Question 8 of 10
When is a table the most effective way to present information?
O A. When graphs are more expensive to create.
O B. When you want to show the parts of a whole.
O C. When you want to show how parts fit together.
O D. When you want to make many details available in an organized
way.

Answers

Answer 1

Answer:

C

Explanation:

Tables and figures are particularly effective when large amounts of information have to be presented and discussed in an effective way.

Answer 2

Answer:

D. When you want to make many details available in an organized way.

Explanation:


Related Questions

What would the objective of the game be?
What would the operation of the game be?
What obstacles would your players experience?
What outcomes would you like to see in the game?
What sorts of themes, lessons, or skills would you like to express through your game?
What kind of person do you think would enjoy playing your game?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

A file ____ shows the location of a file or folder

Answers

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

Why is remixing so popular with artists and other people online?

A.
It is so popular because remixes are guaranteed to make money.

B.
It requires no skill or special tools to do.

C.
It is a legal loophole that allows them to benefit from other people’s work.

D.
It is a way to be creative without having to construct totally new pieces.

Answers

Answer:

D.It is a way to be creative without having to construct totally new pieces.

Explanation:The answer is -D- because it is true. Remixing is a way of being creative, and you don't have to make completely new pieces.

Answer:

its likely D

Explanation:

remixing allows artists to combine and change different songs without having to actually create a song their-selves

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

Fill in the blank
please help.

_______________________ _____________________ software allows you to prepare documents such as _______________________ and _______________________. It allows you to _______________________, _______________________ and format these documents. You can also _______________________ the documents and retrieved it at a later date.

Answers

Answer:

Application software allows you to prepare documents such as text and graphics. It allows you to manipulate data , manage information and format these documents. You can also store the documents and retrieve it at a later date.

The Sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on the directory only allow the user and group owners to view the contents of the directory. Users who are not part of the group owner are unable to list the contents of the directory.

As part of a new company policy to increase teamwork, you want to allow all users to be able to see the /sales directory and list its contents. You also want to let all users open, but not change, any document inside that directory.

Task:

Allow the other group to browse the /sales directory.

Modify permissions on all files in the /sales directory to allow members of the other group to view but not change the file.
Type:

chmod o+rx /sales

Answers

Answer:

it should be d

Explanation:

please mark this as brainlists i could really use it

File permissions are often set or changed using “Change Mode.” o+ Add permission for “others” with – (remove) r (other possible options include u (user) and g (group)). Permission is read. Implement permission (other possible values include w – write permission)

What is main function of the chmod?

What permission—read (r), write (w), or execute—is third? (x). You would enter chmod o+rx [filename] to add world read and execute permission to a file using symbolic mode. You would type chmod o-r [filename] to make a file world read-only.

— rw-r—r— (644) — Group members and others can only read; only the user has read and write access. — rwx——— (700) — Reading, writing, and executing are all restricted to the user.

Therefore, RWXRXRX (755) — Only the user and the group and others can read and execute; the user has read, write, and execute permissions.

Learn more about chmod here:

https://brainly.com/question/14187643

#SPJ2

Since the advent of online writing, our audience:

A. has grown much larger

B. rarely reads what we write

C. has become disinterested

D. usually comprises one person​

Answers

Answer:

C............. I think

Since the advent of online writing, our audience: A. has grown much larger.

Writing refers to an act (process) of using alphabets and writing symbols to communicate ideas, emotions, and thoughts in a readable form.

On a related note, online writing can be defined as a process that involves writing and making a literary work (piece) solely available for an audience over the internet.

Generally, the audience for online writing has grown much larger, as a result of technological advancement and the availability of communication devices such as:

SmartphonesLaptopsPalmtopse-diaries

In conclusion, our audience has grown much larger since the advent of online writing.

Read more on online writing here: https://brainly.com/question/10354868

The ____ design is the process of selecting the data storage and data access characteristics of the database.

Answers

Answer:

The Physical database design is the process of selecting the data storage and data access characteristics of the database.

what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?

rules

feedback

tasks

algotithms

Answers

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

Answers

Answer:

Secrecy

Explanation:

Options:

A) Necessity.

B) Secrecy.

C) Integrity.

D) Encryption.

B) Secrecy Is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

Who are the primary users of erp systems?.

Answers

Explanation:

resellers, partners, suppliers, and distributors.

Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?

it's C. Shape Styles gallery got a 100

Answers

Answer:

c. Shape Styles gallery

Explanation: is correct. post protected

where on a computer is the operating system generally stored?

Answers

The operating system on a computer is generally stored at hard disk.

Typically, a data structure known as the Interrupt Vector Table stores the addresses of interrupt handlers (IVT). When an interrupt happens, the processor refers to the IVT, a table of fixed addresses in memory.

An interrupt is a signal sent to the processor of a computer or other digital device by a hardware component or software function to get the processor's attention. By allowing the processor execute numerous tasks at once, interrupts enable hardware devices to connect with the processor and software to run more effectively.

The interrupt handler, which is normally included in the operating system kernel, receives control when an interrupt occurs, causing the CPU to pause its ongoing task execution. The interrupt handler responds to the interrupt, which may entail resolving an error condition, processing data from a device, or performing input/output tasks. The processor resumes working on the interrupted job once the interrupt has been handled.

Learn more about Interrupt here:

brainly.com/question/29770273

#SPJ6

What is the main purpose of adding captions to an image or table in Word?
O to show the reader where to learn more about the image
O to identify other images that are similar to the one shown
O to add detailed information about the image for the reader
O to provide information on the size and shape of the image

Answers

Answer:

C. to add detailed information about the image for the reader

Explanation:

hope this helps :)

The main purpose of adding captions to an image or table in Word is to provide detailed information about the image for the reader.

Thus, option (c) is correct.

Captions help the reader understand the content of the image, such as its context, significance, or key points, without having to rely solely on the visual information.

Captions also help in referencing the image or table in the text, making it easier for readers to locate and understand the content being discussed in the document.

Therefore, adding captions provide detailed information about the image for the reader.

Thus, option (c) is correct.

Learn more about caption here:

https://brainly.com/question/10413551

#SPJ3

Distributions of links in most networks follow a(n) __________ rule. radio_button_unchecked 60/40 radio_button_unchecked 90/10 radio_button_unchecked 50/50 radio_button_unchecked 80/20 SUBMIT

Answers

In most computer networks, the distribution of links follow an: 80/20 rule.

A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.

An 80/20 rule is also referred to as the Pareto Principle and it can be defined as a concept in cybersecurity, which states that there exist an unequal relationship between outputs and inputs, in the ratio of 80 percent to 20 percent respectively.

In most computer networks, the distribution of links follow an 80/20 rule by rationalizing the amount of traffic that must enter into a network (20 percent) with respect to the amount of traffic that must exit the network (80 percent).

Read more: https://brainly.com/question/22365112

Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.

Answers

Jim is the main antagonist while Edward is the main protagonist of the movie.

The network or networks within an AS communicate with protocols as well; these are called generically __________.

Answers

The protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called: interior gateway protocol (IGP).

A network refer to a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together, especially for the purpose of exchanging (transmitting) data electronically.

An autonomous system (AS) can be defined as a network or group of networks that are administered or managed by an individual or business firm while using a single set of management rules.

Generally, an autonomous system (AS) typically uses a single (one) Internet Protocol (IP) routing protocol.

In this context, the protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called an interior gateway protocol (IGP).

On the other hand, an exterior gateway protocol (EGP) is the protocol that is used by autonomous systems (AS) to communicate with each other.

Read more: https://brainly.com/question/20629962

4.2.5 codehs text messages answer

Answers

Answer:

public class TextMessage

{

   private String message;

   private String sender;

   private String receiver;

   

   public TextMessage(String from, String to, String theMessage)

   {

       sender = from;

       receiver = to;

       message = theMessage;

   }

   

   public String toString()

   {

       return sender + " texted " + receiver + ": " + message;

   }

}

The FAT method ______________.

a. keeps information about the block where bit vector is stored.

b. employs space maps to manage information about free blocks.

c. does not store information about free blocks.

d. incorporates free-block accounting into the allocation data structure.

Answers

The FAT method incorporates free-block accounting into the allocation data structure.

The File Allocation Table (FAT) method is a file system designed to store file information in a designated entry format. The operating system makes use of it to manage files on hard drives and other computer devices.

It usually comprises an entry for each block. As such, it is indexed via the block number. This helps to locate files faster based on the address of the given number of the free blocks as opposed to using the traditional grouping method.

