CAN SOMEONE DO OR LOOK UP THE PIE CHART FOR THIS ANSWER PLS AND I WILL MARK YOU BRAINLIEST BUT PLSSS HELP MEEEE!!!

CAN SOMEONE DO OR LOOK UP THE PIE CHART FOR THIS ANSWER PLS AND I WILL MARK YOU BRAINLIEST BUT PLSSS

Answers

Answer 1

Answer:

I highly recommened you use ggl charts.

Explanation:

It's free. ALL YOU NEED IS AN GGL ACCOUNT. You can also choose many types of graph you want.


Related Questions

What is the last usable host IP address on the 192.168.32.9/30 network?

Answers

Answer:

192.168.32.10

Explanation:

HOPE THIS HELPS:)

Evaluate a career in the telecommunications industry that most interests you. What about the career appeals to you?
What qualifications do you already possess to make you successful in this career? Which skills do you still need to
develop to pursue this career?
Your answer should be at least 150 words in length.

Answers

Answer:

Network administrator and programmer.

Am still in A-level, am doing Physics, chemistry, Maths and ICT.

I have an A in physics, B in Chemistry and Maths and A† in ICT

Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.

Answers

Answer:

The answer is "Option 2".

Explanation:

In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.

The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.

Answers

Answer:

"Cross-training " seems to be the right response.

Explanation:

Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.

Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?

Answers

Answer:

Run OCI session authenticate and provide your credentials

Explanation:

The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials

do you agree or disagree with the assertion that edutech transforms teachung and learning ​

Answers

Answer:I agree!

Explanation:

Agree

Write a program that takes a String containing a text using the method signature

String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.

For example,

useProperGrammar("can you go 2 the store?")
should return

"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.

For example, for useProperGrammar("back 2 back 2 back"), the method would also print:

Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.

Answers

import java.util.*;

public class MyClass {

   public static String useProperGrammar(String message){

       String newMessage = "";

       int count = 0;

       for (int i = 0; i < message.length(); i++){

           if(message.charAt(i) == '2'){

               newMessage = newMessage + "to";

               count ++;

           

           }

           else{

               newMessage = newMessage + message.charAt(i);

           }

       

       }

       System.out.println("Fixed "+count+" grammatical error(s):");

       return newMessage;

   }

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter a string: ");

     String text = scan.nextLine();

     System.out.println(useProperGrammar(text));

   }

}

I hope this helps.

PLZ HELP THIS ENDS TODAY
During slide show mode, hitting the B key will do which of these?

End your presentation

Blank the screen with black screen

Move back one page

Move to the first page of your presentation

Answers

Answer:

B or Period. Pressing the B key or period key pauses the slideshow and displays a black screen, which you can write on. Press the B or period key again to resume the slideshow.

Answer: It blanks the screen black.

You should use the arrow keys.

Explanation:

I tried it.

Several key people were involved in programming-language development in the 1970s and 1980s

Answers

Answer:

Brian Kernighan and Dennis Ritchie created the C programming language, and Bjarne Stroustrup took it to the next level by creating C++ in the 80's.

Answer:

Bjarne Stroustrup released C++ programming language in the1980s.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Explanation:

1,3,4

Which of the following options allow you to access a computer remotely?

a. NTP
b. SSH
c. Server
d. VPN

Answers

Answer:

b. SSH

Explanation:

Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.

Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.

Thus, option "B" is the right answer.

As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors

Answers

Answer:

Printing devices

Video, Audio devices

Communication machines

Explanation:

Printing devices - Sysadmin needs this type of devices for print important data and information.

Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.

Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.

Write a 200 word essay about how a computer is made.

Good luck.​

Answers

Answer:

Essay about how a computer is made is written below in detailed explanation.

Explanation:

After so many discoveries and inventions, Humans ultimately made the computer. And, today some personalities in the world can't exist a bit without a computer.

The computer is an electric device that is utilized for collecting and processing data. The hard work can be completed in a shorter time with the guidance of computers. With the assistance of the computer, we can do all the stuff in today's world.. Because of this, the computer performs a vital purpose in this contemporary life.

Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False

Answers

Answer:

A. True

Explanation:

What is computer virus?​

Answers

Answer:

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Explanation:

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Simply, a computer virus is a harmful multiplying code that harms your computer and makes it slower, harder to use, and more vulnerable to other harmful unsafe software, apps, downloads and more.

How to get it?

You can get computer viruses just from going to unsafe websites downloading harmful files downloading harmful images downloading harmful videos clicking unsafe advertisements

and thats just a couple of examples, there's many many more but you get the idea.

Something that really sucks about computer viruses is that its hard to tell if something online is dangerous or not.

That's why people make specific softwares to protect your computer but even those can be unsafe or people could be trying to trick you.

Sometimes the computer will already have some sort of app or software to protect it from these harmful files, but make sure to pay attention when your on websites and check the urls and make sure it doesn't say anything along the lines of "unsafe" if it says that just simply exit the website and dont do anything further.

If your experiencing slowness, files you don't remember saving on your computer or extra files and apps that dont seem to belong, im sure there are places you can call online or in your local area to help with these issues.

Hope this helped!!

_______and ________ enables computers to communicate and it can pass information between two networks.

Answers

Answer:

Internet Protocol and Transmission Control Protocol        

Explanation:

Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other.  They are developed by Bob Kahn and Vint Cerf.

If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2

Answers

Answer:

Yes

Explanation:

Because all answers are intotal (2)

3. A year contains 365 days normally, so on
what number day does Christmas fall on?

Answers

Answer:

359 is December 25 in a 365 day year.

Explanation:

Answer:

For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.

Which interpersonal skill is the most important for a telecom technician to develop?

active listening

teamwork

conflict resolution

social awareness

Answers

Answer:

active listening is interpersonal

Answer:

active listening

Explanation:

edg2021

telecom technicians go to homes and officies to listen to the consumers demands to fix their internet and other telecommmunication issues. They mostly work alone and simply need to be aware of the issue and what they are doing to fix it.

which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations​

Answers

Answer:

Hexadecimal  data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations​ .

Explanation:

Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.

Write a program that reads an integer and determines and prints whether it is odd or even.

Answers

num = int(input("Enter a number: "))

print(str(num)+" is even" if num % 2 == 0 else str(num)+" is odd")

I wrote my code in python 3.8. Best of luck.

You are suddenly given a very large (1000 ) number of old desktop computers with old CRT monitors. What could you do with them

Answers

Answer:

I would fix them if they were broken, make good use of them and give them out to other people as marketing or sell them.

Explanation:

A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?

Answers

I’m confused , what are the choices ?

Ship, CruiseShip, and CargoShip ClassesDesign a Ship class that has the following members:a. a member variable for the name of the ship (a string)b. a member variable for the year that the ship was built (a string)c. A constructor and appropriate accessors and mutatorsd. A virtual print function that displays the ship's name and the year it was built.

Answers

Answer:

def shipvari(ship);

Cruiseship="" #defining a string

YearBuilt= ""

for i in range(ship);

if Cruiseship="";

print(CruiseShip)

Give the rest a try!

A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?

Answers

Answer:

the temperature of the sample must change

Explanation:

Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or a mobile camera? Explain your answer by providing three reasons why your choice suits your needs.

Answers

Answer:

I would purchase a high-quality digital camera

Explanation:

As a blogger, I most times take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.

The light sensitivity as seen in the ISO, the shutter speed, megapixels, and view-finder are some features I would look out for in a high-quality digital camera.

Answer: To take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.

Explanation: copied the previous answer a bit to better suit the exam requirements.

A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general issues with the data. You advise the company to implement live monitoring and use ad hoc queries on stored JSON data. You also advise the company to set up smart alerting to detect anomalies in the data.You need to recommend a solution to set up smart alerting.What should you recommend?A. Azure Security Center and Azure Data Lake StoreB. Azure Data Lake Analytics and Azure Monitor LogsC. Azure Application Insights and Azure Monitor LogsD. Azure Site Recovery and Azure Monitor Logs

Answers

Answer: B. Azure Data Lake Analytics and Azure Monitor Logs

Explanation:

There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.

With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.

Other Questions
Why did President Franklin Roosevelt promote the Good Neighbor Policy? A. to improve relations between the United States and Latin America B. to end Latin American dependence on goods from the United States C. to end social inequality in Latin American nations D. to increase United States influence in Latin America which method is used to resolve disputed facts to determine the amount of an equitable adjustment when the contractor is clearly entitled to an equitable adjustment (clear proof of injury) and sufficient evidence exists for a fair approximation of the amount of the equitable adjustment (damages) Conquistadors scoured the mainland of North America in search of A. fish and furs B. land and gold C. silk and spices D new foods and medicines Please select the best answer from the choices provided O A B In 2-3 complete sentences, tell me: What characteristics of the story lead you to believe that the genre you selected for "The Fun They Had" is correct? Use details from the story.The genre is science fiction. What transition would show you that the author is comparing two things?FurthermoreAs previously statedSimilarlyWithout a doubt If the value of risk-sensitive assets exceeded that of its liabilities, the bank's profit from the interest rate will:_____a. Increaseb. Decrease I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form seeing their screen and tabs what are the results for perpetrators and victims in Darfur genocide Over the period of a year, Sam's net worth increased. Which of the following could be true?a. Sam's assets and liabilities decreased by the same amount.b. Sam's assets and liabilities increased by the same amount.C. Sam's assets increased by more than his liabilities.d. Sam's assets decreased by more than his liabilities.Please select the best answer from the choices providedABDMark this and retunSave and ExitSubmit Is (1, 3) a solution to the system of equations listed below? (1 point) y= 6x -3 y = x - 2 What is the sum of the fractions? Use the nurnber line and equivalert fractions to help find the answer.o-1o 24. H.SO, hasa) Ionic bondb) both lonic and covalent bondsc) ionic covalent and coordinate bondsd) covalent bond Which of the following is not public sector undertakings?1. Rastriya Bima Sasthan2.Hotel Himalayan3.Nepal Telecom4.DDC A woman exerts a horizontal force of 113 N on a crate with a mass of 31.2 kg.a. If the crate doesn't move, what's the magnitude of the static friction force (in N)?b. What is the minimum possible value of the coefficient of static friction between the crate and the floor? A ladder 12 m long is propped up against a building at an angle of 15. How far up the wall does the ladder go? What is one way investment consultants protect their clients money during periodic performance reviews? PLEASE HELP! First answer gets brainliest!!!1. What type of plate boundaries are A, C, and D?2. What type of crustal feature(s) will form at plate boundary D? What values do u think mountaineers and trekkers should have to protect our national heritage? Li Na is conducting research about the history of hip-hop music. Which source on her list should she avoid because it is not credible?a book about the cultural impact of famous hip-hop artistsa personal website that provides recommendations to hip-hop fansan interview with a famous hip-hop music producera set of lyrics from some of the most popular hip-hop songs x-2y=34x -8y = 12Substitution