1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
9

Which best explains why magnets can push on or pull other magnets without touching them?

Computers and Technology
1 answer:
xeze [42]3 years ago
7 0

A is wrong.

B is correct.

C is true but magnetic monopoles have been predicted in theory, but never found in practice.

You might be interested in
I’m quitting this thing so I’m giving all my points away which are 218!!! I’m still gonna have more tho just in case I ever need
Sedaia [141]

Answer:

skdjdishsjsbsisjsjsjsjsnssnsjsjsjsjsjsjjskdxkjdsisi

4 0
3 years ago
Read 2 more answers
The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capt
lys-0071 [83]

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

8 0
3 years ago
____________ markup languages contain sets of directions that tell the browser software how to display and manage a web document
alekssr [168]
Hyper Text Markup Language (HTML).
5 0
4 years ago
Which guideline should you use when downloading software from the internet?
Anton [14]
Limiting your computer's vulnerability to malware is a crucial safe browsing habit. You can protect your computer by running antivirus<span> and </span>antimalware<span> software like </span>Bitdefender<span>, </span>Norton<span>, or </span>Kaspersky<span>. These programs can block malware from being installed and can remove it if it does get onto your computer. Even if you don't see signs of malware on your computer, running regular scans can catch any malware that has escaped notice.</span>
4 0
3 years ago
Read 2 more answers
What is a high level language?​
vovikov84 [41]

Answer:

a high level language is any programming language that enables development of a program in a much more user friendly programming context and is generally independent of the computers hardware architecture.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Do all accounts use the same routing number
    12·1 answer
  • 1. What arguments can you make for the idea of a single language for all programming domains
    10·1 answer
  • Effective resource management: a. Locks out unauthorized access and can work to prevent changes to resources by internal users n
    8·1 answer
  • How to calculate a pid controller
    8·1 answer
  • Create a network for a company that sells shoes. Describe the hardware needed and the size of the network (PAN, LAN, WAN) and ma
    6·1 answer
  • What is a set of illustrations displayed in a specific sequence to pre-visualize what your mobile app looks like and how it work
    5·1 answer
  • Study the sentence below
    13·2 answers
  • A seller buys and item from a manufacturer for 9,500
    9·1 answer
  • Ashton assigned a string value to a variable. Which program statement should he use?
    7·1 answer
  • A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!