1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
4 years ago
8

The vast amount of data collected from Internet searches, social media posts, customer transactions, military

Computers and Technology
1 answer:
Brums [2.3K]4 years ago
3 0

Answer:

A. Big Data

Explanation:

It is big data. The internet searches, customer transactions, social media posts, medical tests, weather sensors, military surveillance, and all the data source you are seeing around yourself forms together with the big data. And a big social media company gathers around so many petabytes of data each day. And there are so many such companies, plus all sorts like eLearning sites, etc. And all these together form the big data.

You might be interested in
1. (A+B)(B'+C)(C+A)<br> 2. A'B'C'<br> 3. (X+Y)(X'+Z)(Y+Z)<br> 4. A'B'C'+A'BC'+A'BC+ABC'
Diano4ka-milaya [45]

you need to put your question

5 0
3 years ago
Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
natka813 [3]

Answer:Is called war driving

5 0
3 years ago
How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?
Helen [10]
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

3 0
3 years ago
Read 2 more answers
Which of the following is NOT an example of one of the six primary ways businesses use the Internet?
pishuonlain [190]
The answer is c to manufacture new products because it is not hardware the internet can not produce products
3 0
4 years ago
Read 2 more answers
The sales management team requires that the Lead Source field of the Lead record be populated when a Lead is converted. What wou
Sav [38]

Answer: A. Validation rule

Explanation:

Validation rules can be used to ensure that fields are populated because they can verify if the data being inputted meet the requirements of the administrators by returning a 'True' or 'False' response after testing. If the result is false, the user will be unable to move on until they adjust the field.

For example, Field length checks on websites are a Validation rule where you are only allowed to input a set number of characters and anything less or more will be denied, such as in the case of inputting phone numbers.

By including a Validation Rule that the LeadSource field of the Lead record be populated when a Lead is converted, the developer will be able to make sure that a user populates the Lead Source field prior to converting a Lead.

5 0
3 years ago
Other questions:
  • Brad teaches an accounting class, and he created a PowerPoint presentation from a Word outline for his class. This Word outline
    14·1 answer
  • Will sum1 come bust me outta FCA....replies u gotta live in knoxville though
    13·2 answers
  • Caitlyn's Crafty Creations computes a retail price for each product as the cost of materials plus $14 multiplied by the number o
    10·1 answer
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • What is the largest computer file size, megabyte , gigabyte, terabyte
    15·2 answers
  • An alarm clock draws 0.5 A of current when connected to a 120 volt circuit. Calculate its resistance.
    10·1 answer
  • What accesses organizational databases that track similar issues or questions and automatically generate the details to the repr
    14·1 answer
  • Why media is far from government​
    6·2 answers
  • You are working on a group project in which each member is required to collaborate on the write up the group wants to see what e
    5·1 answer
  • Connect research concepts to their definitions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!