smart art is considered a​

Answers

Answer 1

Explanation:

visual representation of information and ideas, and a chart is a visual illustration of numeric values or data. Basically, SmartArt graphics are designed for text and charts are designed for numbers. Use the information below to decide when to use a SmartArt graphic and when to use a chart.


Related Questions

correct single error in this. Try to appear relaxed, but not to relaxed​

Answers

Try to appear relaxed, but not to relaxed .

Uses of a computer load speaker

Answers

Answer:

A computer speaker is an output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card.

I hope this will help you if not then sorry have a great day :)

Difference between hardcopy and hardware​

Answers

Hardware is the tangible, or physical, pieces that make up your computer. ... A soft copy (just like software) remains on the computer and cannot be physically touched while a hard copy (just like your computer's hardware) is a printed piece of paper that be be touched

How does a Cloud-first strategy approach a client's migration to the Cloud?

Answers

Answer:

by focusing on a single discipline based on the client's greatest area need.

You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the workstation in the Support Office. In this lab, your task is use Device Manager to complete the following:______.
The new network card you installed isn't working as expected (speed is only 1 Mbps). Until you can figure out what the problem is, disable the Broadcom network adapter and enable the Realtek network adapter. To make sure the network adapter has the latest drivers, update the driver for the Realtek network adapter by searching Microsoft Update. You recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. Roll back the driver to a previous version. Move the Ethernet cable to the integrated network port on the motherboard.

Answers

Answer:

I will fix it by my mind by thinking

Based on the above scenario, the steps to take is given below\

What is the management about?

The first thing is to Right-click Start and click on Device Manager and then you expand Network adapters.

Later you Disable the network adapter  and then Update the driver .

Learn more about Ethernet from

https://brainly.com/question/1637942

#SPJ2

The Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool, which can be used as a self-assessment tool for identifying a bank or financial institution's cybersecurity maturity.
a. True
b. False

Answers

Answer:

a. True

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The Federal Financial Institutions Examination Council (FFIEC) is an interagency of government that was established on the 10th of March, 1979. FFIEC is saddled with the responsibility of developing the Cybersecurity Assessment Tool, which is then used as a self-assessment tool for identifying the maturity of a bank's or financial institution's cybersecurity.

In a file called amortizedAnalysis.pdf, please provide answers to the following questions: How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will double in capacity each time a new item is added to an already full dynamic array

Answers

Answer:

a

Explanation:

sdfghj

d. Which of the following computer has complex system? i. Hybrid computer ii. IBM computer iii. Mainframe computer iv. Analog computer​

Answers

Answer:

Hybrid computer has complex system

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its resilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.

Answers

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

Explain how data structures and algorithms
are useful to the use of computers in
data management (10 marks)


Explain how data structure and uses of computer in data management

Answers

Answer:

Data management is a important tool for data handling.

Explanation:

A good knowledge about the data stricture and data management is a prerequisite for working with codes and algorithms. It helps to identify the techniques for designing the algorithms and data storage in the system. It helps to find out the data hierarchy. Thereby allowing the data management in an efficient and effective way. It can increase the skills in computer programming

g Add a throw statement to the processNumbers function that throws the message "An element in the list is not a number." if one of the elements in toProcess is not a number. Hint: The function isNaN() returns true if the parameter is not a number.

Answers

Answer and Explanation:

function processNumbers(alist){

var Ourarray= new array(alist);

Ourarray.foreach(

if(isNaN()){

Console.log( "An element in the list is not a number."};

break;

}

}

processNumbers(alist)

From the above, we have defined a function that takes an array parameter(the following array variable will make sure of that). We test each element in the array using foreach array function. The for each function runs the if statement and if isNan is true for each of the elements in the array.

Write a C++ function using recursion that returns the Greatest Common Divisor of two integers. The greatest common divisor (gcd) of two integers, which are not zero, is the largest positive integer that divides each of the integers. For example, the god of 8 and 12 is 4.

Answers

Answer:

The function is as follows:

int gcd(int num1, int num2){

   if (num2 != 0){

      return gcd(num2, num1 % num2);}

   else {

      return num1;}

}

Explanation:

This defines the function

int gcd(int num1, int num2){

This is repeated while num2 is not 2

   if (num2 != 0){

This calls the function recursively

      return gcd(num2, num1 % num2);}

When num2 is 0

   else {

This returns the num1 as the gcd

      return num1;}

}

Which is not a MARKETING impact of technology?

Social
Cultural
Economic
Environmental

Answers

Answer:

the answer is environmental

A _______ read inputs the first data item from a file. It typically appears immediately before the loop that processes the data from the file and inputs the remaining data from the file.

Answers

Answer:

the answer is priming read

Explanation:

hope it helps u

2.
The force of impact is

Answers

Answer:

lực ( Tiếng Anh : force ) là bất kỳ ảnh hưởng nào làm một vật thể chịu sự thay đổi, hoặc là ảnh hưởng đến chuyển động, hướng của nó hay cấu trúc hình học của nó.

