A chart that shows the relationship between two variables.

What will be an ideal response?


X Y (scatter) chart

Computer Science & Information Technology

You might also like to view...

In the particular case of ____, the physical security professional is responsible for installing, testing, and updating the physical security controls.

A. forensics B. continuity management C. risk management D. incident management

Computer Science & Information Technology

Track Changes should be used to show proposed edits to a document, whereas __________ should be used to raise questions or make suggestions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ decreases search time.??

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An organization has introduced token-based authentication to system administrators due to risk of password compromise. The tokens have a set of numbers that automatically change every 30 seconds. Which of the following type of authentication mechanism is this?

A. TOTP B. Smart card C. CHAP D. HOTP

Computer Science & Information Technology