1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
5

Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma

ny authorized users to browse data to research a problem or obtain detailed information underlying a report. c)Using sophisticated statistical analysis to discover relationships among data not previously hypothesized d)Combining master files into large data repositories that many application programs can access
Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
7 0

Answer:

C

Explanation:

In simple words, data mining is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software.

You might be interested in
The highly advanced decision support feature integrated within an electronic information system would support which activity?
vlabodo [156]
Flash would be the option
7 0
3 years ago
Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
9966 [12]

Answer:

125 percent of continuous load

Explanation:

8 0
3 years ago
Which statement reflects inherent bias in reading and learning about our world?
love history [14]
I had to look for the options and here is my answer:

The statement that best illustrates what inherent bias is at is is used in reading and learning about the world is this: "<span>Historians are interpreting the past." Definitely, historians do not interpret the past, but rather their field focuses on gaining facts and information related the past.</span>
8 0
3 years ago
Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
Lorico [155]

Answer:

<u>Organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. </u>

Explanation:

The seven domains in an IT structure can be identified as:

  1. User Domain,
  2. Workstation Domain,
  3. LAN Domain,
  4. WAN LAN Domain,
  5. Remote Access Domain,
  6. WAN Domain,
  7. and System / Application Domain

They can be configured as portals for countermeasure failure and intruders, so it is crucial for organizations to look for ways to protect these domains to prevent unauthorized access to private data.

Therefore the relevance of the systematic approach to threats and vulnerabilities, which will assist in organizing the roles, responsibilities and responsibilities for risk management and mitigation.

7 0
3 years ago
Explain the unique reason why assember language is perfered to high level language
Zigmanuir [339]

The unique reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

<h3>Why is assembly language better than other kinds of high level?</h3>

It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.

Note that it is one that has a lot of  better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.

Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.

Hence, The unique reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

Learn more about assembler language from

brainly.com/question/13171889

#SPJ1

3 0
2 years ago
Other questions:
  • Match the job skills with the correct job role.
    12·1 answer
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • J. A computer on a network that acts as the central storage location for
    5·1 answer
  • Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested use
    6·1 answer
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • What does good time management mean​
    8·2 answers
  • Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2
    7·1 answer
  • The disk you inserted was not readable by this computer
    11·1 answer
  • Why does Homework exist? Why is it so important?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!