1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
5

ASAP PLZ!!! Select the correct answer. A research organization conducts certain chemical tests on samples. They have data availa

ble on the standard results. Some of the samples give results outside the boundary of the standard results. Which data mining method follows a similar approach? A. data cleansing B. network intrusion C. fraud detection D. customer classification E. deviation detection
Computers and Technology
1 answer:
MrRa [10]3 years ago
8 0

Answer & Explanation:

Data classification is an approach to identifying, protecting and managing information which has rapidly become best practice. Implemented as part of a layered security strategy, it enables an enterprise to defend itself against a variety of threats – from aggressive outsiders to untrained or well-meaning insiders – while unlocking the full potential of its data to drive innovation and productivity.

You might be interested in
In addition to MLA, what are some other widely used style guides? Check all that apply.
Lostsunrise [7]
APA and Chicago manual of style :D
6 0
3 years ago
Read 2 more answers
Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
dezoksy [38]

Answer War Chalking

Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.

It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network  is then used for their own work after being hacked.

3 0
3 years ago
Read 2 more answers
what is the the process of sending a packet from one host to a selected group of hosts, possibly in different networks?
Burka [1]
I believe it's "multicast"
6 0
3 years ago
They convert energy from the Sun into usable chemical energy by the process of photosynthesis. They are
Alchen [17]
Photosynthetic organisms are producers because they are producing chemical energy useable by living things.
4 0
3 years ago
Can anyone one help in outlook....plzzzz:)
Inessa [10]
I know a few of them like:

9 is F
(I think) 8 is J
4 is E
(I think) 5 is B

I will attempt to figure the others out but for now here is all I have

EDIT: I think 7 is C
8 0
4 years ago
Other questions:
  • What should Timothy consider to make a successful formal presentation?
    11·2 answers
  • Which is an example of withholding you might see on your pay stub
    14·2 answers
  • A(n) ____ is a collection of one or more program statements combined to perform some action
    14·1 answer
  • PLEASEEE HELPPP
    7·1 answer
  • Voltage drop across the resistor
    9·1 answer
  • What is radio frequency identification used for
    6·1 answer
  • A peripheral can be used to tell a computer to complete a specific task.<br> A) True <br> B)False
    13·1 answer
  • An entity can be said to have __ when it can be wronged or has feelings of some sort
    10·1 answer
  • PLEASE HELP I WILL GIVE BRAINLIEST!!
    8·1 answer
  • A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!