1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
2 years ago
12

now, it’s time to process the data. as you know, this step involves finding and eliminating errors and inaccuracies that can get

in the way of your results. while cleaning the data, you notice there’s missing data in one of the rows. what might you do to fix this problem? select all that apply.
Computers and Technology
1 answer:
nikklg [1K]2 years ago
5 0

The thing that a person need to do that might  fix this problem are:

  • Ask a colleague on your team how they've handled similar issues in the past
  • Ask you supervisor for guidance.
<h3>What are errors in quantitative analysis?</h3>

The term error is known to be a word that connote a mistake in a given work. Note that the types of errors in lab measurements are random error, systematic error, and others.

To be able to  remove or correct error, one must have the knowledge of what the error is and when you do not know, it is good you ask others.

Therefore, The thing that a person need to do that might  fix this problem are:

  • Ask a colleague on your team how they've handled similar issues in the past
  • Ask you supervisor for guidance.

Learn more about Error from
#SPJ1

See options below

Sort the spreadsheet so the row with missing data is at the bottom

Ask a colleague on your team how they've handled similar issues in the past

Ask you supervisor for guidance

Delete the row with the missing data point

You might be interested in
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
An operating system that allows a single user to work on two or more programs at the same time is what type of OS?
Lisa [10]

Answer:

Explanation:

The correct answer is none of these

An operating system that allows a single user to perform only one task at a time is called a Single-User Single-Tasking Operating System. Functions like printing a document, downloading images, etc., can be performed only one at a time. Examples include MS-DOS, Palm OS, etc.

Advantage: This operating system occupies less space in memory.

Disadvantage: It can perform only a single task at a time.

There are four types of operating systems −

Real-time operating system

Single-User/Single-Tasking operating system

Single-User/Multitasking operating system

Multi-User/Multitasking operating system

Real-time operating system is designed to run real-time applications. It can be both single- and multi-tasking. Examples include Abbasi, AMX RTOS, etc.

An operating system that allows a single user to perform more than one task at a time is called Single-User Multitasking Operating System. Examples include Microsoft Windows and Macintosh OS.

It is an operating system that permits several users to utilize the programs that are concurrently running on a single network server. The single network server is termed as "Terminal server". "Terminal client" is a software that supports user sessions. Examples include UNIX, MVS, etc.

5 0
3 years ago
Which of the following does not make a good analysis class? (Points : 6) its name reflects its intent
satela [25.4K]

Answer:it has high coupling

Explanation: Coupling is the property in the field of computer program that is defined as the functions ,data and  codes of the program are dependent on each other and cannot be changed independently if requires. Thus,high amount of coupling is not considered as good factor due to high interdependence. Loose coupling can be still permitted.

Other options are correct because name of the class should reflect the purpose and well defined responsibilities should be present, modeling of certain component and high cohesion means keeping similar functions togather is also required. So, the only bad factor is high coupling

6 0
3 years ago
your computer running Windows 10 is doing some very strange things with operating system you are fairly certain it is not a hard
AlekseyPX
It might be a virus, when my computer starts going crazy i just bought a fixme stick and they work amazing or trying getting an expert to fix it if it worse
6 0
3 years ago
Read 2 more answers
Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
Lerok [7]
<span>Images are available in many formats, such as tif, bmp, gif, jpeg, and png.

</span>Hope that helps.
7 0
3 years ago
Other questions:
  • To add and remove chart elements, you can use the add chart element button in the charts layout group on the ____ tab.
    6·1 answer
  • You can use ???? a to test tread wear on your tires
    14·2 answers
  • &gt;&gt;&gt; import math &gt;&gt;&gt; print(math.Pi) 3.141592653589793 &gt;&gt;&gt; def print_volume(): print ("What is the radi
    12·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses with
    12·1 answer
  • PLZZZ HELP!!! I’ll give brainliest
    12·1 answer
  • You are the IT Administrator for a small corporate network. Until now, the network has consisted only of workstations accessing
    6·1 answer
  • Which term is used in object-oriented programming to reference characteristics of an object?
    15·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!