1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
12

Data silos are often associated with ________________.

Computers and Technology
1 answer:
amid [387]3 years ago
7 0

Answer:

Option b the development of one or a few related analytics applications.

Explanation:

Data silo is the isolated information in an organization which is not shared across different departments. Data silo could exist because one department in an organization may not see the necessity to share information to other department. Or the information is deemed as unique data which is dedicated  to develop one or a few very specific analytics applications.  Data silos should be minimized if an organization intends to develop a data analytics system that support in enterprise wide level.

You might be interested in
Most languages allow a specialized selection structure called the ____ structure when there are several distinct possible values
aleksandr82 [10.1K]

Answer:

CASE

Explanation:

Case Structure is a mechanism that allows different executions when there are several distinct possible values for a single variable, and each value requires a different subsequent action depending on the value of the label.

Case structure is also a conditional control structure that appears in most modern programming languages and allows a selection to be made between several sets of program statements.

8 0
3 years ago
3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function
MrRissso [65]

Answer:

Pre-processors look at organize traffic and screens parcel transmissions by examining andreassembling divided data.Frag2:preprocessor that battles against IP fracture attacks.Attackers sends a fragmentedTCP bundle with header data that gets entrance through a firewall.At the equivalent time,other parcels with vindictive information "slip" by the firewall undetected because of the fragmentationbeing so little by overwriting the header information.The frag2 pre-processor is specificallydesigned to break down bundle discontinuity to search out noxious information in the sections, which iswhy this pre-processor ought to never be turned off.Stream4:preprocessor Snort uses to coordinate assault marks over numerous packets.Anattacker endeavors to send different parcels into the system conveying parts of the attackpayload which are required to be reassembled by the host so as to start an attack.Stream4 stores the bits of the mark until all bundles are transmitted.Once they are alltransmitted, Stream4 finishes the signature and an alarm is created.

Explanation:

8 0
3 years ago
What is the process called when programmers look for and fix errors in code? Analysis Debug Document Error check
Sunny_sXe [5.5K]
It’s Debug. definition: “identify and remove errors from (computer hardware or software)”.
4 0
3 years ago
Read 2 more answers
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
2 years ago
A binary tree is full if all of its vertices have either zero or two children. Let Bn denote the number of full binary trees wit
Arlecino [84]

Answer:

(a) B_3 = 1\\B_5 = 2\\B_7 = 5

(b) See attached

(c) B_n = 2^{(n-3)/2}

Explanation:

7 0
3 years ago
Other questions:
  • Which of the following is a type of monitor port?
    10·1 answer
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • Select the correct answer.
    9·1 answer
  • Nate specifically wants a template that will work for an application letter. Which features in the New dialog box can
    15·1 answer
  • Blind spots are those areas not reflected in your:
    7·2 answers
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • What is a credit card balance? A...The amount of interest you must pay the credit card company B...The required minimum payment
    15·1 answer
  • Set screw compression and indenter are all types of
    13·2 answers
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!