1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
2 years ago
15

William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did Willia

m have to do to clean up the data
Computers and Technology
1 answer:
ozzi2 years ago
6 0

William  had to manually edit the data if he wants to remove the null values and incorrect column headers.

<h3>What is data editing?</h3>

Data editing is known to be a term that connote the act of making changes, reviewing or adjustment  some survey data.

Note that by editing one can remove want one do not want from a group of data and as such,  William  had to manually edit the data if he wants to remove the null values and incorrect column headers.

Learn more about data from

brainly.com/question/26711803

#SPJ1

You might be interested in
Dev10 is an Active Directory Domain Services (AD DS) domain member that runs Windows 10 Enterprise.
zubka84 [21]
Do I suppose to answer a question please let me know
8 0
3 years ago
The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured
natka813 [3]

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

4 0
3 years ago
Suh my lil cuddys.... tell me what ur favorite candy is.....
LenKa [72]

Answer:

ok imma little scared, but my fav candy would have to be reeses peanut butter cups or hershey's with almonds.

8 0
3 years ago
What is the small picture or icon on the screen whose position is controlled by the mouse?
Fittoniya [83]

Answer:

cursor

Explanation:

beacause it uz controlled by pointing device, such as a mouse, pen, or trackball

7 0
2 years ago
In excel, charts can either be embedded in a worksheet or placed in a separate ____.
lana [24]
Charts can either be embedded in a worksheet or placed in a separate chart sheet.
5 0
3 years ago
Other questions:
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    11·1 answer
  • Unlike a virtual image, a real image
    7·1 answer
  • Footnotes and endnotes can be used to explain information in more detail, add opinions or comments, or to cite sources in the do
    7·1 answer
  • ______was developed as an interim management protocol with OSI as the ultimate network management protocol.
    5·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • 1. A device that can be used to insert data into a computer or other computational devices is
    6·2 answers
  • After creating the home page or any other page of a website and adding content to it, it must be displayed in a browser to view
    6·1 answer
  • My HTC Desire 510's mobile data stopped working, how to I make it work again?
    11·1 answer
  • # q7 - create function readFileFirstLast() to meet the conditions below
    10·1 answer
  • The users, groups, and roles that have access to a server are called ______________________________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!