1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
3 years ago
13

________ is a process in which computer software that uses statistical analysis, database technology, and artificial intelligenc

e finds hidden patterns, trends, and connections in data so that business owners can make better marketing decisions and predictions about customer's behavior.
Computers and Technology
1 answer:
QveST [7]3 years ago
6 0

Answer:

Data Mining.

Explanation:

Data Mining is the process in which a computer software uses database technology,artificial intelligence and statistical analysis so that it can find the hidden patterns,connections and trends in the data.To help business owners to make better marketing decisions and predictions about the customer's behavior.

You might be interested in
Zach follows the instructions that show him how to create a custom Web site in his school's learning management system. These st
NNADVOKAT [17]

Answer:

The answer is "Procedure"

Explanation:

In the given statement certain information is missing, that is choices, which can be described as follows:

a. procedure

b. software

c. data

d. hardware

e. memory

The procedure is a way, that accomplishes any task in the following steps, if there is a long process so, we divide this process into parts or modules to accomplish the task, and  certain alternative was wrong, that can be described as  follows:

  • Software is a program, that is accomplished in the procedure.
  • data, It describes all procedures.
  • hardware, It is a device, in which we work.
  • memory, It stores all the data in a procedure.    
3 0
2 years ago
It is a function that removes an existing file from the server.
kondaur [170]

Answer: A) remove()

Explanation:

 The remove() function removes an existing file from the server but it does not affect the existing directory and file. We can also ease and remove files in the file handling by using the remove() function. And it is built-in function that removes any type of the data from the function by taking values in the parameter whose values are equal with the passing value in the parameter.

7 0
3 years ago
Which of the following is NOT a common slide layout?
Kitty [74]
The answer is going to be story, for your question of the following that is not a common slide layout
3 0
2 years ago
Software that people commonly use in the workplace to make their lives easier is called
Bogdan [553]
It is either System Software or Productivity Software.

Hope this helps!
3 0
3 years ago
One of the safest and easiest investments for young people is
Thepotemich [5.8K]

Answer:

Young investors have the single most valuable resource on their side⁠—time. Compound interest and dividend reinvestment are proven methods of building long-term wealth.

8 0
2 years ago
Other questions:
  • What is client server relationship is the basic form of what
    6·1 answer
  • Select the correct answer.
    6·1 answer
  • How does a router handle a packet destined for a network that is not listed in the routing table?
    14·1 answer
  • How to upload themes to chrome web store
    11·1 answer
  • Most Internet users access commercial websites, which have higher-quality information because of higher editing standards and th
    12·1 answer
  • Write a method called sum with a while loop that adds up all numbers between two numbers a and b. The values for a and b can be
    11·2 answers
  • If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
    6·1 answer
  • Find the median and mean of the data set below: 29 17 40 12 29
    6·1 answer
  • You are running your warehouse using Autonomous Data Warehouse (ADW) service and you noticed that a newly configured batch job i
    15·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!