when reviewing an alteryx workflow, if you find you have data that is irrelevant, what steps would you take to remove the data?

Answers

Answer 1

Connect the INPUT DATA tool with the Data Cleansing tool by dragging it from the Preparation tab. The workflow data that includes undesired characters in the Region field, such as North1, South23, etc.,

will then be presented in the results when you click the Run button or press CTRL+R, allowing you to eliminate them.Data deletion and appending involves erasing all of the original entries from the database before adding new data to the current table. Keep in mind that this mode varies according on the database you write to: Uses the DELETE command in Oracle databases. You may choose to "Forget all Missing Fields" or "Forget Highlighted Missing Fields" under "Options." Using one of these remedies, you may get rid of these yellow fields (either all or the fields you select). You can utilise a data-deletion request to ask for the removal of data from the Analytics servers if you need to do so for any reason.

To learn more about Data click the link below:

brainly.com/question/10980404

#SPJ4


Related Questions

there are many programming languages in the market now. if you would design a programming language, what type of language would that be? why?

Answers

If we want to design a programming language, we can choose Python or also JavaScript. Each programming language has each characteristic, python especially used for  Artificial Intelligence & Machine Learning and JavaScript is used for Rich Interactive Web Development.

In the term of computer and technology, A programming language generally can be defined as a way for programmers (developers) to communicate with computers. There are a set of rules that allows string values in the programming language that  converted into various ways of generating machine code. There are several types of programming languages, such as functional programming languages, Object-oriented programming languages, and also Scripting languages.

Here you can learn more about programming languages brainly.com/question/23959041

#SPJ4

if we are analyzing a file's contents to correctly structure its data, what action are we performing on the file?

Answers

Data Parsing is the process of analyzing a file's contents to correctly structure its data.

If you are analyzing a file's contents to correctly structure its data, you are performing data parsing on the file.

Data parsing involves examining the contents of a file and organizing it into a usable format, such as a table, tree structure, or graph, by breaking down the file into its individual components, such as values, fields, and tokens. The goal of data parsing is to extract meaningful information from the raw data and store it in a structured format that can be easily manipulated and analyzed.

Data parsing is the process of analyzing and extracting information from a file, converting it from its raw form into a structured format that can be more easily manipulated and analyzed. This process involves breaking down the data into its individual components, such as values, fields, and tokens, and organizing it into a useful format, such as a table, tree structure, or graph. The goal of data parsing is to extract meaningful information from the raw data and store it in a structured format for further analysis and processing.

Learn more about Data parsing here:

https://brainly.com/question/16306239

#SPJ4

Write a single statement that assigns avg_sales with the average of num_sales1, num_sales2, and num_sales3. Sample output with inputs : 3 4 8, Average sales : 5.0

Answers

Following are the Python program to calculate the average value.

Write a single statement that assigns average sales?

Defining variables "num_sales1, num_sales2, and num_sales3" that holds integer value that is "3, 4, and 8".In the next step, another variable "avg_sales" is declared that holds a value "0".Inside the "avg_sales" we calculate the average value of the above input value and use the print method that prints its value.  

Program:

num_sales1 = 3#defining variable that holds integer value

num_sales2 = 4#defining variable that holds integer value

num_sales3 = 8#defining variable that holds integer value

avg_sales = 0#defining variable that holds integer value

avg_sales = (num_sales1 + num_sales2 + num_sales3) / 3#using avg_sales variable that calculates average value

print(avg_sales)#print average value

Output: 5

num_sales1 = 3#defining variable that holds integer value

num_sales2 = 4#defining variable that holds integer value

num_sales3 = 8#defining variable that holds integer value

avg_sales = 0#defining variable that holds integer value

avg_sales = (num_sales1 + num_sales2 + num_sales3) / 3#using avg_sales variable that calculates average value

print(avg_sales)#print average value

0utput is 5

To learn more about average refers to:

https://brainly.com/question/130657

#SPJ4

what is an alternative to clcking the digits boxes in the video for changing sig figs in a display? excel

Answers

An alternative to clicking the digits boxes in the video for changing significant figures in a display is using a spreadsheet program such as Microsoft Excel to adjust the number of decimal places.

The video tutorial explains how to click the digits boxes in the display to adjust the number of significant figures in a display. There is an alternative to this method, though. The number of decimal places on a display can also be changed using a spreadsheet tool like Microsoft Excel. To do this, first select the cell that has the number, then use the right-click menu to choose Format Cells. the Number tab in the Format Cells dialog box. There is a choice for the amount of decimal places here. The display's important figures can be changed by choosing the desired number of decimal places and pressing OK. The digits boxes in the calculator can also be used instead of this.

Learn more about Microsoft here:

brainly.com/question/11020681

#SPJ4

universal container's support manager wants to have cases assigned to users or queues based on the defined criteria. what setting salesforce admin needs to create in order to meet the support manager request?

Answers

The Salesforce administrator must set up "Case Assignment Rules" to automatically assign cases to users or queues based on defined criteria.

This can be done in the Salesforce setup menu by navigating to "Workflow & Approvals" and selecting "Case Assignment Rules." The administrator can create a new rule, specify the criteria for case assignments, such as account, product, and priority, and assign cases to the appropriate user or queue.

Case Assignment Rules in Salesforce are used to automatically assign cases to the appropriate user or queue based on predefined criteria. This is a great way for organizations to streamline their case management process and ensure that the right person handles cases promptly.

Once the rule is activated, cases will be automatically assigned to the appropriate user or queue based on the criteria defined in the rule. The administrator can create multiple rules to handle different types of cases and ensure that cases are assigned to the right person every time.

Learn more about Case Assignment Rules here: https://brainly.com/question/17398422

#SPJ4

50 points
Use of all dictnary functions with example easy explain in your own word..​

Answers

The Dictionary function in programming is used to create a collection of key-value pairs, where each key maps to a specific value. It allows for efficient lookups and retrievals of values based on their associated keys, making it a useful data structure for tasks such as storing and retrieving configuration settings, representing and manipulating data, and more.

What is Dictionary Function in Programming?

Note that the Dictionary function in programming is a data structure that allows you to store and retrieve values based on their associated keys.

It is used to create a collection of key-value pairs, where each key maps to a specific value. The function provides efficient and flexible methods for looking up and retrieving values based on their keys, making it a useful tool for tasks such as storing configuration settings, representing and manipulating data, and more.

Learn more about Dictionary Function:
https://brainly.com/question/14257789
#SPJ1

how many different possible options of combinations are available in binary code using eight bits?

Answers

Utilizing eight bits, binary code provides 256 potential values and combinations.

How do binary codes work?

During coding, a symbol, letter, or word is said to be being encoded when a set of symbols are used to represent it. A code refers to the collection of symbols. Digital data is represented, stored, and transmitted using a set of binary bits. This group is also known as binary code. The binary code is represented by both the number and the alphabetical letter.

The advantages of binary code The benefits of binary code are listed below.

Binary codes are appropriate for use in computer programs.Binary codes work best in digital communications.Digital circuit construction and analysis are made simpler by using binary coding.Because the only values used are 0 and 1, implementation

Learn more about binary codes:

brainly.com/question/14928294

#SPJ4

the town of mamou has two judges that hear all of the traffic violations from the previous week. each judge can only preside over one violation at any given time. the database that has been developed has a judge table and a violation table. what type of relationship exists between these tables?

Answers

In the database created for the town of Mamou, it is probable that there is one-to-many connection between the court table and the violation table.

What type of relationship exists between these tables?

In the database created for the town of Mamou, it is likely that there is a one-to-many connection between both the judge table and the violation table. This means that while a judge can preside over several infractions, only one judge can preside over a single violation. In a database, this connection would be made by means of a foreign key inside the violation column that makes use of the judge table's main key. This connection shows that each traffic infraction has a designated judge, and that the database links the information about the infraction and the judge in it.

To know more about Database visit:

brainly.com/question/25198459

#SPJ4

question 7 scenario 2, continued next, your interviewer wants to know more about your understanding of tools that work in both spreadsheets and sql. she explains that the data her team receives from customer surveys sometimes has many duplicate entries. she says: spreadsheets have a great tool for that called remove duplicates. in sql, you can include distinct to do the same thing. in which part of the sql statement do you include distinct?

Answers

The correct answer is  Continuing with Scenario 2 Your interviewer is now interested in finding out more about your knowledge of technologies that can be used with both spreadsheets and SQL.

