We look for trends when we are looking at data. What is a trend?

Answers

Answer 1
Answer:

a trend is the general direction that data is going.

Answer 2
Answer: a subject of what people say at the time, most used, famous at the present time

Related Questions

Which technique will you use to make listening to audio a pleasant experience?Audio _____ is the smooth shift of one audio file into another.
Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Which of the following information security goals can be achieved by implementing countermeasures that would help prevent business partners from denying ever receive emails that were sent to them
6. Which button would you use to insert a downloaded video clip on your computer into a slide? A. Clip Art VideoB. MediaC. Online VideoD. Video on My PC7. To insert a new slide, which tab option should you select? A. DesignB. SlidesC. InsertD. Home8. Suppose you're creating a slide presentation. During the presentation, you'll need to go to a specific address on the Web. You should insert a/anA. Word file. B. table.C. hyperlink. D. graphic.9. Alan wants to find an image of a car he can use in a presentation. What button should he click in the Images group to run a search?A. Online Images B. Clip ArtC. Internet Pictures D. WordArt10. Performing a spell check can be done by clicking Spelling in which group? A. SyntaxB. ProofingC. EditingD. Grammar
What is one current method of detecting planets orbiting around other stars?A. sending probes to explore other solar systems B. observing the "wobble" of the star caused by the planet's gravity C. collecting radio waves emitted by the acceleration of the planet around the star D. viewing the planets directly using powerful telescopes like the Kepler Space Telescope
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False

In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the cameras and develop the images with various chemicals. true or false

Answers

true they had to be developed in a special way in a dark room with several chemicals. 

Answer:

true

Explanation:

true

___________ is a menu that appears when you right-click an item; the commands on a shortcut menu are related to the item you right-clicked.

Answers

Answer: Shortcut menu

Explanation: A shortcut menu is the menu in the types of contextual form. This menu appears in the graphical user interface(GUI). These menu appear like a pop- up menu for the interaction with the user.

The menu works by clicking on the right of any item/icon in the computer system.This command helps in the quick access of the menu and its functions.

In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.

Answers

Netiquette is being etiquette on the internet. Good netiquette involves respecting others privacy and not doing anything online that will annoy other people. It is important to have netiquette while online because communication online is non verbal. Having netiquette is important because it implies polite behavior and helps to build up relationships with ppl in the workspace or at a party. It is one way to show respect for other ppl  and to request respect from other ppl. It improves efficiency and productivity by helping you to be polite online and respectful of other users of the internet.

Netiquette is a form of communication done correctly online. Good netiquette involves respecting others privacy, using correct grammar, and not doing anything online that will annoy or disrupt others. It is important to have netiquette while online, because communication online is non verbal and you can’t tell how someone is reacting. Having netiquette is important. It implies that you have polite behaviors, and want to build up relationships with people in your work space or at a party you plan on attending. Netiquette is one way to show respect to a person, and to show that you deserve respect. It improves how you organize your writing, and shows how productive you can be. By helping you to become polite online and respectful to other users of the internet, Netiquette is especially important for future letters, emails, or other writing forms.


The basic premise of ___________is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.

Answers

Answer:

Radio Frequency Identification (RFID)

Explanation:

A Radio Frequency Identification uses a tag that is made up of of a tiny radio receiver and transmitter, that transmits digital data when it receives an electromagnetic pulse from a nearby RFID reader device. This makes it possible to track an item, animals, or even a person by placing a RFID tag on it, and then monitor the tagged object over a network.

A medical assistant at a local hospital is exploring the Start Menu of his/her computer and various Windows programs/application programs located there. He/she has to choose one of the software applications and create a fictional Frequently Asked Questions (FAQ) page where he/she must answer questions that people might commonly ask concerning the software application. Write 5 questions you think people might commonly ask concerning the application.

Answers

Five questions that people are most likely to ask about the application are as follows:1. What is the use and function of this application?. 2. Who is this application for? 3. How much does this application cost?. 4. Where can the application been used? and 5. Why should I use this application?

An malicious attempt to acquire sensitive data like usernames, passwords, and credit card information using email is called?a. Trojan
b. Virus
c. Phishing
d. Hopscotch

Answers

When someone wants to steal personal information like usernames, passwords, or even credit card information, that is called Phishing.