1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
4 years ago
12

An online company wants to conduct real-time sentiment analysis about its products from its social media channels using SQL.

Computers and Technology
1 answer:
iogann1982 [59]4 years ago
4 0

Answer:

An online company wants to conduct real-time sentiment analysis about its products from its social media channels using SQL. The solution which has lowest cost and operational burden is as follow:

B. Configure the input stream using Amazon Kinesis Data Streams. Use Amazon Kinesis Data Analytics to write SQL queries against the stream.

Explanation:

  • The option A is not correct as this solution doesn't have lowest cost and operational burden as set up a streaming data ingestion application on Amazon EC2 and connect it to a Hadoop cluster for data processing will have more cost and operational burden.
  • The lowest cost and operational burden solution is that we configure input stream using Amazon Kinesis Data Streams. We can use Amazon Kinesis Data Analytics to write SQL queries against the stream.
  • The option c and d are also more pricey in terms of cost and operational burden as compared to Amazon Kinesis Data stream and analytics.  

You might be interested in
You are troubleshooting a laptop with multiple sticking keys that result in misspelled words while the user types. Other than se
Tasya [4]

Explanation:

Interesting problem that can happen to coffee drinkers and slush lovers.

Most of the time, multiple sticking keys simultaneously appearing infer a recent (3 days to a week) spill of a sugary liquid on the keyboard.

If it is a built in laptop keyboard, read no further, confide in a repair shop because keys are not easy to open, and harder to put back.

If it is a USB (or PS2) keyboard, AND you are handy, AND you can lift the key tops (and put them back), you can detach keyboard from computer, then after removing key tops of the sticky keys, try cleaning with warm (to better disolve the sugar) water with a non-dripping cotton tip and dry with cotton swaps.  Let dry for the next few days before plugging in again.  Do NOT use solvents, and definitely NOT "contact cleaners".

The safest and suggested option is to replace the (detachable) keyboard with a compatible or similar one.  If PS2 keyboards are hard to find, there are converter cables that plug into the PS2 sockets of the computer, and accept USB input  (and reverse cables).

5 0
3 years ago
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence
igomit [66]

Answer:

Data recovery

Explanation:

Data recovery -

It is the method involved in computer , where the lost , damaged or corrupted file or data is gained back again , is referred to as data recovery.

The information is recorded by some secondary method , when the file cannot be accessed in the original manner.

Hence , from the given scenario of the question,

The correct term is data recovery.

4 0
3 years ago
Which button is used to set up the pen color?
Mrac [35]
C. custom slideshow because this is where you can customise everything you do eg. pen colour, don't etc.
5 0
4 years ago
Read 2 more answers
Please explain external hashing, B-trees, and traversals. 3-5 sentences per
katrin [286]

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

4 0
4 years ago
What kind of loop should be used in a game where the user is guessing a secret code and the message"guess again" appears until t
GenaCL600 [577]

Answer:

While loop

Explanation:

It should be noted that the number of times which the computer will ask the user to take a guess is not known.

When we have a condition like this, the while loop (or in some programs; the do-while loop) is to be used.

To further back my point, see the following program in python.

<em>secret_code = 1234</em>

<em>user_guess = int(input("Take a guess: "))</em>

<em>while user_guess != secret_code:</em>

<em>     user_guess = int(input("guess again: "))</em>

<em>print("You guessed right")</em>

<em />

The above program will keep asking the user to take a guess until the user enters 1234.

<em>This may or may not be possible with a for loop.</em>

3 0
3 years ago
Other questions:
  • Please help
    5·2 answers
  • Ok so sometimes when i do something i see a box with a question mark in it, how do i remove it, i am on a macOs High Sierra earl
    11·1 answer
  • i see tabs named mowed and Ramsey i tried shredding them and deleting them and ending all the processes but they start duplicati
    13·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat
    13·1 answer
  • How much heat is needed to raise the temperature of 7g of water by 15oC?
    6·1 answer
  • Does anyone have a pdf of the greatest by eddie van der meer????
    15·1 answer
  • A student wrote a song. Another student posted a video of the song on You Tube, claiming to have written the song. This is most
    15·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
  • Which of these agents of education empowers the other..........
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!