A spreadsheet is a tool for storing, modifying, and analysing data. A spreadsheet's rows and columns of data can be searched, sorted, calculated from, and utilised to create a variety of graphs and charts. A spreadsheet is a piece of software that can store, display, and edit data that has been organised into rows and columns. The spreadsheet is one of the most used tools for personal computers. A spreadsheet is typically used to record numerical data and brief text strings.  The spreadsheet application Excel is part of the Microsoft Office suite. Workbooks, which are collections of spreadsheets, can be created and formatted using Excel to help you evaluate data and make better business decisions.

To learn more about spreadsheets click on the link below:

brainly.com/question/8284022

#SPJ4

what would you enter at the command prompt to display the primary and secondary group memberships for the gshant user account?

Answers

The command to display the primary and secondary group memberships for the gshant user account is 'id gshant'.

What is command ?  

Command is an instruction given to a computer, a program, or a piece of software to execute a specific task. It is usually given in a language that the computer can understand. Examples of commands include opening or closing a program, creating a new file, deleting a file, copying a file, and so on.

This command will list the user name, user id, primary group id, and all of the secondary group ids for the specified user account.

To learn more about command
https://brainly.com/question/25243683
#SPJ4

To connect an analog microphone which color port would you use?

Answers

Identify the audio jacks on the back of your computer. Unless your computer is very old, the jacks are color-coded green for line-out -- for speakers or headphones -- blue for line-in and pink for a microphone.

What is patch panel?

A patch panel is a tool or item with a number of jacks, typically of the same or similar type, used for connecting and routing circuits for convenient, flexible monitoring, linking, and testing of circuits. Patch panels are frequently used in radio and television, recording studios, and computer networking. The term "patch" was first used in telephony and radio studios, where backup equipment could temporarily replace broken components. Patch cords and patch panels, similar to the jack fields of cord-type telephone switchboards, were used for this reconnection. Patchbays make it simpler to connect various devices in various configurations for various projects because all the adjustments can be made there.

To know more about patch panel visit:

https://brainly.com/question/28197878

#SPJ4

What is a phishing tactic?

Answers

Answer: Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website.

Explanation: Hope this helps you!

which if branch executes when an account lacks funds and has not been used recently? hasfunds and recentlyused are booleans and have their intuitive meanings.

Answers

The correct if branch that will execute when an account lacks funds (hasfunds is false) and has not been used recently (recentlyused is false) is:

if (!hasfunds && !recentlyused) {

  // code to execute when account lacks funds and has not been used recently

}

When both hasfunds and recentlyused are false, the condition !hasfunds && !recentlyused is true, and the code inside the if statement will be executed. If either hasfunds or recentlyused is true, the condition will be false and the code inside the if statement will not be executed.

You can learn more about coding in here https://brainly.com/question/17204194

#SPJ4

what grade must you get on this quiz in order to view the content in your online or hybrid course(s)?

Answers

The specific grade required to view the content in an online or hybrid course:

will depend on the policies set by the instructor or educational institution. It's best to consult the course syllabus or ask the instructor directly for information on the required grade for the quiz.

In an online or hybrid course, the instructor may require students to earn a certain grade on a quiz or other assignment before they are able to access certain content. This requirement is put in place to ensure that students have a basic understanding of the material before moving on to more advanced topics.

The specific grade required to view the content may be different for each course, and is determined by the instructor. It could be a passing grade, a specific percentage, or a specific number of points out of the total possible.

It is important to understand the requirements set by the instructor or institution in order to be successful in the course and access all the available content. If you have any questions about the requirements, it's best to reach out to the instructor for clarification.

Learn more about online or hybrid course:

brainly.com/question/28587867

#SPJ4

how did he added to the document using a viewmaster format are the text message business plan

Answers

To add text to the document using the ViewMaster format, you need to open the Handout Master view in the View tab.

From there, you can add elements such as your company logo or name, and you can also add text.

For example, to add the text "MediSport Clinic Business Plan" to the document, you would click the "Text Box" icon located in the Handout Master view, then type in the desired text. Once you are done, you can close the header.

Another option is to add hyperlinks to the text, which will allow you to link to other webpages or documents. Finally, you can also use the Master View to add backgrounds or themes to the text, giving it a more polished and professional look.

Learn more about viewmaster format:

https://brainly.com/question/16599634

#SPJ4

using a programming language can help you with which aspects of data analysis? select all that apply.

Answers

When using a programming languages, it can help us to:

1. Easily reproduce and share your work

3. Save time

4. Clarify the steps of your analysis

In the term of computer and technology, A programming language generally can be defined as a way for programmers (developers) to communicate with computers. There are a set of rules that allows string values in the programming language that  converted into various ways of generating machine code. There are several types of programming languages, such as functional programming languages, Object-oriented programming languages, and also Scripting languages.

The question above is incomplete, the complete question is;

using a programming language can help you with which aspects of data analysis? select all that apply.

1. Easily reproduce and share your work

2. Choose a business task for analysis

3. Save time

4. Clarify the steps of your analysis

Here you can learn more about programming languages https://brainly.com/question/23959041

#SPJ4

you work as the it security administrator for a small corporate network. the company president has received several emails that he is wary of. he has

Answers

The correct answer is You manage the IT security for a modest company network. The president of the company has received a number of suspicious emails.

Confidentiality, integrity, and availability are three fundamental security principles that are crucial to internet-based information. Authentication, authorization, and nonrepudiation are concepts pertaining to the users of that information. However, network, end-point, and internet security are the three main categories of IT security (the cybersecurity subcategory). These three types can typically be used to group together additional types of IT security. Information technology (IT) security describes the practises, tools, and people used to protect a business's digital assets. IT security seeks to stop unauthorised users, often referred to as threat actors, from taking these resources, tools, and services and using them for their own gain.

To learn more about  IT security click on the link below:

brainly.com/question/13197927

#SPJ4

uppose users share a 3 mbps link. also suppose each user requires 100 kbps when transmitting. when circuit switching is used, how many users can be supported?

Answers

The number of users that can be supported in a circuit-switched network with a 3 Mbps link and each user requiring 100 Kbps is 30.

The number of users that can be supported in a circuit-switched network with a 3 Mbps link and each user requiring 100 Kbps is determined by dividing the total available bandwidth by the required bandwidth per user.

So, for this scenario:

3 Mbps / 100 Kbps = 30 users

Therefore, with a 3 Mbps link and 100 Kbps per user, a circuit-switched network can support up to 30 users.

It is important to note that this calculation assumes that all users are transmitting data at the same time and that no bandwidth is being used for other purposes, such as network overhead or data storage. In a real-world scenario, these factors would need to be taken into consideration to accurately determine the number of users that can be supported.

Additionally, circuit switching may not always be the best choice for network design, as it is less efficient than other technologies like packet switching and may not be able to handle varying bandwidth requirements effectively. The choice of network design will depend on the specific requirements and constraints of the scenario.

Learn more about bandwidth here:

https://brainly.com/question/8154174

#SPJ4

because many peer-reviewed journals are not included in the databases, especially journals in languages other than english, which search engine may be helpful for identifying additional relevant abstracts?

Answers

The search engine that can be used to  identifying additional relevant abstracts G oogle Scholar. There are a lot of  articles, theses, books, abstracts and court opinions and others in g oogle scholar.

In the term of technology, G oogle Scholar generally can be defined as an search engine that can be used for a simple way to broadly search for scholarly literature. In the g oogle scholar, we can search across many disciplines and sources. There are a lot of  articles, theses, books, abstracts and court opinions, from academic publishers, professional societies, online repositories, universities and other web sites in the search engine named g oogle scholar.

Here you can learn more about g oogle scholar https://brainly.com/question/5054483

#SPJ4

Please help urgently i will give 61 points

Answers

Web browsers can be used to access the internet.

What is a short history of web browsers?

When we talk of the web browsers we are talking about the kind of applications that we can use to access pages on the web. Today there are so many of such applications that we can be able to use search for pages on the web.

The initial attempts at web browsers were the hyperlinked applications that were produced by  Tim Berners-Lee during the mid and late 1980s and 1990.

Today, we have a lot of the web browsers in use like the Chrome, Safari, Internet Explorer (IE), Firefox, and Opera.

Learn more about web browsers:https://brainly.com/question/9776568

#SPJ1

what three functions are defined by network protocols to allow communication between known source and destination ip addresses? (choose three.)

Answers

The three functions defined by network protocols to allow communication between known source and destination IP addresses are data encoding, message size and delivery options.

Data encoding: This refers to converting data into a standardized format so it can be transmitted over a network. This helps ensure that the data can be transmitted accurately and effectively between different systems.Message size: This refers to the size of the data that is being transmitted, which can have a significant impact on the speed and reliability of the transmission. Network protocols will often include specifications for maximum message size, which helps ensure that data is transmitted efficiently.Delivery options: This refers to the different methods of transmitting data over a network, such as reliable delivery (where the data is guaranteed to reach its destination), best-effort delivery (where the data is transmitted but not guaranteed to reach its destination), and multicast delivery (where the data is sent to multiple destinations simultaneously). Network protocols will often include specifications for these delivery options to help ensure that data is transmitted effectively.

Learn more about network protocols here: https://brainly.com/question/14672166

#SPJ4

Your question is incomplete but probably the full question was:

What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)

connector specifications

data encoding

media selection

message size

delivery options

end-device installation

kai needs to compile information on the motherboard brand and model for a few computers running important applications. he does not have the motherboard manuals. how can he obtain the information with relative ease?

Answers

The correct answer is Kai wants to gather details about the motherboard brand and model for a few computers that are running critical software. He lacks the manuals for the motherboard.

The motherboard connects all of the components of the computer and allows for communication between them, acting as the computer's backbone. Without it, none of the computer's parts, including the hard drive, GPU, and CPU, could communicate. The motherboard of a computer must be in perfect working order for it to operate correctly.The motherboard of the computer contains the central processing unit (CPU), also known as a processor. You provide the CPU instructions every time you touch a key, click the mouse, or launch an application.

To learn more about  motherboard click on the link below:

brainly.com/question/17769700

#SPJ4

which type of vhd file allocates additional physical disk space in the file as virtual disk storage is used?

Answers

VHDX is the default format used by Microsoft's Hyper-V hypervisor, which was introduced in Windows 2012. It has a storage capacity of 64 TB, which is much greater than VHD's capacity of 2 TB. VHD/VHDX pictures are stored as files on the host operating system and can be of the following types: The hard drive image has been repaired.

Hyper-V supports fixed VHD files, dynamic VHD files, and differential or differencing VHD files. Learn more about these file formats and their optimal applications. In general, Hyper-V supports three kinds of virtual hard drive files: fixed, dynamic, and differential. VHD (Virtual Hard Disk) files, which were first offered with Connectix Virtual PC, may hold the contents of a hard disc drive. This disc image format was eventually used by Microsoft Hyper-V. VHD files may be manually mounted on Windows 7 and later systems. The VHD format is a block-based format for storing the contents of a virtual computer. VHDs make use of the *.vhd file, which mimics the attributes of a conventional hard disc. Using Hyper-V Manager, virtual hard drives may be generated during the VM formation process.

Learn more about Microsoft Hyper-V  from here;

https://brainly.com/question/14057609

#SPJ4

ell phones and digital music files are examples of: a. hypercompetition. b. disruptive technologies. c. knowledge. d. core competencies.

Answers

The appropriate response is (b) disruptive technologies.Cell phones and digital music files are examples of disruptive technologies.

What is it with cell phone?

A cellular phone is a type of telecommunication that uses radio waves to transmit calls wirelessly over a large area, to a fixed landline, or over the Internet. It is supported by a base station or cell site at a fixed location.

Why is it known as a cell phone?

They created a "cellular layout" by diagramming a system of wireless towers. The word "cellular" was adopted since each tower and its coverage map resembled a single living cell. Cellular phones are the final name given to devices that use this kind of wireless network.

To know more about cell phone visit:

https://brainly.com/question/4923681

#SPJ4

the communications team has been diligent in ensuring privacy as it collected customer email ids for new product related products. customers worry about long email chains showing their id on purpose or by accident. what tool is helpful?

Answers

A secure email platform such as ProtonMail or Tutanota can help ensure that customer email IDs remain private and secure. These platforms use end-to-end encryption and secure protocols to protect all emails.

When collecting customer email IDs, it is important to ensure their privacy. To do this, it is helpful to use a secure email platform such as ProtonMail or Tutanota. These platforms use end-to-end encryption and secure protocols to protect all emails from potential data breaches and to prevent any emails from being sent accidentally or on purpose with the customer’s email IDs visible. Additionally, these services also offer additional features such as self-destructing emails, password protection for emails, and two-factor authentication for extra security. By using a secure email platform, the communications team can ensure that customer email IDs remain private and secure.

Know more about email here:

brainly.com/question/14262680

#SPJ4

You need to answer the prompt in full to receive.
You need to have at least five complete sentences.
You need to use proper grammar, capitalization, and punctuation.
Discussion Prompt:
Marissa has recently accepted a job as a transcriptionist that will require several hours of typing a day. What are two pieces of advice you would give her to make sure her workstation is set up ergonomically?

Answers

As a transcriptionist, Marissa will be spending a significant amount of time typing every day, which can lead to physical strain and discomfort. To ensure her workstation is ergonomically set up, I would offer the following two pieces of advice:

Adjust the height of her chair and desk so that her wrists and arms are at a neutral angle while typing. This will reduce the risk of repetitive strain injuries such as carpal tunnel syndrome.

What is the transcriptionist about?

She can also  Invest in a good quality keyboard and mouse that are designed to reduce strain. An ergonomic keyboard can help reduce wrist and hand fatigue, while an ergonomic mouse can prevent repetitive strain injuries to the hand and arm.

Additionally, Marissa can take frequent breaks to stretch her hands, arms, and neck and perform exercises to prevent stiffness. She can also adjust the lighting in her work area to prevent eye strain. Taking care of her body and work environment will help Marissa stay healthy and productive in her new job.

Learn more about transcriptionist from

https://brainly.com/question/25703686

#SPJ1

explain what a gis is, including the equipment it requires and an example of the type of information it displays.

Answers

GIS is a computer-based system that stores, analyzes, and displays geographical data using maps and databases to provide a spatial representation of information.

GIS stands for Geographic Information System, which is a technology used to store, analyze, and display geographical data. It is a computer-based system that combines data and maps to provide a spatial representation of various types of information.

The equipment required for a GIS includes:

A computer or server to store and run the GIS softwareA database to store geographical and other related dataGIS software, such as ArcGIS or QGISInput devices, such as a mouse, keyboard, or GPS receiveroutput devices, like a printer or monitor

An example of the type of information that a GIS can display is the distribution of population across a region, represented by different colors on a map to indicate areas with higher or lower populations. The GIS can also display information such as demographics, land use patterns, and environmental features, allowing users to analyze and understand patterns and relationships in the data.

Learn more about Geographic Information System(GIS) here:

https://brainly.com/question/5035166

#SPJ4

1. what is the internet infrastructure stack? what is the relevance of this technological concept to marketers? what is the significance of cloud computing in relationship to the internet infrastructure? who is the leader in cloud computing for third parties by revenue, cisco, ibm, , or amazon?

Answers

The correct answer is Internet infrastructure stack are sets of hardware and services combined together which helps in making the data and information available on the web page.

Any hardware component that is housed inside a computer. a set of guidelines or software that instructs a computer on what to do or how to carry out a certain task (computer software runs on hardware). a computer application that gives users the resources they need to do a certain task. any hardware component that is housed inside a computer. a set of guidelines or software that instructs a computer on what to do or how to carry out a certain task (computer software runs on hardware). a computer application that gives users the resources they need to do a certain task.

To learn more about hardware  click on the link below:

brainly.com/question/15232088

#SPJ4

in regards to the i/o setup, which type of signal path is system-specific? meaning, paths that will change depending upon the audio interface/hardware connected to you computer.

Answers

Click the Track Show/Hide icon in the Track List. The symbol will wane and the track from the Edit and Mix Windows will be shown.

The track can be hidden so that it is not visible in the mix and edit window, but it still exists and is still being played back. For instance, creating a new audio track and a new aux track can be done by holding down Command and Control while double-clicking. Double-clicking while holding Option + Shift will add a new instrument track, a new master track, and so on. In the Edit window, keep track of views. adds a view. Ten inserts are accessible on the Audio, Auxiliary Input, Instrument, and Master Fader tracks, and they are arranged in two groups of five (labeled Inserts A–E and F–J). You can pick between hardware inserts and software plug-ins using the insert selectors at each place.

Learn more about software here-

https://brainly.com/question/18950462

#SPJ4

Punctuation
9
When James left to go t the store, he made sure to take his shopping list but he forgot his wallet.
What should the writer do to correct this sentence?
OA. Add a colon after "list."
OB. Add a comma after "list."
OC. Add an apostrophe after "James."
OD. The sentence is correct.
Reset
Submit

Answers

The set of symbols we employ to demarcate written sentences and sentence fragments and to clarify their meaning is known as punctuation. Punctuation marks are the names given to each symbol.

What are Puntuation?

The set of symbols we employ to demarcate written sentences and sentence fragments and to clarify their meaning is known as punctuation. Punctuation marks are the names given to each symbol.

Every piece of writing is a transcription of the spoken word (not vice versa). Punctuation closely resembles some non-verbal aspects of speech, like pauses, intonation, and volume, all of which are used to express meaning.

Punctuation generally aids in establishing the logic and structure of the written word. Without punctuation, a lot of writing could be read several different ways.

Therefore, The set of symbols we employ to demarcate written sentences and sentence fragments and to clarify their meaning is known as punctuation. Punctuation marks are the names given to each symbol.

To learn more about Puntuation, refer to the link:

https://brainly.com/question/930024

#SPJ1

Other Questions
Among the many threats to water quality posed by human activities is the burning of fossil fuels, which releases CO2 into the atmosphere. The resulting increase in atmospheric CO2 has caused global warming and other climate change-related issues like ocean acidification.Why is this study about corals' response to warmer water important? cushman company had $800,000 in net sales, $350,000 in gross profit, and $200,000 in operating expenses. cost of goods sold equals: A gardener makes a new circular flower bed. The bed is twelve feet in diameter. Calculate the circumference and thearea of the circular flower bed.circumference=12 feet, area = 12 square feetcircumference=12r feet, area = 144square feetcircumference = 6 feet, area = 36square feetcircumference 12 feet, area = 36 square feet Find market value and preferred shares and common shares what is a feature of object-oriented computing?group of answer choicesside-effect freeplatform-independentstatelessencapsulation of states Expand and simplify 2(x + 7) + 3(x + 1) Which is thought to be the first macromolecule found in protocells?A.DNAB.RNAC.ProteinsD.Carbohydrates fill in the blank. lombroso argued that violent criminals were evolutionary throwbacks or___, and the problem of crime rested upon the shoulders of individuals who were born to be violent and criminal. Can any enzyme break down any substrate? what term refers to the necessity of following the rules when it comes to using functions? syntax formula arguments function logic how many liters will 3.20 moles of oxygen gas occupy at STP? Primary data include at least one level of interpretation. True or False? an infant is choking on a piece of candy. you are unable to see chest rise after numerous attempts to ventilate. you should derek will deposit $3,214.00 per year for 20.00 years into an account that earns 10.00%, the first deposit is made next year. how much will be in the account 36.00 years from today? The Malelane gate into the Kruger National Park is 392km away from the nut farm. The Toyota Fortuner that was rented uses 7.9l of diesel for every 100km.2.1.1) How many litres of fuel will the car use to get to the gate? round off to the nearest whole number.2.1.2) The journey took 5 hours and 14 minutes. Calculate the average speed in km/h. Find a passage in An Indian Fathers Plea that describes his sons form of intelligence what differentiated the netherlands from the other major continental states of europe during the seventeenth century? Question 5 of 10 What general rule describes what happens to the energy in a given trophic level? OA. Only about 10% of all the energy in a trophic level gets used for metabolism. OB. Only about 90% of all the energy in a trophic level gets used for metabolism. O C. Only about 10% of all the energy in a trophic level gets transferred to the next level. OD. Only about 90% of all the energy in a trophic level gets transferred to the next level. the answer is C Thomas and Trenton aren't finished with their lab when the bell rings, but they don't want to be late tolunch. They quickly pour their leftover chemicals down the drain and leave the rest of the labequipment they used on the counter, figuring someone in the next class period will probably be using itanyway. What does it mean when a musician sells their catalog?