The area of a chart bounded by the axes.
A. data labels
B. legend
C. plot area
Answer: C. plot area
Computer Science & Information Technology
You might also like to view...
____________________ view displays contacts as if they were business cards.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
If the organization employs the Deny All rule, the hacker's effectiveness could be reduced
Indicate whether the statement is true or false.
Computer Science & Information Technology
A _____ is a security weakness or soft spot.
A. proxy B. vulnerability C. firewall D. malware
Computer Science & Information Technology
When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users.
A. decision B. knowledge C. expert D. analysis
Computer Science & Information Technology