1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
2 years ago
8

question 1 scenario 1, question 1-5 you’ve just started a new job as a data analyst. you’re working for a midsized pharmacy chai

n with 38 stores in the american southwest. your supervisor shares a new data analysis project with you. she explains that the pharmacy is considering discontinuing a bubble bath product called splashtastic. your supervisor wants you to analyze sales data and determine what percentage of each store’s total daily sales come from that product. then, you’ll present your findings to leadership. you know that it's important to follow each step of the data analysis process: ask, prepare, process, analyze, share, and act. so, you begin by defining the problem and making sure you fully understand stakeholder expectations. one of the questions you ask is where to find the dataset you’ll be working with. your supervisor explains that the company database has all the information you need. next, you continue to the prepare step. you access the database and write a query to retrieve data about splashtastic. you notice that there are only 38 rows of data, representing the company’s 38 stores. in addition, your dataset contains five columns: store number, average daily customers, average daily splashtastic sales (units), average daily splashtastic sales (dollars), and average total daily sales (all products). considering the size of your dataset, you decide a spreadsheet will be the best tool for your project. you proceed by downloading the data from the database. describe why this is the best choice. 1 point
Computers and Technology
1 answer:
zvonat [6]2 years ago
6 0

In the case above, the right thing that one need to do  is to  Download the data as a .CSV file, then import it into a spreadsheet.

<h3>What is in a CSV file?</h3>

A CSV is known to be a comma-separated values file and this is said to be a a text file that is known to contain all the information that is often separated by the use of commas.

Note that the CSV files are said to be one that are known to be commonly seen in spreadsheets as well as in databases.

A person can be able to make use of a  CSV file to be able to transmit data between programs that are known to be not ordinarily available to exchange data.

Therefore, In the case above, the right thing that one need to do  is to  Download the data as a .CSV file, then import it into a spreadsheet.

Learn more about CSV file from

brainly.com/question/14338529

#SPJ1

You might be interested in
What type of system converts between plaintext and ciphertext?
IRISSAK [1]
Cryptographic system converts between plaintext and ciphertext. Cryptography is t<span>he process of making and using codes to secure transmission of information.
The c</span>ryptographic system involves encryption (the process of converting original message into a form unreadable by unauthorized individuals) and decryption (t<span>he process of converting the cipher text message back into plaintext so that it can be readily understood.)</span>
7 0
3 years ago
When you create an internal hyperlink, you create the link that points to the bookmark using the anchor tag with which attribute
abruzzese [7]
You use the href attribute. <a href="apage.html"> My Page</a>
7 0
3 years ago
Can Anybody Answer This For Me ?
AlladinOne [14]

Answer:

I'm pretty sure its 3 only (c) III only gimme brainliest

3 0
4 years ago
"which term is used to describe the process of encasing one protocol or packet inside another protocol or packet
svlad2 [7]
<span>tunneling Term used 
process of encasing one protocol or packet inside another protocol or packet</span>
7 0
3 years ago
Hiding an object, such as a diary, to prevent others from finding it is an example of:______________.
madreJ [45]

Answer:

Privacy

Explanation:

I'm not sure but it matches the description you gave.

4 0
3 years ago
Other questions:
  • Which is the best method of marketing a game to casual players?
    14·2 answers
  • Which step is first in changing the proofing language of an entire document?
    13·1 answer
  • Which of the following statements most accurately describes the difference between aptitudes and skills?
    8·1 answer
  • A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
    5·1 answer
  • Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
    8·1 answer
  • What kind of software is Microsoft Outlook??
    15·2 answers
  • People, can anyone point me a highlighter for google chorme ?
    11·1 answer
  • Question 1
    8·1 answer
  • Only about 10 percent of the world’s population uses the internet.
    6·1 answer
  • if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!