) (1, 0), (0, 4), and (1, 0) (4, 0), (1, 0), (0, 4), and (1, 0)help please 2. Calculate your total variable costs for the summer at each price. a. 35 lawns per weekx 12 weeks x $24.25 variable cost = b. 20 lawns per weekx 12 weeks x $24.25 variable cost = c. 5 lawns per weekx 12 weeks x $24.25 variable cost = I NEED HELP ! :( pleASEEE Why are empires and civilizations so intent on producing works of artistic and cultural significance?O These works help to ensure the success of the empire's people.O These works help to ensure the legacy of an empire.O These works help to make the leader more powerful.O These works help to ensure the empire will continue to prosper.Hi Question 4These are the uncharged particle located in the nucleus. The number of these thaatom has is equal to its mass number minus its atomic number. 1. Protons2.Nuclei3.Neutrons4.Electrons How many significant figures are in 320001 -2 = 7+3v Solve for v You hang a book bag on a spring scale and place the bag on a platform scale so that the platform scale reads 29.7 N and the spring scale reads 17.6 N. Which sentence supports the idea that it is difficult to describe the wonder of the Grand Canyon? A. Within its depth and length, it expresses within that distance more than any one human mind yet has been able to comprehend or interpret for the world, for famous writers have attempted it and great painters have tried it, but all alike have failed. B. Because of its vastness, its sublimity, and its grandeur, the canyon is unique and stands alone in nature. C. Those who have carefully studied the Grand Canyon, however, do not hesitate for a moment to pronounce it the most sublime of all earthly spectacles. D. The Grand Canyon is one of the few things that a person is utterly unable to imagine until actually coming into direct physical contact with it. The phrase on coins E pluribus unum means what and how does it reflect the population of the U.S.? A 60.04 g sample of a compound of carbon, sulfur, hydrogen and oxygen is burned completely. Calculate the empirical formula if 44.8 L of water at STP and 88.0 g of CO2 is formed. In another experiment, a 15.00 g sample of the compound produced 1.00L SO2 at 25.0 oC and 3.05 atm. In a final experiment: 3.57 L of the compound at 2.33 atm and 25 o C weighted 35.0g Find the molecular formula of the compound. Which of the following statements are true and which are false? Give reasons for your answers.(i) Only one line can pass through a single point.(ii) There are an infinite number of lines which pass through two distinct points.(iii) A line can be produced indefinitely on both sides.(iv) If two circles are equal, then their radii are equal.(v) if AB=PQ and PQ=XY, then AB=XY.