1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
4 years ago
13

________ is a process in which computer software that uses statistical analysis, database technology, and artificial intelligenc

e finds hidden patterns, trends, and connections in data so that business owners can make better marketing decisions and predictions about customer's behavior.
Computers and Technology
1 answer:
QveST [7]4 years ago
6 0

Answer:

Data Mining.

Explanation:

Data Mining is the process in which a computer software uses database technology,artificial intelligence and statistical analysis so that it can find the hidden patterns,connections and trends in the data.To help business owners to make better marketing decisions and predictions about the customer's behavior.

You might be interested in
Interior gateway protocols are used by routers in order to share information within a single
jenyasd209 [6]
Interior gateway protocols (IGP)are used by routers in order to share information within a single autonomous system. IGP<span> is used for exchanging routing information between gateways (commonly routers). </span><span>An autonomous system (AS) is a network or a collection of networks that are all managed and supervised by a single entity or organization.</span>
6 0
3 years ago
Did y’all enjoyed project next phase 3 and The 4 revamped heroes
ryzh [129]

Answer:

it was good i liked it

Explanation very good

4 0
3 years ago
Write a program that meets the following requirements.
Zigmanuir [339]

Answer:

import javafx.application.Application;

import javafx.scene.Scene;

import javafx.scene.layout.FlowPane;

import javafx.stage.Stage;

import javafx.scene.control.Button;

public class FlowPaneDemo extends Application {

  public void start(Stage primaryStage) {

      // TODO Auto-generated method stub

      //Creates a FlowPane for each stage.

      FlowPane paneOne = new FlowPane();

      FlowPane paneTwo = new FlowPane();

     

      //Creates six Buttons, three for each Flow Pane.

      Button buttonOne = new Button("Button One");

      Button buttonTwo = new Button("Button Two");

      Button buttonThree = new Button("Button Three");

      Button buttonFour = new Button("Button Four");

      Button buttonFive = new Button("Button Five");

      Button buttonSix = new Button("Button Six");

     

      //Adds the Buttons to the two FlowPanes.

      paneOne.getChildren().add(buttonOne);

      paneOne.getChildren().add(buttonTwo);

      paneOne.getChildren().add(buttonThree);

     

      paneTwo.getChildren().add(buttonFour);

      paneTwo.getChildren().add(buttonFive);

      paneTwo.getChildren().add(buttonSix);

     

      //Creates two Scenes, using each of the FlowPanes.

      Scene sceneOne = new Scene(paneOne, 250, 600);

      Scene sceneTwo = new Scene(paneTwo, 320, 400);

     

      //Makes a second Stage.

      Stage secondaryStage = new Stage();

     

      //Set the title and Scenes for the two Stages.

      primaryStage.setTitle("First Stage");

      primaryStage.setScene(sceneOne);

     

      secondaryStage.setTitle("Second Stage");

      secondaryStage.setScene(sceneTwo);

     

      //Runs the show methods for the two Stages.

      primaryStage.show();

      secondaryStage.show();

  }

  public static void main(String[] args){

      //Runs the launch method to start a stand-alone JavaFX application; only needed

      //as I am running this in Eclipse.

      Application.launch(args);

  }

}

8 0
3 years ago
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
Licemer1 [7]

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

6 0
4 years ago
Other questions:
  • You just realized the turn signal on your vehicle is broken,
    15·1 answer
  • When a class declares an entire class as its friend, the friendship status is reciprocal. That is, each class's member functions
    14·1 answer
  • In an email, above subject, what does cc mean?
    13·1 answer
  • To copy and paste from an excel workbook to a word document, you must first
    6·1 answer
  • An ellipse (three dots) following a menu item indicates that
    7·2 answers
  • Write a program and flowchart. The program should ask the user for the average temperature in each of the last 12 months. After
    14·1 answer
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • These are horizontal blocks of cells running across the entire width of the spreadsheet.
    11·1 answer
  • 1. Many photographs tell a story. What is the story of this photograph? What is happening? Where is the photograph taken? Why is
    6·1 answer
  • The project team is creating detailed documents to guide the team. What phase of the project life cycle are they in?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!