1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
12

What is the term used to describe data sets are so large and complex that they become difficult to process using traditional dat

a processing applications?
Computers and Technology
1 answer:
slega [8]3 years ago
5 0

Answer:

Big Data

Explanation:

Big Data refers to data sets that are large, comprising of different varieties (structured and unstructured data types) and which cannot be processed by the day to day database management systems and computer software otherwise referred to as traditional software and techniques.

The term Big does not necessarily refer to a particular size that a dataset must attain but describes the nature of the dataset and the fact that traditional database management systems cannot be used to process them take for example

The datasets of the entire product list from amazon

You might be interested in
Which of the followings is not a testingtype? [2 marks]
Agata [3.3K]

Answer:

Subsystem testing

Explanation:

This is NOT a testing type

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST</em><em> </em><em>IF</em><em> </em><em>MY ANSWER</em><em> </em><em>IS HELPFUL</em><em> </em><em>;</em><em>)</em><em> </em>

5 0
2 years ago
Complete the sentence to identify disadvantages of top-down programming design. Choose all that apply. Top-down programming desi
pav-90 [236]

so is it all about codes and codes and codes and codes and codes lol

4 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
2 years ago
CREIDT INAOCT Unscramble thr word<br>please solve it fast its urgent ​
ivanzaharov [21]

Answer:

Credit Action .......I believe

6 0
2 years ago
Describe and evaluate the working memory model of memory (16 marks)​
Lyrx [107]

Answer: The working memory model is a cognitive model of short term memory comprised of three main components; the central executive, the visuo-spatial sketchpad and the phonological loop. ... they suggests the components of working memory all have limited capacity.

5 0
3 years ago
Other questions:
  • Which is the correct process for adding page numbers to a spreadsheet you will print? A. Click Page Break Preview. Type the page
    7·1 answer
  • A(n) ____ is a collection of one or more program statements combined to perform some action
    14·1 answer
  • Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in
    9·1 answer
  • Instructions Write a program that asks the user for a number. If the number is between 1 and 255, the program outputs the corres
    15·1 answer
  • Explain how each of the five types of prewriting assist a writer in getting started. please make it short.
    15·1 answer
  • How many ways do advertisers determine target audiences ??????
    15·1 answer
  • Juan has performed a search on his inbox and would like to ensure the results only include those items with attachments which co
    14·2 answers
  • Communication protocols, sets of rules agreed to by all parties, are designed in order to:
    15·1 answer
  • Who know's web Design
    12·1 answer
  • can you guys plz answeer this i need help rrly bad and plz no viruses or links or answers that have nun to do with this
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!