Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.
Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.
See full question below
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Select an answer:
A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.
B. He connected to an outside data source.
C. He dragged and dropped the file into Tableau.
He duplicated the data in Tableau.
Learn more from
https://brainly.com/question/22908883
what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS.
Answer:
ARPANET: Advanced Research Projects Agency Network
BOOTP: Bootstrap Protocol
GSM: Global System for Mobiles
GUI: graphical user interface
EOM: Enterprise Output Management
EULA: end-user license agreement
CTSS: The Compatible Time Sharing System
Explanation:
BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.
GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.
ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.
BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.
EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.
EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.
CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.
Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))
Ex: If the input is:
5.0
6.5
3.2
Then the output is:
2.24 3.30 24.00
Answer:
6.5
24.00
it think it's my answer
How do you create speaker note changes that show the slides, related notes and company logo on each page
Answer:
The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.
What is the full form of eniac and univac ?
thanks!!
Answer:
ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)
Mark brilliant please
Answer:
[tex]ENIAC - Electronic \: Numerical \: \\ Integrator \: and \: Computer[/tex]
[tex]UNIVAC- Universal \: Automatic \: Computer[/tex]
The date of creation can be added to a slide using the:
a.
"Insert" tab, "Add note" group
b.
"Edit" group of the ribbon
c.
"Insert" tab, "Text" group
Answer:
The answer to your question is Insert tab Tex group.
The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.
What is a slide?A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.
In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.
Read more on slides here: https://brainly.com/question/11741377
#SPJ2
Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk
Answer:
Design a web page
Explanation:
It is easier html is a very easy language to learn css it should take ou about a week for a solid website
The operating system called Windows 7 is typically used for _____ a. Laptop computers b. Super computer c. All of the options d. Desktop computers
Answer:
all of these
Explanation:
,,,,,,,,,,,,,,,,
The operating system called Windows 7 is typically used for C All of these.
An operating system simply means a collection of programs that is vital for coordinating the operations of the computer software and hardware.
It should be noted that the operating system called Windows 7 is typically used for laptop computers, super computer, and desktop computers.
Therefore, the correct option is All of these.
Read related link on:
https://brainly.com/question/17252990
An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?
There are different ways of management. To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.
Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.
It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.
Learn more from
https://brainly.com/question/13438921
Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.
Answer:
something like that
Explanation:
static bunch of krap main (args) {
double hours;
double salary;
double overSalary;
print("Enter hours worked: ");
scan(hours);
if (hours <= 40) {
salary = 20 * hours;
}
if (hours > 40) {
overSalary = 30 * (hours - 40);
salary = 20 * 40 + overSalary;
}
print(salary);
}
In this exercise we have to use the knowledge of python to write a salary function, as follows:
the code is in the attached image.
In a more easy way we have that the code will be:
static bunch of krap main (args) {
double hours;
double salary;
double overSalary;
print("Enter hours worked: ");
scan(hours);
if (hours <= 40) {
salary = 20 * hours;
}
if (hours > 40) {
overSalary = 30 * (hours - 40);
salary = 20 * 40 + overSalary;
}
print(salary);
}
See more about python at brainly.com/question/26104476
Hi! ❤️ , im looking for some help here. ill give brainliest if able to.
Answer:
I think the answer is 2
Explanation:
since your trying to search for the temperature in a specific area in New York
Which one of the following careers is the most highly resistant to economic change?
Video Game Designers
Airline Pilots
Fashion Designers
Funeral Attendants
Answer:
Video game designers bbbbbbbbbbbbb
vA student found a book on the library bookshelf last week, and recorded the source information.
Book title: My Traitor’s Heart Author: Rian Malan
Publication date: 1990 Publisher: Bodley Head Publication city: London
Use the drop-down menus to indicate how the student should format this source on a works-cited list.
My Traitor’s Heart.
London:
Answer:
3,1,2,1
Explanation:
got it right on edge
have a nice day
:)
Answer:
1. Malan, Rian
2. London:
3. Bodley Head, 1990
4. Print
Explanation:
did it
what does project manager do?
switches use resistors in series and parallel and can function well as digital inputs
to electronic control systems.
Select one:
O a. Proximity
O b. Smart
O C. Touch-sensitive
O d. Push button
Answer:
d push button bc it will cut all power when in off
It specifies the amount of memory needed to store data.
magbigay ng limang magandang lugar na tinatawag na tourist spot sa iyo sa inyong lugar o probinsya
Answer: Is it RAM? Random Access Memory
Explanation: Ram is used to reading/writing data. It might control the amount of memory that is stored.
characteristics of special computers
Speed, Accuracy, Diligence, Versatility, Reliability, and Memory!
. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
The root node will contain the smallest element
philip was required to conduct training on the use of new computer systems in his company. explain two training methods that could have used.
Instructor-led training.
eLearning.
Simulation employee training.
Hands-on training.
Coaching or mentoring.
Lectures.
Group discussion and activities.
Role-playing.
1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?
A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.
It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.
An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.
A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.
The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.
Read related link on:
https://brainly.com/question/25747300
A keyboard would be considered _____. Select 2 options.
an input device
storage
an output device
software
hardware
Answer:
input devise and hardware
Explanation:
Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout
Answer:
Layout and Table Design
Explanation:
What is true about client-side scripting?
