1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
2 years ago
10

Peter is a data analyst in a financial firm. He maintains a spreadsheet that contains all employee details. Peter wants to analy

ze the data of all employees that have experience of more than five years. Which technique can Peter use to perform this analysis?
Computers and Technology
1 answer:
alukav5142 [94]2 years ago
3 0

Answer: filter the data of employees with more than five years of experience

Explanation:

The technique that Peter can use to perform this analysis is to filter the data of employees with more than five years of experience.

Filter in spreadsheets allows one to see the data that is required based on the input that was given. In this case, since Peter wants to analyze the data of all employees that have experience of more than five years, this can be filtered and the employees who have experience of more than 5 years will be shown.

The workers who have experience of less than five years will not b shown in this case.

You might be interested in
To calculate the chapter from which you must solve the programming exercise, divide the integer number representing your student
Mashutka [201]

Answer:

<em>import java.util.Scanner;</em>

<em>public class ANot {</em>

<em>    public static void main(String[] args) {</em>

<em>        System.out.println("Please Enter Your Student ID");</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        int yourId = in.nextInt();</em>

<em>       int chapterToRead = (yourId%3)+3;</em>

<em>        System.out.println("You are to read chapter: "+chapterToRead);</em>

<em>    }</em>

<em>}</em>

Explanation:

This solution is implemented in Java programming language. The scanner class is used to receive user input which is saved in an int variable yourId. In order to obtain the remainder when the students' ID is divided by 3, we use the modulo (%) operator which returns the remainder

7 0
3 years ago
True or False: clicking ads and pop-ups like the one below could expose your computer to malware.
Ratling [72]

True, clicking ads and pop-ups can expose your computer to malware.

3 0
3 years ago
Read 2 more answers
What is the maximum number of communication paths for a team of twenty people?
MAVERICK [17]
Each of the 20 people has 19 other people to communicate to. If you add that all up you get 20*19 paths, but then each path is counted twice (back and forth), so we divide this by 2. 20*19/2 = 190.

The general forumula is n(n-1)/2
6 0
3 years ago
Rain forests clean the air by producing oxygen. Some rain forest plants have healing properties, and can be used as medicine. Ra
Alla [95]

Answer:

The answer is C. Rain Forests are important for many reasons

Explanation:

7 0
2 years ago
What is GIGO ?<br>plz answer me​
DanielleElmas [232]

Answer:

Garbage in, garbage out

Explanation:

In computer science, garbage in, garbage out is the concept that flawed, or nonsense input data produces nonsense output or garbage

4 0
2 years ago
Other questions:
  • Someone help me I don’t know what to do /COMPUTER SCIENCE
    5·1 answer
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • Explain three applications of data mining
    14·1 answer
  • What does the clone tile command do?
    15·2 answers
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months
    9·1 answer
  • What is obamams last name
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!