answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stich3 [128]
2 years ago
4

In her math homework, Sarah has to add a column chart with the help of an OpenOffice spreadsheet. Arrange the steps in the corre

ct sequence.
Tiles Choose the chart type and click that option



Choose the data series



Click Insert



Choose the data range



Click Chart



Click Finish and add a legend



Choose the chart elements
Computers and Technology
1 answer:
lisabon 2012 [21]2 years ago
8 0

Answer:

1) Choose the data range 2) Click Insert 3) Click Chart 4) Tiles Choose the chart type and click that option 5) Choose the data series 6) Choose the chart elements 7) Click Finish and add a legend

Explanation:

To create a column chart, you will need to

Highlight the data range and click the insert tab

Click the column chart and then select the chart on the drop down menu.

The chart type will be inserted. If you want to change how your data is displayed, you can choose the entire data series or select a data series of your choice and then click on the design tab and choose your desired element.

You can also add a legend if you want to

You might be interested in
Which of the following represents the bus topology? Multiple Choice All devices are connected to a central device, called a hub.
Yanka [14]

Answer: All devices are connected to a central cable or backbone.

Explanation:

"All devices are connected to a central cable or backbone". Bus Topology refers to a logical or physical network's design. Bus Topology is also the network setup for a LAN (Local Area Network) nodes connected to a "backbone" or cable. The Bus setup connects every single computer and network to a single cable. Among others, the type of cable implemented for bus topology is usually a coaxial cable.

3 0
2 years ago
Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company ne
____ [38]

Answer:

The best cloud option for Widget Corp considering the cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world.

Is a hybrid could.

Explanation:

The reasons behind this answer are that in the first place the cloud is not going to be fully managed by a third party, but also by the IT department of Widget Corp allowing it to control its security. Also, that the cloud can be adapted to public or mainstream sources, resources, and platforms. Making it very user friendly and lowering down specific knowledge to use it.

5 0
2 years ago
Anna bought a box of blueberries for £7. She used 700 grams for a cheesecake and she has 450 grams left. How much did the bluebe
xxTIMURxx [149]

0.61 (rounded up)

Explanation:

You add both 700 and 450 which will give you 1150g

You then divide 1150 by 100 which gives you 11.5

Then divide 7 by 11.5 which will give you 0.61 as cost of every 100 grams

8 0
2 years ago
In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria. in
nikklg [1K]

I guess the correct answer is Project

If thе usеr is intеrеstеd in sеlеcting thе valuеs οf a fеw attributеs, rathеr than sеlеctiοn all attributеs οf thе Tablе (Rеlatiοn), thеn οnе shοuld gο fοr Prοjеct Οpеratiοn.

8 0
2 years ago
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
2 years ago
Other questions:
  • What language(s) must be used to display a bare-minimum web page?
    9·2 answers
  • Judd puts password protection on all of his files, makes sure not to have any patient information open on his computer when he t
    12·2 answers
  • Choose the correct sequence for classifier building from the following.
    7·1 answer
  • When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
    15·2 answers
  • Consider the following network: proxy-cache On average there are 35 objects downloaded per second, and the average object size i
    14·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if
    7·1 answer
  • Write a program that simulates the functionality of a vending machine having the following characteristics:• The vending machine
    11·1 answer
  • Omar wants to add transitions to his presentation, so he clicks the Transitions tab. Which tasks can he now complete? Check all
    10·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!