1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
12

Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).

The analyst wants to combine the two columns into a single column named location, with the city and state separated by a comma. What code chunk lets the analyst create the location column
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

The programing language, R has a unite unite function in the tidyr package. Hence, the code chunk which let's the analyst create the location column is; <em>unite (stores, "location”, city, state, sep=",") </em>

  • The syntax for the unite function is ; unite(data,col,..., sep)

  • <em>data</em><em> </em><em>=</em><em> </em><em>dataframe</em><em> </em><em>from</em><em> </em><em>which</em><em> </em><em>data</em><em> </em><em>is</em><em> </em><em>to</em><em> </em><em>be</em><em> </em><em>extracted</em><em> </em><em>`</em><em>;</em><em> </em>stores
  • <em>col</em><em> </em><em>=</em><em> </em><em>name</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>new</em><em> </em><em>column</em><em> </em><em>;</em><em>"</em><em> </em>location"
  • <em>.</em><em>.</em><em>.</em><em> </em><em>=</em><em> </em><em>dataframes</em><em> </em><em>to</em><em> </em><em>be</em><em> </em><em>merged</em><em> </em><em>;</em><em> </em>city, state
  • <em>sep</em><em> </em><em>=</em><em> </em><em>seperator</em><em> </em><em>;</em><em> </em>","

Hence, the required syntax goes thus :

  • unite (stores, "location”, city, state, sep=",")

Learn more : brainly.com/question/25534959

You might be interested in
Which statements about grades are accurate? Check all that apply. Grades help indicate how well a student is understanding a cer
igomit [66]

Answer:

1, 2, 3 and 5.

Explanation:

6 0
3 years ago
If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
Elenna [48]

Answer:

5.

Explanation:

6 0
3 years ago
There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
Aloiza [94]

Answer:

are u in HS or college work

I am trying to understand

6 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
When the "swen" virus infected someone's system, it made significant changes to the registry that caused it to be extremely diff
Effectus [21]
<span>In certain cases, when the Swen executable is removed or renamed by an anti virus program without stopping to fix the registry, it then will become impossible to run any executable files on the machine. This happens because windows will be unable to find the file that is associated with any executables on it's hard drive.</span>
7 0
3 years ago
Other questions:
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    15·1 answer
  • An indirect effect of an action, be it a cost or benefit, for a third party who did not agree to the action is known as a(n) ___
    8·1 answer
  • A drowsy cat spots a flowerpot that sails first up and then down past an open window. The pot is in view for a total of 0.50 sec
    13·1 answer
  • PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!
    15·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • What was the first computer programming language?
    7·2 answers
  • Computer technology has changed our lives write of a least five ways to show how this is so​
    15·1 answer
  • I need a utube name for a gaming channel....PLEASE HELP...BRAINLIEST
    5·1 answer
  • Why should we not underestimate the widespread of mass media?
    13·1 answer
  • What is cache memory?Mention its importance. ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!