1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
9

What is a flash player?

Computers and Technology
2 answers:
labwork [276]3 years ago
7 0
Freeware software for using content created on the Adobe Flash<span> platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio.</span>
gulaghasi [49]3 years ago
6 0
It is like a musically player
You might be interested in
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Aleksandr [31]

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

6 0
3 years ago
What are some ways you can work with templates? Check all that apply.
yaroslaw [1]
What are some ways you can work with templates? Check all that apply.

Answer: (A,D,E) see picture below for help also.

7 0
3 years ago
Read 2 more answers
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
What was designed as an area where computer vendors could store data that is shielded from user activities and operating system
Nataliya [291]

Answer:

host protected area

Explanation:

7 0
2 years ago
In command prompt, Whats a command that will list only .ini files in C:\Windows\System32 directory?
Ber [7]

Answer:

The dir command is a Command Prompt command that's used to display a list of the files and subfolders contained in a folder.

hope it helps

3 0
3 years ago
Read 2 more answers
Other questions:
  • Functions that are built-in into PHP to perform some standard operations.
    15·1 answer
  • ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
    11·1 answer
  • Markup is best defined as
    11·1 answer
  • Question 3 of 10
    7·1 answer
  • Is this App for real?​
    5·1 answer
  • It's best to use assertive speech when you<br> I want to show respect. *<br> True<br> False
    8·2 answers
  • A section at the top of the page that makes it easy for the recipient to respond to a letter is called a(n
    9·1 answer
  • Please help me plss! PLS​
    8·2 answers
  • Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the s
    13·1 answer
  • your sales operations group would like to perform monthly analyses on large amounts of sales activity. they want to be able to r
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!