1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
1 year ago
14

a data tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patter

ns and relationships. is a language associated with a database management system that end users and programmers use to manipulate data in the database.
Computers and Technology
1 answer:
Mashcka [7]1 year ago
6 0

Text mining tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

Here's the complete question:

__________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

- OLAP

- Text Mining

- Web mining

- Web content mining

What is Text mining?

Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.

Learn more on Text mining from:

brainly.com/question/25578967?referrer=searchResults

#SPJ4

You might be interested in
Which of the following are examples of packages you can import and use classes from in java?
Svetlanka [38]
It’s D java. int i think
8 0
3 years ago
Having knowledge of the main parts of a computer: CPU, ALU, INPUT, OUTPUT ,and MEMORY Can you explain in simple for dummies what
Morgarella [4.7K]

Answer:

Explanation:

Great question, it is important to ask these questions in order to get rid of any doubts you may be having.

I will explain this as simply as possible in separate parts.

CPU: the CPU is the brain of the computer where all the information is received, processed, and sent from.

ALU: are the digital circuits inside the CPU used to perform all the arithmetic and logic operations

INPUT: are the commands given to the computer by the user.

OUTPUT: is the information displayed on the screen by the computer.

Memory: is the piece of hardware used to save all the information that is currently being used by the computer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network
kifflom [539]

Answer:

Correct answer is War Driving

Explanation:

War driving is very similar to war dialing which was used to breach telephone network

War driving is also known is access point mapping.Its a process in which a person look for wireless networks and tries to find vulnerabilities in them to exploit while driving in a vehicle. A computer , Ethernet card and antenna is needed to do war driving.

To protect against this threat WEP (Wired Equivalent Privacy) encryption,

dmz,firewalls and WPA are used.

5 0
3 years ago
A computer that is running Windows Server 2016 has scheduled backups every night. However, reports show that some of the compute
iren2701 [21]

Answer:

Answer to the following question is The DCS Properties of Schedule tab i.e "schedule Performance Monitor".

Explanation:

During the collection of the data and the creation of the data set, you have to configure the following schedule, firstly we have to open the property for the set of the data collector.

After the collection of the data and the creation of the data set, by clicking the right data collector name you can successfully scheduled the options in the MMC(Microsoft Management Console) pane and then you select the properties.

3 0
3 years ago
How do I restart my ipad without connecting it to itunes?
soldier1979 [14.2K]
All you do is hold the power button and click restart. It doesnt affect the iTunes... 
4 0
3 years ago
Read 2 more answers
Other questions:
  • Tim is in charge of the upcoming interschool baketball tournamnent. He wants to arrange all of the teams and their members in al
    15·1 answer
  • 100 points !!! Some games fall under more than one category. For example, many racing games allow players to modify the cars the
    8·2 answers
  • Write a C++ program in which you declare variables that will hold an hourly wage, a number of hours worked, and a withholding pe
    12·1 answer
  • A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
    11·1 answer
  • If you want to change the smart quote settings, what steps should you follow to find them?
    5·1 answer
  • You want to verify whether a PTR record exists for the Serv2.csmpub.local host, but you don't know the IP address. Which of the
    8·1 answer
  • Write a program that has a conversation with the user. The program must ask for both strings and numbers as input. The program m
    12·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • True or False: Busy people prefer your email as one big paragraph rather than adding line breaks for new sections/paragraphs. Yo
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!