Learn more about the File Allocation Table (FAT) method here:

https://brainly.com/question/4671431

if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should you use

Answers

The Smart glove is known to be a very common hardware. The sensor that an individual can use, is the Inertial Measurement Unit (IMU) sensors.

Inertial Measurement Unit (IMU) sensors is a type of sensor that capture alltogether the motion of hand and wrist movements.

It is known to contain some bending sensors that is used to detect bending in one direction or another.

All the sensors are often linked to a computer system that put together the amount of individual finger movement of the patient.

Learn more from

https://brainly.com/question/20591341

How many binary digits are in 10^100.

Answers

Answer:

333 binary digits.

Explanation:

which of the following online creation tools will be used if a person wants to create a video presentation?

a. Piktochart
b. Prezi
c. Powtoon
d. Zamzar​

Answers

Answer:

C

Explaination:

Powtoon

How to combine multiple documents into one pdf.

Answers

Answer:

How to combine and merge your files into one PDF: Open Acrobat DC to combine files: Open the Tools tab and select "Combine files." Add files: Click "Add Files" and select the files you want to include in your PDF. You can merge PDFs or a mix of PDF documents and other files.

Explanation:

Animals living in burrows under the ground is an interaction between the biosphere and the

Answers

Answer:

Geosphere

Explanation:

The geosphere is made up of the rocks and minerals of the earth found in the ground.

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

Read what is in the commets.

Answers

Answer:

I'm a little confused on what you are asking, could you please explain.

True or False: You can insert a part into an assembly by dragging the part file from Windows Explorer into the Onshape window and dropping it in your assembly.

Answers

The Onshape software is a Computer - Aided - Design (CAD) apllication which is used to create various engineering components and simulation.

The program has several functionality which is extremely useful and similar to other CAD software packages such as SOLIDWORKS and AUTOCAD.

There are several ways of adding a required component to an assembly, which also includes dragging a supported file from explorer into the application window.

Hence, the Statememt is True.

Learn more : https://brainly.com/question/25702248

tax preparation software can help prepare and file your taxes by _________.

Answers

tax preparation software can help prepare and file your taxes by April 15.

computer science is a blank process

Answers

i agree... its a interesting thing to learn, just like learning an actual new language.

Answer:

yeah and it requires hard work

You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create

Answers

Based on the information given, the type of file that the user should create is the batch file.

Batch file simply means a script file in Microsoft Windows. A batch file consists of a series of commands that will be executed by the command-line interpreter.

Since the user has been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client, the batch file will be vital in this case.

Read related link on:

https://brainly.com/question/25520771

Other Questions
Last month 288 people attended the monthly bingo night. This month 243 people attended bingo night. To the nearest tenth of a percent, what is the percent decrease in attendance from last month to this month? Enter your answer as a decimal in the box. % 9. Describe some research strategies implemented by economists to prove the existence of labor market discrimination based on race. Last week, you received a phone call and you had to leave your home in a hurry.Write an email to a friend about what happened.In your email you should:.explain what the phone call was aboutsay what happened after you left your homedescribe how you felt when you returned. The library owns 80,000 books. 90% of the books are fiction books. How many fiction books does the library own? how does training help to foster a profession Which of the following people worked with government in the 1960s to get laws passed to help noncitizens and farm workers? Huey Newton Bobby Seale Stokely Carmichael Dolores Huerta. What are differences between the structures ofDNA and RNA? A forced-air heating system uses a system of ____ air ducts to deliver warm air to the conditioned spaces. is macbeth is guilty How do animals adapt in their environment? You are running a fuel economy study. One of the cars you find is blue. It can travel 38 1/2 miles on 1 1/4 gallons of gasoline. What is the unit rate for miles per gallon for the blue car?Help plsBrainlist HELP ME OUT PLEASE!!!! Which statement correctly describes one of the changes? A) Picture I shows a chemical change, because a new substance is formed. B) Picture Il shows a chemical change, because a new substance is formed. C) Picture I shows a chemical change, because the same substance changes form, D) Picture Il shows a chemical change, because the same substance changes form. Solve the system.y-x=4x+y=6 What is the last system to develop in the fetus? which principle is found in the declaration of the rights of man and in the citizen? why do we enjoy our rights ? (i) as we are strong (ii) because others do their duties (iii) because we work hard. Why was african slavery introduced to the americas brainly. what to expect after lumbar epidural steroid injection the first step in the decision making process is to Where does the CO2 produced during the Krebs Cycle come from