1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
11

Which statement is true about the filtering technique? A. You cannot apply multiple filters. B. You cannot remove a filter once

applied. C. You can’t unhide rows by removing filters. D. You can only apply filters to text data.
Computers and Technology
1 answer:
Naily [24]3 years ago
5 0

Answer:

<u>C. You cannot unhide rows by removing filters</u> is the correct statement about filtering technique.

Explanation:

We can apply multiple filters for rows or columns. If we would like to view the data satisfying multiple filters, this option can be used.

Once a filter is applied, it can be removed or added again. The hidden rows or columns will be visible once all the filters are removed. By building a selection list of all the rows that should not be visible, we can hide the rows by removing filters.  

Filters can be applied to any row or column.

You might be interested in
Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
eimsori [14]
The answer is C. Shareware
4 0
3 years ago
Read 2 more answers
Write a program that responds to a positive integer passed on the command line with the number of bits needed to express that nu
jolli1 [7]
You may want to rephrase the output.

```
#!/usr/local/bin/python3

### Written for Python version 3! ###

import sys

num = int( sys.argv[ 1 ] )
exp = 0

while( num > 2**exp ):
    exp += 1

print( "It takes %d bits to get to the center of a Tootsie Roll" % exp )

exit( 0 )
```


7 0
3 years ago
Individual internet users connect to isps through a(n ________.
Step2247 [10]
<span> point of presence (POP)
---------------------------------:) 
hope I helped u !!

</span>
6 0
3 years ago
We can use formatting before and after typing.​
Anika [276]

Answer:

i dont know but thanks for marks

8 0
3 years ago
No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
Alona [7]

Answer:

Stay ahead of threats with machine learning-based WAF protection! Learn more today. Integrate application security and application delivery to protect your network. 100% Privacy. Keep Costs Down. Business Continuity. Maximum Productivity. Types: DDoS Protection

WELCOME

5 0
3 years ago
Other questions:
  • Which data type stores images and audio visual clips?
    9·2 answers
  • Chdtp aoxophg gr72 ae9&gt;3 zqqz
    12·1 answer
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • In a registration database, Ross has tables for student, professor, classroom, class, class-hour. Since his campus has about 12,
    9·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    10·2 answers
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • g 'write a function that takes as input a list and outs a new list containing all elements from the input
    5·1 answer
  • A printer is considered to be in the category of
    5·2 answers
  • Which is government departments fund the Global Positioning System
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!