1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
9

Peter is a data analyst in a financial firm. He maintains a spreadsheet that contains all employee details. Peter wants to analy

ze the data of all employees that have experience of more than five years. Which technique can Peter use to perform this analysis?
A. sort the data of employees with up to five years of experience

B. filter the data of employees with more than five years of experience

C delete the data of employees with less than five years of experience

D. sort the data of employees with more than five years of experience
Computers and Technology
1 answer:
Mars2501 [29]3 years ago
6 0

Answer:

The option B is correct. Filter the data of employees with more than five years of experience.

Explanation:

Filter is a feature in spreadsheets which let you see the data required to see based on some condition. Only the filtered data is shown and other is skipped for current view. So if there is any column in spreadsheet for employees experience than filter it with the selecting the filter to more than five years. Less than five and 5 option will be unchecked and other remain checked.

I hope it will help you!

You might be interested in
) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
vovikov84 [41]

Answer:

Machine’s IP=126.127.85.170, Machine’s Netmask=/27, Parent’s Netmask=255.255.240.0 .

a) Machine's Netmask = /27 : therefore no. of remaining bits for hosts =32-27 = 5 bits.

b) No. of usable addresses in the child network = 25 -2 = 32-2 =30 [Since first(network ID of the machine) and last ip (broadcast address of the machine ) addresses are not used ]

c) first usable address is on this child network (subnet) =

First, find out the network id of machine can be found out by doing bitwise AND machine's IP and Machine's subnet mask :

01111110. 01111111.01010101.10101010 (IP)

11111111. 11111111 .11111111 .11100000 (Subnet Mask)

01111110. 01111111. 01010101.10100000 (Network ID )

first usable address is on this child network (subnet) :   01111110. 01111111. 01010101.10100001

: 126.127.85.161

d) what the last usable address is on this child network (subnet) :  01111110. 01111111. 01010101.10111110

: 126.127.85.190

e) what the child network’s (subnet's) broadcast address is :

In the directed broadcast address , all the host bits are 1. Therefore, broadcast address :

01111110. 01111111. 01010101.10111111 (126.127.85.191)

f) what the child network's (subnet's) network number is : Network ID has already been calcuulated in part c .

01111110. 01111111. 01010101.10100000 (126.127.85.160)

6 0
3 years ago
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they
Ahat [919]

Answer:

California Identity Theft Statute

Explanation:

The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.

4 0
3 years ago
An exclusion contract A. gives a firm the right to be the exclusive provider of a good in a particular market. B. is a form of e
irina1246 [14]

Answer:

D. All of the above

7 0
3 years ago
Which of the following is true about strings?
pickupchik [31]

Answer:

Your answer is option C, or the third option.

They do not let the user type in letters, numbers, and words.

Explanation:

Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.

5 0
3 years ago
C Programming:
natita [175]
This is how to answer this programming question:

#include <stdio.h>
#include <conio.h>

int main(void)
{
   char letterStart;
   
   <span>fflush(stdin);</span>
   printf("Input character: ");
   scanf("%c", &letterStart);
   
   print("Next Letter: %c", ++letterStart);
   
   getch();
   clrscr();
}

7 0
3 years ago
Read 2 more answers
Other questions:
  • A file that contains program code is called a ____________.
    13·1 answer
  • Write a MARIE program to allow the user to input 8 integers (positive, negative, or zero) and then find the smallest and the lar
    15·1 answer
  • File-sharing programs such as Napster, Kazaa, and iMesh make it possible for individuals to exchange music files over the Intern
    7·1 answer
  • A user's computer will not boot. A technician notices four indicator lights on the backside of the
    8·1 answer
  • _____________ describes the abstraction of web-based computers, resources, and services that system developers can utilize to im
    9·1 answer
  • Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol
    15·1 answer
  • Please help me ASAP! Here is the question.
    15·1 answer
  • PLS HELP IM SO DESPERATE!! 40 points
    7·1 answer
  • Define computers software.dicuss the types of computer software​
    5·1 answer
  • Question 1
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!