1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
9

Stores of data that are so vast that conventional database management systems cannot handle them, and very sophisticated analysi

s software and supercomputing-level hardware are required, are known as ____. These data include not only data in corporate databases but also web-browsing data trails, social network communications, sensor data, and surveillance data.
(A) cyber-age databases
(B) Big Data
(C) mega IT
(D) super data
(E) new age computing
Computers and Technology
1 answer:
rjkz [21]3 years ago
3 0

Answer:

Big Data

Explanation:

none

You might be interested in
What OS is most commonly used by businesses? Linux Macintosh Microsoft Windows
alexira [117]
It's often Linux since Linux is free, but it could be Windows.
4 0
3 years ago
Which of the following protocols is used by Web servers to establish communication between a web page and a web browser?
Iteru [2.4K]
HTTP or HTTPS is most likely the answer you are looking for.
6 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
You and three of your friends decide to hike the Appalachian Trail, a 2175-mile trail running from Georgia to Maine, starting wh
kozerog [31]

Answer:

The things to do:

a. Lie down flat.

b. Call your friend on phone to inform him of the situation, if he is not already aware.

c. Instruct him to call the rescue team and a helicopter ambulance.

d. Make a video call to your doctor and ask her for first aid instructions.  She can use HIPAA compliant video-conferencing tools to initiate consultations and treatment with you from the far distance.

e. Follow your doctor's instructions.

Explanation:

Telemedicine is the extension of medical services to patients in remote places.  This practise is facilitated by the use of telecommunication devices and telemedical equipment.  Telemedicine is made possible by technological advancements.  Many healthcare practitioners have embraced the practice and offer their patients telemedical services as the need arises.

Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996, which was enacted by the 104th United States Congress and signed by President Bill Clinton in 1996.  The Act encourages Healthcare access to remote patients, medical consultation and treatment portability, and secures health information, among others.

7 0
3 years ago
Which type of electronic community allows real time discussion among members
GrogVix [38]

Answer:

Instant messaging is the type of electronic community that allows real-time discussion among members.

7 0
3 years ago
Other questions:
  • You can access various sites on the WWW by using hyperlinks or by
    14·1 answer
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • For which of the following careers is technology’s connectivity factor most important?
    13·2 answers
  • Which turn best describe news one is connected to the government and is used as a political tool more than as a business product
    12·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • Can I ask a computer question based on engineering?
    8·1 answer
  • 2. Which property is used for hiding text of the textbox?
    14·1 answer
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
  • The action of entering data into your computer. This can be text typed in a word processing document, keywords entered in a sear
    8·1 answer
  • Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!