1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
1 year ago
15

You have been working as a junior data analyst at Bowling Green Business Intelligence for nearly a year. Your supervisor, Kate,

tells you that she believes you are ready for more responsibility. She asks you to lead an upcoming client presentation. You will be responsible for creating the data story, identifying the right tools to use, building the slideshow, and delivering the presentation to stakeholders.
Your client is Gaea, an automotive manufacturer that makes eco-friendly electric cars. For the past year, you have been working with the data team in Gaea’s Bowling Green, Kentucky, headquarters. For the presentation, you will engage the data team, as well as its regional sales representatives and distributors. Your presentation will inform their business strategy for the next three-to-five years.
You begin by getting together with your team to discuss the data story you want to tell. You know the first step in data storytelling is to engage your audience.
Fill in the blank: A big part of engagement is knowing how to eliminate less important details. So, you use spotlighting to _____ the data in order to identify the most important insights.
Single Choice Question. Please Choose The Correct Option ✔
A
research
B
scan
C
study
D
recheck
Computers and Technology
1 answer:
ra1l [238]1 year ago
5 0
B: scan is the answer to your question. Hope this helps!!!
You might be interested in
TRUE or FALSE: CSS is used to style web pages.
nirvana33 [79]

Answer:

true

Explanation:

HTML is the structure and CSS is the design

3 0
3 years ago
Who is a creator in the context of online photo sharing?
solniwko [45]
Image sharing, or photo sharing, is the publishing or transfer of a user's digital photos online. Image sharing websites offer services such as uploading, hosting, managing and sharing of photos (publicly or privately).[1] This function is provided through both websites and applications that facilitate the upload and display of images. The term can also be loosely applied to the use of online photo galleries that are set up and managed by individual users, including photoblogs. Sharing means that other users can view but not necessarily download images, and users can select different copyright options for their images.

While photoblogs tend only to display a chronological view of user-selected medium-sized photos, most photo sharing sites provide multiple views (such as thumbnailsand slideshows), the ability to classify photos into albums, and add annotations (such as captions or tags).

Desktop photo management applications may include their own photo-sharing features or integration with sites for uploading images to them. There are also desktop applications whose sole function is sharing images, generally using peer-to-peer networking. Basic image sharing functionality can be found in applications that allow you to email photos, for example by dragging and dropping them into pre-designed templates.

Photo sharing is not confined to the web and personal computers, but is also possible from portable devices such as camera phones, either directly or via MMS. Some cameras now come equipped with wireless networkingand similar sharing functionality themselves

photo-sharing website that helps people create an account this is answer


4 0
4 years ago
Read 2 more answers
The sender side of rdt3.0 simply ignores (that is, takes no action on) all received packets that are either in error or have the
Rom4ik [11]

Answer:

It might not work efficiently.

Explanation:

The function of the protocol rtd3.0 is to transfer data to a receiver from a sender.

As soon as the receiver received the packet transferred by the sender, we respond acknowledge (Ack) to the sender so that sender can confirm the receiver has gotten it.  

The receiver will not send any acknowledgment if the packet he receives are such that bits contain error or not in order.

After that timeout, the packet will be re-transmitted by the sender.

It is then possible the protocol might seem to be inefficient if a packet is sent many times, because other packets will have to wait to sent until the current packet is sent successfully.

The solution to prevent this kind of issue is to allow for the occurrence of premature timeouts.

7 0
3 years ago
python Assume letters A, E, I, O, and U as the vowels. Write a program that prompts the user to enter a string and displays the
Roman55 [17]

Answer:

vowels = 0

consonants = 0

string = input("Enter string: ")

for x in string:

   if x.isalpha():

       if x in "AEIOU":

           vowels += 1

       else:

           consonants += 1

print("Vowels =",vowels)

print("Consonants =",consonants)

Explanation:

8 0
3 years ago
10.( 5) Given the two relations X and Y with relation X has a columns and b rows while relation Y has c columns and d rows then
Vikki [24]

Answer:I DONT KNW THE AWNSER I NEED SOME MONEY SO YA

Explanation:

7 0
3 years ago
Other questions:
  • Your desktop computer monitor is not displaying a picture. What would you do to troubleshoot the problem?
    9·2 answers
  • How can we get the number of records or rows in a table using MySQL? *
    8·1 answer
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    10·2 answers
  • An OU structure in your domain has one OU per department, and all the computer and user accounts are in their respective OUs. Yo
    12·1 answer
  • Provide the definition for each of the following structures and unions:
    8·1 answer
  • The two fundamental approaches to moving data through a network of links and switches are
    9·1 answer
  • A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a, from a d
    11·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • RrayList Mystery Consider the following method:
    9·1 answer
  • What is the recipe for enchanting table?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!