Which axis in a chart displays the descriptive labels for the data points?

A) Category B) Series C) Value D) Data


A

Computer Science & Information Technology

You might also like to view...

The evaluation criteria for SHA-3 are security, ___________, and algorithm and implementation characteristics.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The value for the width property in the table style can be a percentage based on ____.

A. the table's parent container B. some arbitrary value C. the size of the table D. the screen resolution

Computer Science & Information Technology

In an Active Directory context in which there are multiple hierarchies of domains, trees, and forests, ____ provide a means to span domains and trees.

A. domain security groups B. domain local groups C. global security groups D. universal security groups

Computer Science & Information Technology

Which of the following employs a 160-bit hash?

A. MD5 B. SHA-1 C. SHA-2 D. NTLM

Computer Science & Information Technology