1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
2 years ago
12

Data mining must usestatistics to analyze data. True False

Computers and Technology
1 answer:
Rasek [7]2 years ago
4 0

Answer: True

Explanation: In data mining, they use statistics component for the analyzing of the large amount of data and helps to deal with it. Statistics provide the techniques for the analyzing, evaluating and dealing with the data that is known as data mining.Data statistics provide the help to organize large data in a proper form and then analyze it. Thus, the statement given is true that data mining must use statistics to analyse data.

You might be interested in
What is the maximum number of columns in a spreadsheet that you can sort in one instance in software like OpenOffice Calc?
MakcuM [25]
The correct answer is D
6 0
3 years ago
Read 2 more answers
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
2 years ago
Rank the following disk capacities from largest to smallest: a. terabyte b. petabyte c. kilobyte d. gigabyte e. megabyte
Fynjy0 [20]

Answer:

The rank of disk capacities in decreasing order is:

1.petabyte,

2.terabyte

3.gigabyte

4.megabyte

5.kilobyte

Explanation:

Petabyte is largest among all and 1 petabyte equal to 1024 terabyte

Kilobyte is smallest among all and 1 kilobyte equal to 1024 byte

1 megabyte is equal to 1024 kilobyte

1 gigabyte is equal to 1024 megabyte

1 terabyte is equal to 1024 gigabyte

3 0
3 years ago
How many characters can be store on a disk with a capacity of 720bytes
fiasKO [112]

Answer:

184320

Explanation:

256x720

7 0
1 year ago
Other questions:
  • Which of the following should you avoid when designing your Print resume?
    11·1 answer
  • Common input devices include the keyboard, ____, and integrated video cameras.
    12·1 answer
  • What does the shell of an operating system do
    14·1 answer
  • How do you return a value from a function?
    6·1 answer
  • How to write email abut new home your friend ​
    14·1 answer
  • Create a Divisible application that displays a random integer between 1 and 100 and displays appropriate messages stating whethe
    5·1 answer
  • Why has base 2 been accepted and used as the basis for computing?​
    8·1 answer
  • How to make your nest learning thermostat stop doing something
    14·1 answer
  • Computer works on the basis of?​
    9·1 answer
  • The unit we use to measure bending moment is...<br> A kg<br> B N<br> C Nm<br> D MPa
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!