1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
9

Peter is a data analyst in a financial firm. He maintains a spreadsheet that contains all employee details. Peter wants to analy

ze the data of all employees that have experience of more than five years. Which technique can Peter use to perform this analysis?
A. sort the data of employees with up to five years of experience

B. filter the data of employees with more than five years of experience

C delete the data of employees with less than five years of experience

D. sort the data of employees with more than five years of experience
Computers and Technology
1 answer:
Mars2501 [29]3 years ago
6 0

Answer:

The option B is correct. Filter the data of employees with more than five years of experience.

Explanation:

Filter is a feature in spreadsheets which let you see the data required to see based on some condition. Only the filtered data is shown and other is skipped for current view. So if there is any column in spreadsheet for employees experience than filter it with the selecting the filter to more than five years. Less than five and 5 option will be unchecked and other remain checked.

I hope it will help you!

You might be interested in
a FOR loop that will draw 3 circles with a radius of 20 exactly 50 points apart in a vertical line. the first points should be (
svlad2 [7]

Answer:

hfdhcb

Explanation:

lhvsxdlwsd

3 0
2 years ago
which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst
Ugo [173]

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

7 0
3 years ago
Assume the int variables i, lo, hi, and result have been declared and that lo and hi have been initialized. Write a for loop tha
IRISSAK [1]

Answer:

result=0;

for (i=lo ; i<=hi; i++){

result += i;

}

Explanation:

The question says result was declared but not initialized, so using result without initializing it to 0 would throw an error as result would be undefined and you can't add a number to undefined

Another way to do it to keep everything inside the loop would be

for (i=lo ; i<=hi; i++){

if (i==lo) result= 0;

result += i;

}

but this is impractical since it would add unnecesary operations in each cycle of the loop

4 0
3 years ago
What were second generation languages that required detailed knowledge of the computer's hardware and a lot of spare time to wri
Natalija [7]

Answer:

Assembly language is also known as second generation language. We can also say it low level language. To implement assembly language on hardware it require a lot of knowledge of computer hardware.

Mostly assembly language is used in Kernel and hardware drives like RAM or ROM these hardware parts belong to second generation. So, assembly language require a lot of knowledge of hardware as well spare time also to write it to get desired output from the hardware.

Assembly language is also used in video editing and video games and require a lot of time.

I hope it will help you!

4 0
3 years ago
What is Discord Packing????
maria [59]

Answer:

my discord is outback_streakhouse#7277

6 0
3 years ago
Other questions:
  • DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely
    11·1 answer
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • With modeling and simulation, we model the system and then test the ______________ to gather test predictions.
    7·1 answer
  • Which are advantages of using a server operating system?
    12·1 answer
  • Heres the last questions
    5·1 answer
  • Explain how to number text in a document​
    7·2 answers
  • Which of the following is a characteristic of the college savings plan
    9·2 answers
  • Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as
    12·1 answer
  • Micro sleep is when you ____.
    11·2 answers
  • How will technology help people with disabilities become more transportation independent?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!