1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
12

Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).

The analyst wants to combine the two columns into a single column named location, with the city and state separated by a comma. What code chunk lets the analyst create the location column
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

The programing language, R has a unite unite function in the tidyr package. Hence, the code chunk which let's the analyst create the location column is; <em>unite (stores, "location”, city, state, sep=",") </em>

  • The syntax for the unite function is ; unite(data,col,..., sep)

  • <em>data</em><em> </em><em>=</em><em> </em><em>dataframe</em><em> </em><em>from</em><em> </em><em>which</em><em> </em><em>data</em><em> </em><em>is</em><em> </em><em>to</em><em> </em><em>be</em><em> </em><em>extracted</em><em> </em><em>`</em><em>;</em><em> </em>stores
  • <em>col</em><em> </em><em>=</em><em> </em><em>name</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>new</em><em> </em><em>column</em><em> </em><em>;</em><em>"</em><em> </em>location"
  • <em>.</em><em>.</em><em>.</em><em> </em><em>=</em><em> </em><em>dataframes</em><em> </em><em>to</em><em> </em><em>be</em><em> </em><em>merged</em><em> </em><em>;</em><em> </em>city, state
  • <em>sep</em><em> </em><em>=</em><em> </em><em>seperator</em><em> </em><em>;</em><em> </em>","

Hence, the required syntax goes thus :

  • unite (stores, "location”, city, state, sep=",")

Learn more : brainly.com/question/25534959

You might be interested in
someone who protects valuable online information, like phone numbers and passwords would be considered​
charle [14.2K]

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

6 0
3 years ago
Jessie will make and sell the trending Baked California Maki. Her Peso mark up is 5.00. Selling price PHP 15.000. How much will
Levart [38]

Answer:

50%

Explanation:

The markup is the difference between the selling price and the cost price. If the mark up is greater than zero, it means there is a profit, if the markup is less than 0, it means there is a loss and if the markup is equal to 0, it means there is breakeven.

Percentage markup = (markup/cost price) * 100%

Selling price - cost price = markup

15 - cost price = 5

cost price = 10

Percentage markup = (markup/cost price) * 100% = (5/10) * 100% = 50%

7 0
3 years ago
What should every Software Engineer know about Software Architecture?
Alenkinab [10]
<span>!UML (all of them)
2.Flowchart (more for understanding a real world process of some kind; like a business process)
3.Data model including Bachman (if you don't need to at least understand your data, how it is stored versus a model, i.e., Bachman then you are doing it wrong and your schema could be simplistic)
This is 3 different examples</span>
6 0
3 years ago
7.2 code practice edhesive
goblinko [34]

Answer:

Explanation:

got a 100

7 0
3 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
Other questions:
  • _____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
    10·1 answer
  • How has science fiction influenced technology
    7·2 answers
  • The steps for creating a newsletter are to ____.
    10·1 answer
  • Wap-enabled devices require a ________, a special web browser that has all the features of computer-based browsers but is simpli
    11·1 answer
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • What will the document.write() statement display, given the following code snippet? var scores = new Array[94, 90, 88, 82, 73, 7
    6·1 answer
  • Run the browser checker to see that the computer you are using now is set up for WileyPLUS. Which of the following browser funct
    15·1 answer
  • Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming
    8·1 answer
  • Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
    5·1 answer
  • Cable inside the computer transferring data between the mother board and storage devices.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!