1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
1 year ago
10

Which of the following are examples of security threats?

Computers and Technology
1 answer:
svetoff [14.1K]1 year ago
3 0

Answer:

b,c.d

Explanation:

bc i got it wrong

You might be interested in
Zara is typing the names of all the States in Pakistan. She has not numbered the list. Suggest her the way by which she can numb
Pavel [41]

Answer:

Following are the steps that Zara  is taking to numbered the list is given below .

Explanation:

  • Choose the names of the states to be numbered.
  • Choose the Insert menu bar option. After that click from there on the Bullets and Numbering option.
  • After that different lists will show representing the numbering in different ways.
  • Select the numbering type option that you'd like to implement, and press ok button on it .
  • Finally the names of the state of Pakistan is numbered .

7 0
3 years ago
"Your friend is having a birthday and you want to create a slide-show presentation with pictures of her that you have saved on y
OleMash [197]
Could you be more specific? So I can help you in the best way I can.
5 0
3 years ago
Write a detailed three page report that summarizes how data scientists are utilizing data mining to predict future trends and be
LiRa [457]

Answer: given in the explanation

Explanation:

Data mining is referred as an automated processing tool used for sorting and analyzing enormous data and information which indeed are ``aimed towards effectively identifying trends and patterns and establishing relationships to solve business problems and generate new opportunities. Furthermore data mining techniques also helps to predict what’s going to happen in the future and act accordingly to take benefit of forthcoming tendencies.

Data mining is applied to a variety of large-scale data-processing activities such as collecting, extracting, warehousing and analyzing data. It also includes decision-support applications and technologies such as business artificial intelligence and machine learning and is used in varied areas of business research such as product development, sales and marketing etc.

Data mining is for taking advantage of data to predict ;

  • Mathematical algorithms, and, data are used for predictive analytics. One can capture information, and, use it to model sales pattern, trends, and, customer behaviour
  • Data mining uses algorithms to extract, and, analyze information; discover hidden patterns
  • It uses data patterns, and, is thus closely tied to machine learning
  • Historical & current information is used to predict future trends

Data mining can be used for the following:

  • Data mining in gas & oil operations - Mining data in gas & oil operations involves committing to key technologies, and, processes; and, embracing new ways of thinking & problem-solving. Firms can use exploratory data analysis, modelling techniques & model development; approaches to put models into production
  • Big data - Performance computing & advanced analytics
  • Magic Quadrant - Evaluate 16 vendors to identify the right ones
  • Heavy reading, network analytics - Optimize network; evaluate network performance; provide targeted marketing; fine-tune capacity.

5 0
4 years ago
If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
ehidna [41]

Answer:

Runa, because  she’s like me I r l lol

Explanation:

3 0
3 years ago
Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
Elan Coil [88]
Why was Windows 1.0 considered an operating environment rather than an operating system. Because it was only a shell; MS-DOS was still the operating system. ... One difference between Windows 3.0 and Windows 2.0 was that users could no longer use MS-DOS commands to operate their computers.... the answer is “it provided a shell for MS-DOS
7 0
3 years ago
Other questions:
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • Can folders have mixed apps?
    6·1 answer
  • Checker for integer string (Please answer in C++):
    8·1 answer
  • Search the web to discover the 10 most common user-selected passwords, and store them in an array. Design a program that prompts
    7·1 answer
  • Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
    7·1 answer
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • A Homecoming Crossword Puzzle
    12·1 answer
  • 1 Which of these is not an Operating System ?
    7·2 answers
  • What is responsible for what you see on the monitor?
    13·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!