Answer:
A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.
Explanation:
Client-side scripting refers to the execution of scripts on the client's device (typically in a web browser) rather than on the server.
Given that,
To write about client-side scripting.
Since, Client-side scripting simply means running scripts, such as JavaScript, on the client device, usually within a browser.
All kinds of scripts can run on the client side if they are written in JavaScript because JavaScript is universally supported.
Therefore, client-side scripting enables the execution of scripts on the client's device, enhancing web interactivity and reducing server load.
JavaScript is a widely used language for client-side scripting.
To learn more about scripting visit:
https://brainly.com/question/26121358
#SPJ4
Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.
A host refers to each of the computer system connected to a network and it include the following different systems:
Desktop Laptop computersPrintersRoutersSwitchesCell phonesWhat is a host?
A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.
This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:
Desktop Laptop computersPrintersRoutersSwitchesCell phonesRead more on computers here: https://brainly.com/question/17402566
1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False
Answer:
16 colors in the palette
false only 16 colors
what is the internet revolution?
Answer:B
Explanation:
A function getints has been defined that has no parameters and returns an array of integer values. The first value in the array contains the total number of items in the array (including itself). Write code (not a function or main) to: Write a prototype for getints() Call getints() From the resulting array, print the first value (after the length) and the last value, each on a separate line.
Answer:
Explanation:In the below code : Create method getints() : with no arguments and integer array return type Inside method : Declare n integer Input n Declare integer array with n length : arrInt Assign n at 0th array index Use loop from 1 to n: i counter Input arr... view the full answer
Function getints is presented in the Prototype of the following code will be:
// Prototype
int* getints();
What is function getints?This function requests an integer from the person using it and then returns it. You can ask for the integer using a prompt argument.
Older OSes used the C method getch() to collect user input. Depending on the function call, it only allows one input character at a time. Unless the user supplies input, the program's execution is halted.
For trhe Prototype the code will be:
// Prototype
int* getints();
For the getints the code will be:
// Call getints()
int* array = getints();
The print values will be:
// Print the first and last value
printf("The first value is %d\n", array[1]);
printf("The last value is %d\n", array[array[0]]);
Learn more about function getints, here:
https://brainly.com/question/30928705
#SPJ2
Which among the following statements is not related to Capgemini
Intelligent Automation Platform (CIAP)?
loly
lov
OCIAP is built with a cloud-first approach
The functionality of the platform can be used and managed from a
command tower
ere i
Capgemini Intelligent Automation Platform is service agnostic
sha
The orchestration functionality of the platform is decentralised
O The platform's functional capabilities are enhanced by our fast Track Hub
10:2
IClick Submit o veri
LIL
:
Answer:
The platform's functional capabilities are enhanced by our fast Track Hub
Activity 4 - Accomplishing the Scoring Card Direction: Evaluate yourself by checking the appropriate boxes to indicate the degree of competency in nail care tools and equipment.
pls help guys:-(
The score that will be given to the identification of nail care tools, materials, and equipment will be 15.
Nail cure tools and equipment are the tools that are used for taking care of the nails. These include a nail file, nail clipper, nail cleaner, nail brush, etc.
The score that will be given to the identification of nail care tools, materials, and equipment is 15. The demonstration of knowledge on the safety practices of nail care tools, materials, and equipment will be 15 while the classification will be 10.
In conclusion, the total score will be 40.
Read related link on:
https://brainly.com/question/25711916
write a Assembly Language program that copies only unsigned numbers from Array1 to another Array2. The Array1 has both signed and unsigned numbers.
Array1 = { -4,-1,-2,-1,0,1,2,3,4 }
Unsigned numbers do not have preceeding positive or negative signs. Hence, the program written in python 3 copies unsigned values in the given array to another array thus :
array1 = {-4,-1,-2,-1,0,1,2,3,4 }
#assigns a set of values to array 1
array2 = set()
#initialize an empty array
for ele in array1 :
#loop through the values in array1
if ele >= 0 :
#since the signed values are negative, checks for values greater than or equal to 0
array2.add(ele)
#add to array 2
print(array2)
A sample run of the program is attached.
Learn more : https://brainly.com/question/25706522
Suppose you are in charge of unloading containers from ships arriving at a port onto trucks. A ship arrives with n containers of weight w1, w2, . . . , wn tons. Standing on the dock is a set of trucks, each of which can hold 1 ton of weight. (You can assume that none of the containers weighs more than 1 ton, since in this case you would not be able to transport it.) You can stack multiple containers in each truck subject to the weight restriction of 1 ton. Hoping to minimize your truck rental expenses, you aim to minimize the number of trucks needed in order to carry all the containers.
You start with the following greedy strategy. Start with an empty truck and begin loading containers 1, 2, 3, ... onto it until you get to a container that would overflow the weight limit. Now, declare this truck "loaded" and send it off; then continue the process with a fresh truck. After trying (and failing) to prove that this greedy algorithm is optimal, you decide to attempt to come up with a counter-example to see if you can discover that your strategy is not optimal.
Required:
Provide an example of a set of weights for which your algorithm does not use the minimum possible number of trucks.
Answer:
i thinks a , i hope it help you
Explanation: