1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
4 years ago
9

What is the first step to creating a PivotTable?

Computers and Technology
2 answers:
Mrrafil [7]4 years ago
5 0

Answer:    Click anywhere in the dataset.

   Go to Insert –> Tables –> Pivot Table.

   In the Create Pivot Table dialog box, the default options work fine in most of the cases. Here are a couple of things to check in it: ...

   Click OK.

Explanation:

lara31 [8.8K]4 years ago
4 0

Answer:

Click anywhere in the dataset

Go to Insert –> Tables –> Pivot Table.

In the Create Pivot Table dialog box, the default options work fine in most of the cases.

click ok

Explanation:

You might be interested in
The master production schedule for Product A shows a need for 30 units, and Product B shows a need of 25 units. To manufacture a
alexandr1967 [171]

Answer:

the amount of C required is 190 units of C

Explanation:

the amount of C to cover the necessity of product A is

Ca = A units required * number of C units to manufacture a unit of A

Ca = 30 unit of A * 3 units of C/ unit of A =90 units of C

to produce B the same applies

Cb = B units required * number of C units to manufacture a unit of B

Cb = 25 unit of B * 4 units of C/ unit of B =100 units of C

therefore to cover the necessities of A and also B we will need:

total units of C required = units of C to produce A + units of C to produce B

C = Ca + Cb = 90 units of C + 100 units of C = 190 units of C

C= 190 units of C

3 0
3 years ago
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
How many pictures can a 32 mb memory card hold?
nasty-shy [4]
This depends on the number of pixels are in each picture. hope this helps.
7 0
4 years ago
Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu
NARA [144]

Answer:

Here is a UpdateTimeWindow() method with parameters timeStart, timeEnd, and offsetAmount

// the timeEnd and timeStart variables are passed by pointer

void UpdateTimeWindow(int* timeStart, int* timeEnd, int offsetAmount){

// this can also be written as  *timeStart = *timeStart + offsetAmount;

*timeStart += offsetAmount;  //adds value of offsetAmount to that of //timeStart

// this can also be written as  *timeEnd = *timeEnd + offsetAmount;

  *timeEnd += offsetAmount;  } //adds value of offsetAmount to that of //timeEnd

Explanation:

The function has three int parameters timeStart, timeEnd, and offsetAmount.

First two parameters timeStart and End are passed by pointer. You can see the asterisk sign with them. Then in the body of the function there are two statements *timeStart += offsetAmount; and *End+= offsetAmount; in these statements the offsetAmount is added to the each of the two parameters timeStart and timeEnd.

8 0
3 years ago
A ________ power station uses the energy from a small piece of metal called Uranium ​
grigory [225]

Answer:

nuclear power plant

Explanation:

A nuclear reactor, or power plant, is a series of machines that can control nuclear fission to produce electricity. The fuel that nuclear reactors use to produce nuclear fission is pellets of the element uranium. In a nuclear reactor, atoms of uranium are forced to break apart.

3 0
4 years ago
Read 2 more answers
Other questions:
  • A college meal plan allows students to:
    7·2 answers
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • how can people access to a range of online services affect their ability to operate safely in the digital world
    11·1 answer
  • A group of students want to create an educational online game for computer laboratory in their school which type of network will
    6·1 answer
  • Which VPN topology is also known as a hub-and-spoke configuration?
    15·1 answer
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Which administrative tool can you use to check your computer's health or troubleshoot problems with the operating system or soft
    11·2 answers
  • Why are some geo satellites not usually used for transmitting tcp/ip information?
    5·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
  • Consider the given choices and determine which one establishes a conceptual framework for network connectivity.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!