1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
2 years ago
10

Big data are _____. Select 2 options. (please help!)

Computers and Technology
2 answers:
forsale [732]2 years ago
5 0

Big data are:

  • Extremely big sets of information.
  • Collected through automated processes.

<h3>What is Big data?</h3>

The definition of big data is known to be when data is said to have high variety, seen in high volumes and also a lot of velocity.

Note that they are larger, very complex sets of data and are from new data sources and as such Big data are:

  • Extremely big sets of information.
  • Collected through automated processes.

Learn more about data from

brainly.com/question/19049345

#SPJ1

hoa [83]2 years ago
3 0

collected through automated process

extremely big sets of information

Edg 2022

You might be interested in
Why isn't 802.1X a good choice for home based wireless networks
Sholpan [36]
It can possibly cause an issue with the authenticator's end. Its capacity has a limited memory capacity and has the minimal processing power. Most of the process will be at the supplicant and authentication servers. However, the 802.1X has a better security compared to the WEP.
6 0
3 years ago
Lisa has a section of her document that she would like to include in the index. Which option should Lisa choose?
kupik [55]

Answer:

For including a part of the text within the index, you need to make use of the Mark Entry option. And here you can fill the required information for curating your index, you need to just follow the instruction as required, and you will be fine.

Explanation:

Please check the answer.

8 0
3 years ago
What is computer virus​
IRINA_888 [86]

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

8 0
3 years ago
Read 2 more answers
Rewrite following program using for loop no=3456 while no&gt;0 : print(no%10) no=no/10
PtichkaEL [24]

Answer:

no=3456  

for x in reversed(str(no)):

 print(x)

Explanation:

If you turn the number into a string and then reverse it, you can achieve the same output.

8 0
3 years ago
Read 2 more answers
List of all the storage devices that you use for storing your school projects and assignments then state the reason you chose th
Dmitry [639]

Answer:

I use my oldest computer to store my information

Explanation:

I use my old computer to store things because it does not function properly such as taking a slow time loading or shutting down completely so I use it to store my data.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Wi-Fi is all around us. Is there any downside to its pervasiveness?
    11·1 answer
  • Why would Google combining information from separate accounts across its services and sites have privacy implications for its us
    11·1 answer
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • A) Suppose a computer has an instruction pipeline with 4 phases. How many cycles (if there are no delays) would it take to compl
    13·1 answer
  • Which math ratio represents efficiency?
    8·1 answer
  • I don 't have a question but i want to use video filter but when i click it there was no frames i want to use it .Please
    8·2 answers
  • Which types of online reading tools are available within the CloseReader? Check all that apply.
    11·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
  • Which action does not happen in each iteration of the repeat loop in the
    9·1 answer
  • Organizations can face criminal or civil penalties for being ______ in protecting their sensitive data.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!