1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
14

________ uses statistical techniques to explore records in a data warehouse by hunting for hidden patterns and relationships tha

t are not detectable in routine reports. Group of answer choices
Data Warehousing
Data Marts
Data Mining
None of the above
Computers and Technology
1 answer:
Ulleksa [173]3 years ago
8 0
The answer is Data Warehousing
You might be interested in
"if" statements are part of creating computer programs, what are these instructions called and how would you use them?
podryga [215]

Answer:

if means that like (if this happen it will come or not come answer)

Explanation:

sorry I don't know how to tell but plz reply if you understand or not.

7 0
3 years ago
Read 2 more answers
Name two components required for wireless networking<br>(answer fastly)​
Luden [163]

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

5 0
3 years ago
Which slide elements must claire use to enhance her presentation?
Crank

The answer for the 1st blank is text.


6 0
3 years ago
Read 2 more answers
Your uncle spent most of his teen years in a hospital undergoing treatment for a severe physical illness. As an adult, he is rat
ziro4ka [17]

Answer:

one-dimensional

Explanation:

According to my research on studies conducted by psychologists, I can say that based on the information provided within the question I can say that the theory or model of what caused his phobia is one-dimensional. This can be said because by growing up in a single closed environment he does not have experience when finally being part of society, therefore his personality or characteristics are one-dimensional.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
Other questions:
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • The code int *p; declares p to be a(n) ____ variable. new
    8·1 answer
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • Multiple Choice
    9·1 answer
  • Is Filmora 9 or Final Cut Pro Better for personal use?
    12·1 answer
  • Which one do we use to send signals as IR light waves?
    11·1 answer
  • Why is it important for organizations to make strong commitment to Cloud at scale?
    14·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!