1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
2 years ago
15

Consider the three major Vs as Volume, Velocity and Variety along with other Big Data contexts. Match the terms with the short s

cenarios or frameworks, related to Big Data. A Big Data application that handles very large-sized block of data (64 MB). Variability Big Data, applied to collect data on visitors purchase behavior in a theme park. MapReduce Health systems transmit electronic prescriptions and receive 'no-pickup' messages. Feedback loop processing Sentiment analysis determines if a statement conveys a positive or negative attitude. Volume, Velocity, Variety Programming model to process large data sets in a parallel, distributed manner. Hadoop
Computers and Technology
1 answer:
12345 [234]2 years ago
5 0

Answer:

See explaination

Explanation:

(MapReduce) = Programming Model

(Variability) = Sentiment analysis

(Feedback Loop Processing) = Health Systems transit

(volume, velocity, variety) = Big Data, applied to collect data

(Hadoop) = A Big Data Application that handles very large-sized block of data.

You might be interested in
Potential Energy and Kinetic Energy both mean "energy in motion" True or False​
Irina18 [472]

Answer:

false

Explanation:

pretty sure energy in motion is only for kinetic energy

4 0
3 years ago
Read 2 more answers
What is the name for an object that is what it appears to be?
Gnesinka [82]
That would be a symbol
8 0
2 years ago
It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the perso
Goryan [66]

Answer:

Communication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

8 0
3 years ago
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
9 months ago
You need to configure your Android phone so that you can receive your Yahoo email on the device. What information would you need
Llana [10]

Answer:

To configure an Android phone to receive Yahoo email on the device, you would need to provide the:

full Yahoo email address and password.

Explanation:

The provision of your full Yahoo email address and password enables you to receive your Yahoo emails on the device.  Most often, the device requests to save the information to enable it to notify you of incoming emails.  There are settings for the provision of this notice.  The user can also synchronize Yahoo emails on all the devices by selecting the Sync button.

5 0
2 years ago
Other questions:
  • The ____ function sums the numbers in the specified range and then divides the sum by the number of cells with numeric values in
    14·1 answer
  • What does zooming do? A. Changes your view of the Frame Editor to be closer or farther away B. Changes your view of the Event Ed
    12·1 answer
  • In the beginning of a presentation, it is important to:
    9·1 answer
  • One blog may have a greater social influence than another when it has_______?
    12·2 answers
  • Why can’t I “change the country” on settings??<br> (In this app)
    13·1 answer
  • Visit the quick access toolbar to find help when looking for certain commands. True False
    15·2 answers
  • Select the correct answer.
    5·2 answers
  • A software update is also referred to as what?
    15·2 answers
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
  • These days, a digital signature is just as legitimate and trusted as an old-fashioned John Hancock on paper.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!