Explanation:

The Curiosity Rover has recently landed on Mars and likes to send Twitter updates on its progress. If a tweet is posted 10 minutes after it was sent, how far is Curiosity from Earth? (Assume there is no network lag.)

Answers

Answer:

1.8 * 10^11 m

Explanation:

Given that :

Time taken for tweet to me posted after been sent, t = 10 minutes

t in seconds :

60 seconds = 1 minute

10 minutes = (10 * 60) = 600 seconds

Tweet sent will br transmitted at the speed of light, c = 3 * 10^8 m/s

Recall :

Speed = distance / time

Distance = speed * time

Distance of Curiosity from Earth = (3 * 10^8 * 600)

Distance of curiosity from earth = 1.8 * 10^11 m

cpp Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Ex: If the input is:

Answers

Answer:

#include <iostream>

int main() {

 // The length of the list

 int l;

 // The array containing the numbers

 int *list;

 // Threshold, last value in array

 int thresh;

 

 // Read in first value and create an array with the size of that value

 scanf("%d", &l);

 list = (int*) malloc(l * sizeof(int));

 

 for(int i = 0; i < l; i++) {

   scanf("%d", &list[i]);

 }

 thresh = list[l - 1];

 // Print the values

 for(int i = 0; i < l - 1; i++) {

   if (list[i] <= thresh) {

     printf("%d ", list[i]);

   }

 }

 

 printf("\n");

 free(list);

}

Explanation:

The program assumes at least two values are provided. The length of the list and the threshold.

We first read in an integer, and find out how many more integers we need to read. We create an array with the appropriate size, and loop through to fill the array with values. We know the last value is the threshold, and so we do one more loop to compare the values in the array with the threshold.

python is an example of a low level programming language true or false?​

Answers

False- python is an example of a high level language. Other high levels are c++, PHP, and Java

Write an algorithm to output half the value for each of the five even numbers ​

Answers

There are some steps with the help of which we can easily find the output half of the value for each of 5 even numbers.

Such steps are provided below:

Step 1:

Start

Step 2:

Declare three variables such as "temp1", "temp2", "count".

Step 3:

Initialize

the count variable to zero (0), i.e., [tex]count \leftarrow 0[/tex] and

the temp variable to zero (0), i.e., [tex]temp \leftarrow 0[/tex]

Step 4:

Repeat the steps until the count will be 5 (count < 5)

[tex]temp1 = temp1+2;[/tex][tex]temp2=temp\frac{1}{2};[/tex][tex]print \ 'temp2';[/tex][tex]count \leftarrow count+1;[/tex]

Step 5:

Stop

Lean more about algorithm here:

https://brainly.com/question/14432459

Which of the given assertion methods will return true for the code given below? Student student1 = new Student(); Student student2 = new Student(); Student student3 = student1;
The Student class is as follows.
public class Student{
private String name;
}
a. assertEquals(student1, student2);
b. assertEquals(student1, student3);
c. assertSame(student 1, student3);
d. assertSame(student1, student2);

Answers

Answer:

The true statements are :

A. assertEquals(student1,student2)  

C. assertSame(student1,student3)

Explanation:

AssertEquals() asserts that the objects are equal, but assertSame() asserts that the passed two objects refer to the same object or not, if found same they return true, else return false.

Methods are collections of named code segments that are executed when evoked

The assertion method that will return true for the given code is: assertEquals(student1,student2)  

The code segment is given as:

Student student1 = new Student();

Student student2 = new Student();

Student student3 = student1;

In Java, the assertEquals() method returns true if two objects have equal values.

Assume student1 and student2 have equal values, the statement assertEquals(student1,student2) will return true

Read more about java methods at:

https://brainly.com/question/15969952

Write a program named lastname_firstname_cities.py that works with information about large cities. Your program will open the cities.txt downloadfile. Each line in the file has the name of a city, its country, and its population. The first few lines of the file look like this:

Answers

Answer and Explanation:

Open your text editor and open new file. Save new file file as lastname_firstname_cities.py. The program will open the file cities.txt downloadfile hence :

dfile= open(cities.txt, "r")

If we write this into our lastname_firstname_cities.py file it will open our cities.txt downloadfile in read mode and text mode(by default unless we specify binary mode which is for images)


Which of the following is not a data visualization technique?

Answers

Answer:

Normalization

Explanation:

From the options given :

Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.

Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.

Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.

Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.

Essay on "Impact of Digitalization"​

Answers

Answer:

Digitization has a proven impact on reducing unemployment, improving quality of life, and boosting citizens' access to public services. Finally, digitization allows governments to operate with greater transparency and efficiency

An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the number.

a. True
b. False

Answers

true

explanation: bc it is

Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is identical to the atom 'a and an empty list otherwise. Note that you are NOT required to write a function definition!

Answers

Answer:

A

Explanation:

In the home tab under the paragraph group of options what are you unable to do?

