1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
11

Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading

the articles, did you think about data being used in the manner that it is? Name one other organization that may be using data warehousing and data mining techniques and explain how it is being used
Computers and Technology
1 answer:
IrinaK [193]3 years ago
7 0

Answer:

Walmart has caught my attention many times, and definitely when I was reading a case study on it recently. The data that they have collected is from all over the world, and probably the most well planned as it originates from some very high level and good analytics, awesome queries and various other heterogeneous sources. And they have a very unique way of using this data. Being an Engineer however myself, I have studied Data warehousing and Data mining in detail as well as Machine learning. And Walmart first collects the data using Data warehousing, and then it cleans it using the statistics, artificial intelligence, machine learning and statistics, and finally makes a model using the machine learning. They call it all together Data science, and the collected data is being termed as big data, and it has all typos of data which includes images, text, video, sound, animations, and all. Apart from Walmart, you can think of all the social media sites, e-commerce sites, and a lot more.  All are using the data warehousing, data mining and Machine learning all together.  

Explanation:

The answer is self explanatory.

You might be interested in
Write a program that accepts any number of scores ranging from 0 to 10
Likurg_2 [28]

Answer:

I think it's 5,6,3,8,4

8 0
3 years ago
Which object event is an indication that something has been created but not committed into the database?
ollegr [7]

Answer:

before update

Explanation:

because the update has been made but not submited

8 0
3 years ago
Which of the following describes the purpose of project management? planning and organizing resources to meet a goal arranging t
True [87]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about selecting the option among given options that best describes the purpose of project management.

The correct option of this question is the purpose of project management is planning and organizing resources to meet a goal.

Because project management is all about planning and organizing resources of a project to meet project goals.

Other options are not correct,

because arranging the order of tasks in a project, presenting data in an organized manner, and producing a quality project- all come under project management- are parts of planning and organizing steps of project management.

4 0
3 years ago
What bit position in an ascii code must be complemented to change the ascii letter represented from uppercase to lowercase and v
MariettaO [177]
Flip bit position 5 to accomplish this. This maps to hex value 0x20, where the least significant bit is assumed to be at position 0.

Example: ascii "A" = 0x41, "a" = 0x61.  0x41 xor 0x61 = 0x20.

You would implement a flip function by XOR'ing the character value with 0x20.
4 0
3 years ago
What are three consequences of a negative digital Trail​
Vladimir79 [104]

Answer:

The digital footprint that is had behind can have repercussions in every aspect of your adolescent's life, conceivably bringing about botched occupation chances, public sharing of individual data, destroyed connections

Explanation:

Digital trail what's left behind as you calmly peruse the web, post via web-based media or even sort into a visit administration. Regardless of whether you're mindful, you add to your advanced impression or profile every day when you sign onto the Internet. The sites you visit, the news posts you remark on, the remarks you leave via web-based media stages—every one of these things meet up to make a representation of your online life.  

The digital footprint that is had behind can have repercussions in every aspect of your adolescent's life, conceivably bringing about botched occupation chances, public sharing of individual data, destroyed connections — or, in what is likely more pertinent to them at this moment: Their folks discovering what they've been up to and along these lines being rebuffed.

8 0
3 years ago
Other questions:
  • Write a function called ReverseLetters that takes an input phrase consisting of a single word and reverses the sequence of lette
    15·1 answer
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • Assume that a picture is represented on a monitor screen by a rectangular array containing 2048 columns and 1536 rows of pixels.
    12·1 answer
  • Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
    13·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • 1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma
    6·1 answer
  • 2.13 LAB: Branches: Leap Year
    11·1 answer
  • When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.
    8·1 answer
  • Please help and answerr
    8·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!