1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
2 years ago
13

Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _

____ tool to create a clean and consistent visual appearance for their spreadsheets.
Computers and Technology
1 answer:
dmitriy555 [2]2 years ago
8 0

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called <u>clear formats</u>.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

  • Data consistency
  • Data integrity
  • Reliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: brainly.com/question/15334693

You might be interested in
People use a computer connected to the internet to manage financial accounts
Marrrta [24]

Answer:

No however, if financial accounts are on website, then that is done, however, not on public network.

Explanation:

This should not be done on the public network, or some other computer. And in general its no. However, if the internet is required, then this must only be done on a private network and under strict firewall rules. Do not ever use the VPN for this as well, as your information can be leaked. You need to do all this, as these are monetary usage, and at times it can be very heavy, and result in very heavy loss. However, this is especially required by small children who use bank accounts regularly. They and all should keep this in mind.

3 0
2 years ago
What is computer. Write full form of mips​
mestny [16]

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

MIPS (Microprocessor without Interlocked Pipelined Stages)

Explanation:

please mark as brainlist answers

5 0
2 years ago
Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
posledela
The Software is categorized into two. Operating System Software and the Application software.
Example :
1.0 The monitor does not show pictures without the source, when watching a video the source media application 
2.0 The printer does not print on its own without the source data from the office application, print application which process the data.
3.0  The speaker does not produce sound on its own without the source data from the media application as well.
4.0  The central processing units together with the memory does not run without the preinstalled bios and operating software on the computer.

The hardware will not run without the operating software (OS) to connect run each functional part of the computer. The Central Processing Unit computes for the Inputs and Outputs fed to it giving the computer the power to process data coming from all the hardware components receiving the electrical signals translated from the data input from human interaction or other source of data interaction to the computer. To divide we mainly have your hardware components, The Central Processing Unit, The input Peripheral (mouse, keyboard, pen stylus, mics, camera, etc) and your output peripherals (Monitor, Speakers, etc.,). Then we have your software component divided into two. The operating system software (Windows /Mac OS/ Linux / Unix / ) and the application software/program (Office applications, Browser etc.,).

5 0
2 years ago
Choose the best collection for each situation.
slega [8]

Answer:

Deque: You need to keep a record of the ages of the last 50 customers visit a restaurant. As new customers come in you delete the age that has been in the list the longest.

Tuple: You need to store the GPS coordinates of the hospitals in a state in order to find the nearest hospital for ambulance helicopters.

List: You write a loop to save anywhere from 10 to 100 values from a user. You will pass the collection to a function to find the average.

Explanation: Just got the results back no thanks to the guy above

6 0
3 years ago
How is the internet made?
sergey [27]

The Internet was made for shopping, searching. It was first made when the computers came out. (Windows Vista) Now you can watch videos or play games. The internet was main browsing and shopping. The internet today is really advanced and has made it was to phones and TVs. The internet wasn't the first thing you can do on the computer, you could write up a paper or do a slide show.

The Internet was created by Bob Khan and Vint Cerf. The Internet is like a big Tree. The websites are the bushes and the branches are the makers of the website. The internet today just a bunch of makers who make websites that you can access through the internet. If there were no websites there would be no internet. So if the internet quits (The Internet cant) Google and other big websites will be shut down. So the internet is a home for all the websites we use today.

This is really long but I tried not to make it so complicated and sound like I didn't copy and paste. I really hope this helped you in someway and Your Welcome. :)

8 0
3 years ago
Other questions:
  • Computer hardware had been designed to run a single operating system and a single app, leaving computers vastly underutilized. o
    15·1 answer
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • Write a function called intersect with four float parameter
    11·1 answer
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • An organization's Finance Director is convinced special malware is responsible for targeting and infecting the finance departmen
    13·1 answer
  • Your disaster recovery plan calls for tape backups stored at a different location. The location is a safe deposit box at the loc
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!