Answers

Im not sure what this is?? Maybe add a picture or more context! ❤️

The word “computer” has become associated with anything related to screens and keyboard. However, these are not the only parts that makes the computer function. The Central processing unit is often referred to as the brain of the computer which practically coordinates all the activities in the computer. Briefly describe the operation of the Central Processing Unit with emphasis on its sub components.

Answers

Explanation: The CPU is the main control chip which calculates what has to be done in order for your computer to function.

(Very interesting question you had. Hope this answer helps)

Define a generic function called CheckOrder() that checks if four items are in ascending, neither, or descending order. The function should return -1 if the items are in ascending order, 0 if the items are unordered, and 1 if the items are in descending order. The program reads four items from input and outputs if the items are ordered. The items can be different types, including integers, strings, characters, or doubles. Ex. If the input is: bat hat mat sat 63.2 96.5 100.1 123.5 the output is: Order: -1 Order: -1

Answers

Answer and Explanation:

Using javascript:

/*This function checks only for ascending order. This function cannot check ascending orders for strings, just integers or floats.*/

function CheckOrder(){

var takeinput= prompt("please enter four numbers")

var makeArray= takeinput.split("");

var numArray= new Array(4);

numArray= [makeArray];

var i;

for(i=0; i<=numArray.length; i++){

var nowElem= numArray[i];

if(numArray[1]){

Alert("let's check to see");

}

else if(

nowElem > numArray[i--]){

Alert("might be ascending order");

if(numArray[i]==numArray[2]){

var almosthere=numArray[2]

}

else if(numArray[i]==numArray[3]){

var herenow=numArray[3];

if(almosthere>herenow){

Alert("numbers are in ascending order");

}

}

}

else(

Console.log("there are no ascending orders here")

)

}

The function above can further be worked on to also check for descending order of four numbers(can also be further developed to check for strings). You need just tweak the else if and nested else if statements thus :

else if(

nowElem < numArray[i--]){

Alert("might be descending order");

if(numArray[i]==numArray[2]){

var almosthere=numArray[2]

}

else if(numArray[i]==numArray[3]){

var herenow=numArray[3];

if(almosthere<herenow){

Alert("numbers are in descending order");

}

}

}

A choropleth map is used to
Group of answer choices

do a scatter plot.

show live satellite images.

present geographical regions in 3D.

present geographical regions coloured, shaded, or graded according to some variable.

Answers

4- present geographical regions colored, shaded, or graded according to some variable :)

Why use LinkedIn Sales Navigator?

Answers

Answer:

Salespeople and marketers waste tons of their time finding the right leads.

A lot of people think that LinkedIn Sales Navigator is only for advanced search but there are plenty of other perks as well. Its features and capabilities help you find the right people so you don’t waste your time and energy on manual searching.

Using sales navigator, you get access to a lot more features that are not present in the free version. You get limited searching with the free version.

With this LinkedIn automation tool, you can:

Search target audience with advanced filters Get recommendations for sales leads and track all the reports Use advanced filters anywhere else on the platform Get specific keyword mentions, job alerts, etc.

Other Questions
What is a compound sentence for demise? Tony brought 9 2/3pitchers of juice to a volleyball game, and the players drank3 7/8pitchers of it. How much juice is left? Permafrost is MOST found in whichclimate zone? Solve for y.3y+5=4y2y=7y = 1y = 3y = 7 What are the domain and range of each relation?Drag the answer into the box to match each relation. Samantha is about to buy her first new vehicle. She knows the model that she wants but all of the vehiclesavailable at the dealer's showroom have accessories, like fancy wheel hubs, that she doesn't need or want.Which of the following is likely to be true? HELP ME PLEASE !!!What is the main purpose for the separation of powers in the U.S.Constitution?A. To encourage fierce competition between each branch ofgovernmentB. To prevent major changes to government policies followingelectionsC. To place limits on the powers granted to each branch ofgovernmentD. To allow different states to control different branches ofgovernment what is the total surface area of 12ft, 4ft and 5ft How were the europeans affected by the deseases they brought to the natives? Data warehouses may contain many _____, subsets of a data warehouse that each deal with a single area of data. No files or links please!graph y= -4/3 x+2 using the slope and y-interceptslope: 3y-intercept: (0,-2) why is xenon monatomic but bromine is diatomic A. Gregorio has to make 84 cookies for scoutcamp. How many dozen cookies is that? An arrow travels north 56 meters in 0.7 seconds. What is its velocity? 39.2 m/s 39.2 m/s north 80 m/s north 80 m/s KThe solution is kK/6+5=17The solution is k= expand and simplify (x+7)(x+1) HELLLLLLP RNNN PLSSSSSSSSSSSS The long distance runner was thin but a. wiry b. stringy c. wary d. worried 330 is what percent of 750? HelloWhat is the link between Martin Luther Kings dream of integration and Langston Hughes poem Let America be the dream the dreamers dreamed about? Thank you