1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
4 years ago
8

The vast amount of data collected from Internet searches, social media posts, customer transactions, military

Computers and Technology
1 answer:
Brums [2.3K]4 years ago
3 0

Answer:

A. Big Data

Explanation:

It is big data. The internet searches, customer transactions, social media posts, medical tests, weather sensors, military surveillance, and all the data source you are seeing around yourself forms together with the big data. And a big social media company gathers around so many petabytes of data each day. And there are so many such companies, plus all sorts like eLearning sites, etc. And all these together form the big data.

You might be interested in
HELP ME PLZZ FFFAAASSSTTTT
Dahasolnce [82]
The answer has to be A because we you get your licensed suspended you are un able to drive for a while Intel you take the test again and or pay a fine
6 0
3 years ago
Read 2 more answers
It keeps saying “something is going wrong oops!” when i click on my brainly notifications what do I do
AveGali [126]

Answer:

check your app permissions it may be blocking them or try resetting the app

4 0
3 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
Forgot this website exsited wsp
Mariulka [41]

Answer:

no

Explanation:

5 0
3 years ago
Read 2 more answers
Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
Marina86 [1]
Divide 1210 by 16  and write reminder divide until value zero 

first step divide 1210 by 16 =  10 
then 75 divide by 16 =  11
4 

we can write 4 B A 
in hexadecimal 

4 0
4 years ago
Other questions:
  • To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
    5·1 answer
  • Variable names may contain spaces and punctuation symbols. True False
    15·1 answer
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • What command prompts should be used to assign an IP address to:
    9·1 answer
  • Can you list one property of each of the following?<br> Excel<br> Word<br> Powerpoint
    7·2 answers
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • Consider the following method, inCommon, which takes two Integer ArrayList parameters. The method returns true if the same integ
    15·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Write a program with a "function" named "getMinFromInput()" that reads a list of integers from the keyboard and returns the smal
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!