1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
11 months ago
15

Difference between sorting and filtering​

Computers and Technology
2 answers:
Serggg [28]11 months ago
5 0
<h3>Sorting</h3>

The term “sorting” is used to refer to the process of arranging the data in <u>ascending or descending order</u>.

Example: Statistical data collected can be sorted alphabetically or numerically based on the value of the data.

<h3>Filtering</h3>

The process of data filtering involves selecting a <u>smaller part of your data set to view or analyze</u>. This is done by using that subset to view or analyze your data set as a whole.

Example: A complete set of data is kept, but only a portion of that set is used in the calculation, so the whole set is not used.

<em>Hope this helps :)</em>

balu736 [363]11 months ago
4 0

Answer:

<em>Essentially, sorting and filtering are tools that let you organize your data. When you sort data, you are putting it in order. Filtering data lets you hide unimportant data and focus only on the data you're interested in.</em>

Explanation:

Hope this will help

You might be interested in
if you want to have certain icons available regardless of what tab you are using you should add them to the
jarptica [38.1K]
The hotbar is what i think it is called but it is basically the bar of stuff at the bottom of the screen on windows computers.
4 0
3 years ago
_______are a set of track sectors, ranging from 2 to 32 or more, depending on the formatting scheme in use.
Nadusha1986 [10]

Answer:

pretty sure it's d. clusters

if not it's also probably a. cylinders

Explanation:

7 0
2 years ago
What level of system and network is required for cui
galben [10]

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

6 0
2 years ago
What file is being called by this IMG tag?
Triss [41]
The IMG tag is an image in an HTML page.
4 0
3 years ago
Read 2 more answers
Run a presentation from the beginning by clicking the Start From Beginning button located?
Murljashka [212]
It is c cuz i had this question asked my mom and she said really it is easy
8 0
2 years ago
Other questions:
  • The __________ endian storage format places the __________ byte of a word in the lowest memory address. The __________ endian st
    15·1 answer
  • Write a fragment of code that reads in strings from standard input, until end-of-file and prints to standard output the largest
    10·1 answer
  • Which invention provided instant communication and information to a massive audience for the first time?
    9·2 answers
  • Which of the following is an example of an application software?
    10·1 answer
  • Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n
    5·1 answer
  • Does scope frequently changes during a project?<br>​
    5·2 answers
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    8·1 answer
  • In workstation domain policies, _________________ provide the specific technology requirements for each device. IT staff uses re
    9·1 answer
  • What are these receivers called?
    10·1 answer
  • __________ is a Microsoft software development tool that developers can use to write multimedia applications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!