1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
9

To create an interactive Pivot Table for the web, we use a Ms office web component known as,

Computers and Technology
1 answer:
charle [14.2K]3 years ago
5 0

Answer: Pivot Table Report

Explanation:

To create an interactive Pivot Table for the web, we can use a Ms office web component which is known as the pivot table report.

We should note that the pivot tables are simply used for the summarizing of data. Huge amounts of data can be processed with them, after which a report showing sums, averages, totals and every other calculations can be gotten.

You might be interested in
SQL statement to verify the updated name field for the publisher with ID 5 SELECT * FROM Publisher WHERE PubID=5;
hichkok12 [17]

Answer:

Option(a) i.e "true" is the correct answer for the given question.

Explanation:

The select statement is used for fetching the record in the database. Select is the Data manipulation command. The given query gives  all the records where id=5 from the table publisher in the table format.After executing of query the user can verify that the field is updated or not in the table.

So the given statement is "true".

7 0
4 years ago
In a class named InputTextToOutputFile.java use the following prompt to get the fileName of the output file from the user: "What
grin007 [14]

Answer:

Detailed program code is written at explaination

Explanation:

Program:

import java.io.File;

import java.io.FileWriter;

import java.io.IOException;

import java.util.Scanner;

public class InputTextToOutputFile

{

public static void main(String[] args) throws IOException

{

Scanner in=new Scanner(System.in);//Scanner object to get user input

System.out.println("What is the name of your output file? ");

String fileName = in.nextLine();//get output file name

File file = new File(fileName);//File object with fileName as input

//Create the file by method file.createNewFile()

if (file.createNewFile())

{

System.out.println("File is created!");

} else {

System.out.println("File already exists.");

}

//FileWriter object with user file name given as input

FileWriter writer = new FileWriter(file);

System.out.println("Enter text to write to a file : ");

String line;//variable to store line content

do {

line=in.nextLine();//get line content from user

writer.write(line+"\n"); //write content to file by adding new line(\n) character

}while(!line.equals("STOP!"));//repeat a loop until user enters "STOP!" line

writer.close();//close the file object

}

5 0
4 years ago
Consider the following C++ program. #include using namespace std; int main() { cout << "Hello World " return 0; } In the c
Ray Of Light [21]

Answer:

Compiler.

Explanation:

Actually there are two things missing in the code first is the header file.There is only # include no filename is there like<iostream>,,bits/stdc++.h> etc.cin ,cout will not work until iostream is included in the program.After including the header properly the missing semicolon will be caught by the compiler.The error will be as following:-

expected ';' before return.

4 0
3 years ago
HELP FAST PLEASE
never [62]

Answer:

I am not sure can you explain a little more

7 0
3 years ago
Read 2 more answers
An alternative design for a canary mechanism place the NULL value just below the return address. What is the rationale for this
Igoryamba

Answer:

This is to prevent attacks using the strcpy() and other methods that would return while copying a null character.

Explanation:

Canary is a mechanism used to monitor and prevent buffer overflow. The alternative canary design that places a null value just before the return address is called the terminator canary.

Though the mechanism prevents string attacks, the drawback of the technique is that the value of the canary is known which makes it easy for attackers to overwrite the canary.

6 0
3 years ago
Other questions:
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadshe
    11·1 answer
  • Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
    10·1 answer
  • 9. True False
    8·1 answer
  • Write a flowchart and program that does the following: Asks the user for the average temperature in each of the last 12 months A
    12·1 answer
  • If you are Rich In adopt me friend me And give me pets Please
    5·2 answers
  • Write the Flowchart to find Even number between 1 to 50<br>​
    9·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
  • which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!