The ____________________ is the vertical line to the left of the graph.

Fill in the blank(s) with the appropriate word(s).

value axis

Computer Science & Information Technology

You might also like to view...

Which of the following network security standards provides an overview of information security and defines six phases of the IT security life cycle?

A) NIST SP 800-14 B) NIST SP 800-35 C) ISO 27036 D) NIST SP 800-30 Rev. 1

Computer Science & Information Technology

Once a candidate has accepted a job offer, the employment ____________________ becomes an important security instrument.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology