1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
1 year ago
15

Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the u

se of structured data captures data in whatever format it naturally exists
Computers and Technology
1 answer:
kifflom [539]1 year ago
4 0

Answer:

captures data in whatever format it naturally exists

Explanation:

quizletBig Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists

You might be interested in
The reason for prioritizing your work is to get the
7nadin3 [17]

Answer:

a

Explanation:

3 0
2 years ago
Write a java program as follows Write a method called powOfTwo that takes an integer as parameter, computes, and outputs it’s sq
Kisachek [45]

Answer:

public static int powOfTwo(int input) {

 return input*input;

}

You will have to call this method in main
for printing it, write

System.out.println(powOfTwo(your number));

in public static void main(str[]args) {

}

8 0
1 year ago
The UNIX operating system started the concept of socket which also came with a set of programming application programming interf
VMariaS [17]

Answer:

(a). as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.

Explanation:

The explanation is in the answer.

3 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of ite
hjlf

Answer:

2 times as many items can be uniquely identified

Explanation:

Option 'C' is the answer. because

if we use 6 bit binary sequence

then

No. of Unique address will be = 2 ^ 6  = 64

as we increase the bit by 1. Now total bits are 7.

so

No. of Unique address for 7 bit Sequence = 2 ^ 7  = 128

So,

128 is double of 64, that is 2 times greater value than 64.

6 0
3 years ago
Other questions:
  • Does anyone have any social media message me
    14·1 answer
  • A Uniform Resource Locator (URL) is a formatted string of text that web browsers, email applications, and other software program
    15·2 answers
  • Prominent is another word for stands out. True False
    13·1 answer
  • Check My Work _____ are made in response to situations that have occurred frequently enough to enable managers to develop decisi
    15·1 answer
  • An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
    15·1 answer
  • Software that gives network administrators the ability to provide computer assistance from a central location by allowing them t
    15·1 answer
  • For large and complex amounts of information, storing the information is best achieved by using what?
    5·1 answer
  • There are many best practices for digital recordings. Select the three best practices from the list below. select the best micro
    14·1 answer
  • Plz show working for binary addition. please solve. 11000 + 110101 + 101011​​
    15·2 answers
  • Live footage refers to:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!