1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
12

Data silos are often associated with ________________.

Computers and Technology
1 answer:
amid [387]3 years ago
7 0

Answer:

Option b the development of one or a few related analytics applications.

Explanation:

Data silo is the isolated information in an organization which is not shared across different departments. Data silo could exist because one department in an organization may not see the necessity to share information to other department. Or the information is deemed as unique data which is dedicated  to develop one or a few very specific analytics applications.  Data silos should be minimized if an organization intends to develop a data analytics system that support in enterprise wide level.

You might be interested in
The term _____ best describes the level of technology skills needed in today’s business world.A: computer knowledgeB: computer f
Alja [10]

Answer:

The answer is "Option B"

Explanation:

The ability to learn and use basic computer hardware and software understanding to solve problems and to access information is known as computer fluency. and other options are not correct, that can be defined as follows:

  • In option A, computer knowledge is a basic general awareness, that helps the user to use the computer more fluently, that's why it is not correct.
  • In option C, It is an internal feature of the computer, that helps to transfer data, that's why it is not correct.
  • In option D, computer information is also known as data that is stored in the computer, that's why it is not correct.
6 0
3 years ago
Ill give you brainiest.
quester [9]
Hey there,

I believe that your correct answer would be that "<span> some people will tell you what they think you want to hear </span>". When you ask someone about the perceptions of your person trait, they will most likely <span>tell you what they think you want to hear because its what they want to make you happy. 

For example: Jimmy ask billy "Am I fat Billy"

                      Billy tells Jimmy "No, Your not fat, you look just great".

                         But really, Jimmy is very fat.

The point is that people are going to say things that make you feel happy and something that you want to hear.

~Jurgen</span>
6 0
4 years ago
If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card?
uysha [10]

into a port on the outside of the computer


6 0
3 years ago
Read 2 more answers
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Can run mobile-style apps in the area known as the start screen, while running traditional software in the more familiar desktop
Travka [436]
The correct answer: Yes, mobile-style apps can run in a personal computer's desktop.

That is possible by means of a desktop application called emulatator. An emulator like Bluestacks allows a personal computer to run mobile-style apps by acting as a virtual drive in the personal computer's harddisk. 

Emulation is successful if the system requirements of the mobile-application is met by the personal computer's system attributes such as Random Access Memory abundance, Random Access Memory speed, Processing speed (in some cases core abundance e.g. core 2) etc. 

Some mobile-applications do not work in the personal computer's desktop, however, if this application requires platform specific functions such as mobile device's network provider etc.
4 0
4 years ago
Other questions:
  • A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, t
    12·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • Write the execution steps if the input is a lion.
    11·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc
    14·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    12·1 answer
  • 4.2 lesson practice help plzs
    6·1 answer
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!