The area of a chart bounded by the axes.

A. data labels
B. legend
C. plot area


Answer: C. plot area

Computer Science & Information Technology

You might also like to view...

____________________ view displays contacts as if they were business cards.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If the organization employs the Deny All rule, the hacker's effectiveness could be reduced

Indicate whether the statement is true or false.

Computer Science & Information Technology

A _____ is a security weakness or soft spot.

A. proxy B. vulnerability C. firewall D. malware

Computer Science & Information Technology

When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users.

A. decision B. knowledge C. expert D. analysis

Computer Science & Information Technology