1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
3 years ago
13

________ is a process in which computer software that uses statistical analysis, database technology, and artificial intelligenc

e finds hidden patterns, trends, and connections in data so that business owners can make better marketing decisions and predictions about customer's behavior.
Computers and Technology
1 answer:
QveST [7]3 years ago
6 0

Answer:

Data Mining.

Explanation:

Data Mining is the process in which a computer software uses database technology,artificial intelligence and statistical analysis so that it can find the hidden patterns,connections and trends in the data.To help business owners to make better marketing decisions and predictions about the customer's behavior.

You might be interested in
What type of USB connector is always plugged into the computer to connect in external device
barxatty [35]
HDMI? I am not entirely sure
4 0
3 years ago
Suppose that the splits at every level of quicksort are in the proportion 1 − α to α where 0 < α ≤ 1/2 is a constant. Show th
Lady_Fox [76]

Answer:

Explanation:

The minimum depth occurs for the path that always takes the smaller portion of the

split, i.e., the nodes that takes α proportion of work from the parent node. The first

node in the path(after the root) gets α proportion of the work(the size of data

processed by this node is αn), the second one get (2)

so on. The recursion bottoms

out when the size of data becomes 1. Assume the recursion ends at level h, we have

(ℎ) = 1

h = log 1/ = lg(1/)/ lg = − lg / lg

Maximum depth m is similar with minimum depth

(1 − )() = 1

m = log1− 1/ = lg(1/)/ lg(1 − ) = − lg / lg(1 − )

4 0
3 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
2 years ago
The events that happen in a story are called the _________________.
RUDIKE [14]

Answer: B) plot

Explanation:

4 0
2 years ago
Read 2 more answers
Rachel wants to make sure that she uses effective communication skills at work. Which of the following is an example of somethin
BartSMP [9]

dont use slang or words like lol

5 0
3 years ago
Read 2 more answers
Other questions:
  • How do social media sites illustrate kindness?
    15·1 answer
  • Create an integer variable named ‘listSize’ and initialize the value to 1000.
    5·1 answer
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate busines
    12·1 answer
  • Identify the following as True or False.
    14·1 answer
  • Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
    7·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    11·1 answer
  • Sistem komponen mekanikal yang terdapat pada sebuah basikal?​
    13·1 answer
  • In reference to operating systems, what is spooling? what does it stand for? chegg
    11·1 answer
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!