Which of the following icons should you use to insert a pie chart into a slide ?

A.
B.
C.
D.


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. When using the strcat function, you must be careful not to overflow the bounds of the array allocated for the target string. 2. The C++ compiler performs strict array bounds checking whenever an array of characters is being accessed. 3. The string class append member function str.append(s)tacks a string s to the end of str. 4. It is possible to implement a string class by using a dynamically allocated array of characters. 5. The following statement declares a string object and initializes it to "Once upon a time".

Computer Science & Information Technology

Which of the following best describes X.509?

A. Public key infrastructure B. Standard used for digital certificates C. Database of revoked certificate D. Database of existing hash values

Computer Science & Information Technology

Which of the following is not a security product developer?

A. Adobe B. AVG C. McAfee D. Symantec

Computer Science & Information Technology

Actions can be stored in ____________________, which are typically named by the category of the actions they contain.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology