Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _____ tool to create a clean and consistent visual appearance for their spreadsheets.

Answers

Answer 1

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called clear formats.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

Data consistencyData integrityReliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: https://brainly.com/question/15334693


Related Questions

how computer network reduce the cost of computer hardware? explain with example.​

Answers

Answer:

The biggest advantage of computer network is that the hardware components such as printers memory etc. can be shared by multiple computers. Hence it reduces the hardware cost of an organization

Answer:

One main method computer networking reduces the cost of computer hardware through the sharing of hardware component and resources including printers, faxes, memory space for data storage, processor, graphics capabilities, and internet access devices both locally, within a building and across sites

Computer network allows the sharing of a single resource mentioned above with several other computers, such that a single unit of each resource can be used by members of the same organization

Computer network also reduces the cost of additional space required where each computer is connected to its own components

Explanation:

cises t Answer Questions 1. What is Open source Operating System? Write the advantages and disadvantages of Open source Operating System.​

Answers

Answer:

Question 1. Open source operating system is an operating system that allow the public to view and edit the source codes on which the operating system is developed, and any user can have access to and edit the source code

Advantages of Open Source Operating System

a) Open-source operating system are usually free, or very low price

b) The open source operating system are constantly being evaluated globally by skilled users and developers that can get bugs fixed once they are detected

c) Open-source operating system can be customized

Disadvantages of Open Source Operating System

a) The free access to the source code increases the vulnerability of open-source operating system to attacks

b) Users are expected to have a certain level of technical proficiency to be able to use an open-source operating system

c) The open-source operating system comes without a customer support service

Explanation:

who is Lady Augusta Ada Lovelace



Answers

Answer:

Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine.

Who said the following, and what does it mean? Conceit, more rich in matter than in words, Brags of his substance, not of ornament. They are but beggars that can count their worth; But my true love is grown to such excess I cannot sum up half my sum of wealth. (II. vi. 33-37) Juliet; she is saying that she doesn't care about money. Lady Capulet; she is reminding Juliet how lucky she is to be marrying Paris. Romeo; he is saying that true understanding has made him realize how very lucky he is to be marrying Juliet. Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Answers

Answer: Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Explanation:

Juliet was talking to Romeo in this instance and trying to tell him that it was easy to speak words but that for those words to be properly understood, action must follow them.

In other words she was telling him that to truly understand something, actions must back it up. She then goes on to say to him that the love she has is so much that it has made her feel more wealthy.

What is self management.​

Answers

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

Self management is the ability to regulate own's emotions, thoughts, and behaviors effectively in different situations.

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

Define Fiber optic cable​

Answers

an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light

Explanation:

An optical fiber is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly thicker than that of a human hair.

what is the working principle of computer?​

Answers

Answer:

input, process, output, storage

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future

Answers

Answer:

The organization could make it so that specific websutes that seem fake/unsafe are not accessible to the users. For example, downloading an extension into all the devices, that blocks these malicious websites (uBlock Origin)

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM

What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables

Answers

Answer:

A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.

(11011+1001) base 2
please slove this​

Answers

Answer:

Explanation:

We can convert both to base 10 first:

(1+2+8+16) + (1+8) = 36.

Converting back to base 2, we get

100100

You want to add a new Product and Services entry to your client's QuickBooks Online company. The service is installation of a server that doesn't include the cost of the hardware. Here are some steps for getting the job done. 1. Select the Gear icon, select Products and Services, then select New 2. _____________________________________________ 3. In the Name field, type Server installation 4. In the Sales information field, type Server installation 5. Sale price/rate is $1250 6. In the Income Account drop-down, select Service/Fee Income 7. Select Save and close

Answers

Answer:  

The correct answer is Option 3: "Select Service"  

You have to select "Service" in the Second Step.  

Only after that, you'll be able to name the Service in the following step.  

Other options are invalid for a given question.

How is IT used in entertainment to make cartoon movies

Answers

Answer:

Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.

hope you will get this answer correct

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

a malware is any program designed to do harm

Explanation:

a malware (malicious software) is any software intentionally designed to cause damage to a computer,server, client or computer network.

PLEASE ANSWER ASAP

Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].

Answers

Answer:

ENQUIRE database.

Explanation:

I am not sure but I guess this is the answer.

(a) Rewrite the following using if else statement:
int x;
String s=(x%3=0)? “Divisible by 3" : "Not divisible by 3";
System.out.println(s);​

Answers

Answer:

int x;

String s;

if ((x%3) == 0) {

   s = "Divisible by 3";

} else {

  s = "Not divisible by 3";

}

System.out.println(s);​

Explanation:

A : B ? C generally translates to if (A) { B } else { C }.

Note the == to compare to 0. The single = in the original expression is a mistake.

While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the Web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the Web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario

Answers

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

Which method deletes a footer from a document?

Double-click the footer region and delete all the content in the Footer.
Click on the Insert tab on the ribbon, click the Footer button, and select Remove Footer from the list.
Double-click the footer region; under the Design tab in the Header & Footer group, click on the Footer button and select Remove Footer from the list.
All the above are methods for deleting a footer from a document

Answers

The first option is your answer DOUBLE CLICK THE FOOTER REGION ECT

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variables like "city" and "rates") for a part of a similar app that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you've written (you can defend your proposal if the connection is not immediately obvious).

Answers

Answer:

Is this a question or an answer

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

Which vendor owns the software platform Fusion?
A.
Microsoft
B.
Apple
C.
SAP
D.
Oracle

Answers

Answer: D

Explanation:

D. Oracle owns the software platform Fusion

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

When I’m design view, Henrietta deleted a previous criterion, added a new column, and filtered patients’ age. Which best describes what Henrietta did?

Answers

Answer:

Explanation:

b

What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system. While a web producer maintains a company’s websites, the web master maintains a company’s entire web-based system. While a web master maintains a company’s web presence, the web producer maintains all technology at a company. While a web producer maintains a company’s web presence, the web master maintains all technology at a company.

Answers

Answer:

While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system.

I'm assuming that's A

list any six area where computer used

Answers

Answer:

I. Banking and finance.

II. Hospitals.

III. Schools.

IV. Defense and military.

V. Office.

VI. e-commerce.

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

The six (6) areas in which a computer can be used are;

I. Banking and finance.

II. Hospitals.

III. Schools.

IV. Defense and military.

V. Office.

VI. e-commerce.

Software that tries to monitor and track the way you use your computer.​

Answers

Explanation:

that's called a virus, and it can do much harm to your softwares

From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.

Hope this helps! Have a great day!

A program in the cyberspace and intercept messages containing specific text A. Virus B. Sniffers C. Worm D. Bomb

Answers

Answer:

B. Sniffer

Explanation:

The type of program that is being discussed is called a Sniffer. This can either be a software or hardware that allows the user to intercept data flowing from a computer to the internet in real-time before it reaches its destination. The program can be very vague and intercept all the data coming and going to the target computer or it can be very specific and intercept only the data in which it was programmed to target (sniff out). Cyber Criminals use these programs/devices to steal valuable information that they know a user is going to send sooner or later over the internet.

Other Questions
5+(-7)=A-12B-22D12Enone of these If people breathe in deeply, their .......... can expand to twice normal size.A. hearts B. kidneys C. stomachs D. lungs Plasmodial slime molds are characterized by:Select one:a. The ability to go from a single cell to multicellular organismb. Their color and shapec. The existence of multiple nuclei in a supercelld. The presence of chloroplasts make a list of the areas of work of gehendra shumsher how can mud cracks cause flooding? Using the Chipotle example we have discussed in class imagine that all employees are paid $15/hour, the grill costs $300, and each cash register costs $200. All other utensils and items come at zero cost. Applying the principles of business process improvement that we have discussed in class, what is the lowest cost Chipotle can achieve with the highest flow rate pleeaseeee help me !!! Which of the following pairs of functions are inverses of each other? A. f(x) = 5 + x and g(x) = 5 - x B. f(x) = 2x -9 and g(x)=x+9/2C. f(x) = 3-6 and g(x)=x+6/2D. f(x)= x/3+4 and g(x) = 3x - 4 write fifty and two hundreds eight thousandths as a mixed decimal What is the sum of the geometric sequence 1, 3, 9, ... if there are 10 terms? (5 points) A =194 1 87 4 44 8 1 Altex Inc. manufactures two products: car wheels and truck wheels. To determine the amount of overhead to assign to each product line, the controller, Robert Hermann, has developed the following information. Car Truck Estimated wheels produced 40,000 10,000Direct labor hours per wheel 1 3Total estimated overhead costs for the two product lines are $770,000.Required:a. Calculate overhead rate.b. Compute the overhead cost assigned to the car wheels and truck wheels, assuming that direct labor hours is used to allocate overhead costs. The SEI/CERT website is full of best-practices for developing secure code for various popular programming languages. Select a software threat/vulnerability of your choice and idenitfy two secure coding practices to mitigate that threat/vulnerability. You may choose any programming language you wish. which of the following is not a component of polysaccharide ? A, glucose B cellulose C sucrose D glycogen Read and choose the option with the correct affirmative t (informal) command to complete the sentence.________ de la casa a las ocho de la maana para hacer diligencias. Almorzamos a la una de la tarde; no llegues tarde. Sal Sala Sale Salgo mohan drew a beautiful map of our country (question tag) what are the central problems of an economy? Glycogen is an important and quickly mobilized source of stored glucose. Glucose is mobilized for ATP generation in muscle in response to epinephrine, which activates Gs. How would inhibitors of cAMP phosphodiesterase affect glucose mobilization in muscle arc length of an oval that is 6ft by 5ft. i just want 1/4 of the oval. i want to find out how long i would need a wire to go from the ground to the middle of the "dome".the picture explains it better.in the end i want to have a wire frame around the garden and than take some netting and use that to keep out the big bugs and birds. i will of course use zip ties to attach the screen/netting to the frame. unless there is a easier and cheaper way to do this. Every day Manuel buys coffee from the same woman on the way to work. Even though he always sees her, when a friend asks, he cannot remember the color of her hair. Manual most likely experienced a problem in the ________ process of memory.