answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
2 years ago
15

You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha

t percentage each category represents. Which type of chart would be best for this purpose?
Computers and Technology
2 answers:
aliya0001 [1]2 years ago
7 0

Answer:

Pie chart.

Explanation:

The best chart to use is a pie chart. A pie chart is a circular statistical diagram used to represent variables and their measurement in a data distribution. A variable is an element that has a value. The variables here are running, lifting weights, yoga and stretching. A pie chart can be drawn on Microsoft Excel. First, you input the individual variables and their percentages in an excel chart. Then use the tools on the excel page to draw the pie chart. The pie chart is in slices with each portion indicating the different percentages for each variable. The sizes of the pie vary according to the difference in percentages for each variable.

Harrizon [31]2 years ago
5 0

The best chart to see the data distribution for the exercise routine would be a pie chart. Using Microsoft Excel, you can input each data point you have for all you exercise routine category, and generate a pie chart which will show you the percentage for each category in comparison to the total.


You might be interested in
Write a function named "list_concat" that takes a list of strings as a parameter and returns the concatenation of all the values
Marina CMI [18]

Answer:

Following are the program in python language:

def list_concat(ls): #define function

if(len(ls) == 0): #set if condition

return ""

res = ""

for x in ls: #set for loop

res += x + " "

return res[:len(res)-1] #removing the extra spaces from list

ls = ['limit','break','ready'] #initialize the value in list

print(list_concat(ls)) #call the function

Output:

limit break ready

Explanation:

Here we declared a function "list_concat()" in which we pass an argument "ls" then check if condition that check the length of list .We also Iterating  the loop in that function  res[:len(res)-1] statement removes the extra space from the list and finally print the list

7 0
1 year ago
Why is it important to back up data on a computer before you burn-in test the cpu?
katen-ka-za [31]
A burn-in test is a test which is usually performed on a system or component by running it for a long time in order to bring out any errors or system failures etc. 
While doing it on CPU the data must be backed up as any kind of error or failure may result in the loss of data, at time systems can be repaired to retrieve data but still there is no guarantee, backing up is the best option.
5 0
1 year ago
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
2 years ago
Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combinin
Dmitry_Shevchenko [17]

Answer:

Follows are the code to this question:

#include<iostream>//defining header file

using namespace std;// use package

int main()//main method

{

int red,green,blue,x;//declaring integer variable

cin>> red >>green>>blue;//use input method to input value

if(red<green && red<blue)//defining if block that check red value is greater then green and blue  

{

x = red;//use x variable to store red value

}

else if(green<blue)//defining else if block that check green value greater then blue  

{

x= green; //use x variable to store green value

}

else//defining else block

{

x=blue;//use x variable to store blue value

}

red -= x;//subtract input integer value from x  

green -=x; //subtract input integer value from x

blue -= x;//subtract input integer value from x

cout<<red<<" "<<green<<" "<<blue;//print value

return 0;

}

Output:

130 50 130

80 0 80

Explanation:

In the given code, inside the main method, four integers "red, green, blue, and x" are defined, in which "red, green, and blue" is used for input the value from the user end. In the next step, a conditional statement is used, in the if block, it checks red variable value is greater than then "green and blue" variable. If the condition is true, it will store red variable value in "x", otherwise, it will goto else if block.

  • In this block, it checks the green variable value greater than the blue variable value. if the condition is true it will store the green variable value in x variable.
  • In the next step, else block is defined, that store blue variable value in x variable, at the last step input variable, is used that subtracts the value from x and print its value.      
5 0
2 years ago
What technique creates different hashes for the same password? ccna routing protocols final answers?
elena-s [515]
The answer is Salted Password Hashing.  The process is similar to hashing., but with a twist. A random value is introduced for each user. This salt value<span> is included with the password when the hash value is calculated and is stored with the user record. Including the salt value means that two users with the same password will have different password hashes.</span>
7 0
2 years ago
Other questions:
  • Of the following tasks, which one CANNOT be easily accomplished with a Wiki? Collaborating Social networking Editing Reading
    13·1 answer
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • Which of the following commands uses correct syntax for matching the patterns bunk or bank at the end of a line of text?
    5·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    12·2 answers
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho
    11·1 answer
  • Match the following technologies with their applications.
    9·1 answer
  • Which are types of lines? Choose three answers.
    9·1 answer
  • In this question, you will experimentally verify the sensitivity of using a precise Pi to the accuracy of computing area. You ne
    14·1 answer
  • When drivers have no control over their driving environment and are stuck in traffic, the lack of control over the traffic event
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!