1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
12

You connect Tableau to an Excel file which includes a column that has mostly numeric data, but has a few date and text values mi

xed in. Tableau set the data type for this field as Number. What happens to the date and text values when the data is imported to Tableau
Computers and Technology
1 answer:
JulijaS [17]3 years ago
7 0

Answer:

Following are the solution to this question:

Explanation:

When we link the tableau to an Excel file, it contains a column which mainly contains numerical data and also mixes some number for a date or text values. For all of this field, it table specifies the type of data as Integer. In which the data is importing into Tableau Date and text properties Its date values are determined at 1/1/1900 as well as the text value is null.

To open the link tab to import data with an excel file. Click the file then and Open it. It contains several sheets, that will all be immediately imported as classified as sheets on the leftmost column of Tableau.

You might be interested in
Your company has been using Windows workgroups on a server running Windows Server 2016. Due to the rapid growth of the company,
Vesna [10]

Answer:

It is an excellent decision to change to active directory

Explanation:

Active Directory offers the following advantages, for optimal customer response:

Main objects (users, groups, units, organization).

Security (groups, NTFS - permits, audit)

Integration (-windows services, Microsoft applications)

Administration (centralized and delegated)

Scalability (domain, tree, forest)

All the above helps us to control access to files.

3 0
4 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Soa contains a lot of benefits, but _________ is not considered one of them.
AysviL [449]

SOA contains a lot of benefits, but been hard to handle is not considered one of them.

<h3> What is Service Oriented Architecture (SOA)? </h3>

The  Service Oriented Architecture  is known to be where all parts are set up to be services.

They are said  to be Easy to handle new version for subset of users and one can easily get back from mistake in one's design.

The SOA characteristics are:

  • Their Services are self-contained and modular.
  • Their Services support interoperability.
  • Their Services are loosely put together.

Learn more about  Service Oriented Architecture from

brainly.com/question/14835966

8 0
3 years ago
PSEUDOCODE PRACTICE!!! NEED HELP IMMEDIATELY!!! FIRST ANSWER GETS BRAINLYEST!!!
iogann1982 [59]

Answer:

a-nothing b-3 c-9 d-1

Explanation:

5 0
3 years ago
In which country did the World Cyber Games originate?
levacccp [35]
The world cyber games originated in South Korea.
8 0
4 years ago
Read 2 more answers
Other questions:
  • Select one technology limitation in regards to quality improvement (QI) programs Technology is not fast enough Not all electroni
    12·1 answer
  • Can the redirection shell metacharacter be used to redirect between a command and another command?
    8·1 answer
  • Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading
    11·1 answer
  • Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe
    15·2 answers
  • This is the formula for the future worth of an investment over time with consistent additional monthly payments and a steady rat
    10·1 answer
  • 1. Write a recursive method to determine if a character is in a list of characters in O(logN) time. Mathematically prove (as we
    13·1 answer
  • When saving a PowerPoint presentation as a show which object will not be saved with the presentation
    13·2 answers
  • 1. The Law of Superposition – the age of an object may be determined by the depth at which it is found, the deeper the object is
    14·1 answer
  • When is the greatest risk of damage from electrostatic discharge?
    7·2 answers
  • The events that happen in a story are called the _________________.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!