1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
4 years ago
15

In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The

graduates include students majoring in management, finance, accounting, information systems, and marketing. Create a PivotTable in Excel to display the number of graduates in each major and the average monthly starting salary for students in each major.

Computers and Technology
1 answer:
SVETLANKA909090 [29]4 years ago
7 0

Answer:

The pivot table is attached below

Explanation:

procedure used to create the Pivot Table

  • select insert from worksheet Ribbon
  • select pivot table
  • select the range of Data
  • select   "new worksheet "
  • select Major as row heading and the summation symbol to count the major
  • input variables given in their right cells

after this procedure the table is successfully created

Attached below is the Pivot Table in Excel displaying The number of graduates in each major and average monthly salaries

You might be interested in
Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order
cricket20 [7]

Answer:

Select the data to sort

Explanation:

4 0
3 years ago
Explain in details three security countermeasures you know.​
SpyIntel [72]

Answer:

The three options are:

1. Avoid sharing files and folders over the network without the permission of your administrators. You might fall in trouble otherwise.

2. Never share your credit card details with a third party through the internet. You can lose a lot of or all your money.

3. Always ensure that your password is strong enough or else your account can be hacked, And never share them with anybody.

Explanation:

Please check the answer.

4 0
3 years ago
One reason to buy a home instead of rent a home is:
vazorg [7]
A is the correct Answer

7 0
4 years ago
Of the 5 factors that should be evaluated when assessing information's quality (Validity, Reliability, Accuracy, Timeliness, and
Art [367]
Validity is the best asseng information to evaluate the all factors
8 0
2 years ago
Write an algorithm to find perimeter of circle<br>​
Anna11 [10]

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

6 0
3 years ago
Other questions:
  • CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique appr
    15·1 answer
  • If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
    6·2 answers
  • William has an internet connection that does not allow him to make calls when connected to the internet. what internet service c
    7·2 answers
  • What command launches the remote desktop client for windows?
    12·1 answer
  • Word processing, presentation, photo editing, and video games are all types of what?
    9·2 answers
  • According to the municipal solid waste report what are the benefits of recycling
    6·1 answer
  • The function below takes two arguments, a dictionary called dog_dictionary and a list of dog names (strings) adopted_dog_names.
    8·1 answer
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • Demons I shall be your eternal nightmare
    13·1 answer
  • What kind of energy transformation occurs when you call someone on a cell phone?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!