Which axis in a chart displays the descriptive labels for the data points?
A) Category B) Series C) Value D) Data
A
Computer Science & Information Technology
You might also like to view...
The evaluation criteria for SHA-3 are security, ___________, and algorithm and implementation characteristics.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The value for the width property in the table style can be a percentage based on ____.
A. the table's parent container B. some arbitrary value C. the size of the table D. the screen resolution
Computer Science & Information Technology
In an Active Directory context in which there are multiple hierarchies of domains, trees, and forests, ____ provide a means to span domains and trees.
A. domain security groups B. domain local groups C. global security groups D. universal security groups
Computer Science & Information Technology
Which of the following employs a 160-bit hash?
A. MD5 B. SHA-1 C. SHA-2 D. NTLM
Computer Science & Information Technology