Answer:
3rd;mobile;velocity;NoSQL;out;shards;dynamic;schema-less;value;column;Hadoop;MapReduce.
Explanation:
Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It is a core component of the 3rd platform, which also includes cloud computing, mobile devices, and social networking. The five Vs of big data are high volume, high velocity, diversified variety, unknown veracity, and low-density value. Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as NoSQL has become popular. These tools work well when databases scale out (horizontally) and when databases are broken into subsets called shards. Modern database tools also handle dynamic scaling as devices are added when additional capacity is required. NoSQL tools are sometimes said to create schema-less databases, but they usually have some type of structure, though it may be more flexible than the relational model. A key-value data model provides each data element with a key. A column-oriented data model makes it easy to access data stored in similar fields, rather than in individual records. Two very popular NoSQL tools include Hadoop, which is a big data file system, and MapReduce which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.
Answer:
The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.
Explanation:
A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.
An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.
- The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
- In this method, the subnetting separates the IP address between host and network addresses.
- The subnet mask covers an IP address with its 32-bit number, thus the term "mask".
Given:
Network IP address
Subnet numbers
Calculating the borrow bits:

a)
Calculating the dotted decimal value for the subnet mask:

b)
The additional bits which will be needed to mask the subnet mask that is = 4.
Learn more: brainly.com/question/2254014
Answer:
It relates to social relationships and social structures. It involves people knowing each other and having positive relationships based on trust, respect, kindness, ect.
Explanation: