1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
3 years ago
7

What data does crowdsourcing use? And how does it consume the data?

Computers and Technology
1 answer:
Blababa [14]3 years ago
4 0

Answer:

Explanation:

Crowdsourcing uses the data for communities or volunteers, and this method is used on the internet but existed before the digital revolution, this method collect data from a lot of users, crowdsourcing is used in websites like:

  • Wikipedia
  • LEGO Ideas
  • Amazon Mechanical turk
You might be interested in
List 7 ways of generating<br>airlines​
rjkz [21]

Answer:

1. <em>impr</em><em>ove</em><em> </em><em>air</em><em> </em><em>qua</em><em>lity</em><em>.</em><em>.</em>

<em>2</em><em>. </em><em>Eats</em><em> </em><em>food</em><em> </em><em>rich </em><em>in</em><em> </em><em>antio</em><em>xidants</em><em>.</em><em>.</em><em>.</em>

<em>3</em><em>. </em><em>Stop</em><em> </em><em>smok</em><em>ing</em><em>.</em><em>.</em><em>.</em><em>.</em>

6 0
3 years ago
Read 2 more answers
Is it safe to tape down cords such as internet cables to the floor?
zhenek [66]

Yes it is safe to tape down cords such as internet cables to the floor

5 0
4 years ago
Why does the PC send out a broadcast ARP prior to sending the first ping request
Norma-Jean [14]

Since the ARP broadcast is utilized to request the MAC address of the Host with the IP address contained in the ARP, the PC needs to know the destination of MAC address before it can produce the frame header for the particular PING requested, before it can send a PING to a host.

5 0
3 years ago
What are two fundamental components of data structures?
Fed [463]
Organization and access method.

Hope this helped! :)

- Jujufire
8 0
4 years ago
WRITE IN YOUR OWN WORDS:
MrRa [10]

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

5 0
3 years ago
Other questions:
  • Reflexes are basically "hard-wired" into the CNS. Anatomically, the basis of a reflex is an afferent neuron that synapses direct
    10·1 answer
  • In a cellular network, where does each wireless base station connect to?
    9·1 answer
  • What is the best strategy to avoid paying interest on your credit card
    8·1 answer
  • Which of the following sections of a business plan comes first but should be written last?
    11·2 answers
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • What are three key characteristics of an OS process?
    11·1 answer
  • REM Its an exam program
    12·1 answer
  • suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts wer
    12·1 answer
  • How do u mark bralienst
    5·1 answer
  • What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!