1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
6

When creating an overview visualization of a large dataset, it is most important to:

Computers and Technology
1 answer:
Lemur [1.5K]3 years ago
7 0

Answer:

a) Display only an important subset of the datapoints so as to not overwhelm the user.

It's important to show only the information that the user needs or requested. The user won't care about other data displayed on the screen that doesn't have anything to do with the information requested.

Displaying more information or extra details that are not needed would only confuse the user and also slow the process. For example, imagine having this data:

  • id_employee
  • name
  • middle_name
  • address
  • birth_date
  • gender
  • role

Some datapoints from the list above could be omitted, depending on which information the user needs to consult. By doing an overview visualization, maybe the user would only like to see the employee's name, role and id.

You might be interested in
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
DerKrebs [107]

Answer:

A) False

Explanation:

Extranet

An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.

Intranet

Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.

The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.

This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.

4 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
3 years ago
An effective technology for e-training and e-learning is __________, which uses computer graphic displays that the user can adju
ruslelena [56]

Answer:d)Visual interactive simulation (VIS)

Explanation:Visual interactive simulation (VIS) is the technology that works in a system for its development and simulation application for making the system display dynamic.

The dynamic display is preferred because it creates the interest in clients and is also used for the e-learning purpose. It also helps in decision making in accordance with competitive process.

LOT, Flash and WebEx does not provide the  service for the e-teaching services with the dynamic display feature.Thus , the correct answer is option(d).

4 0
3 years ago
25 POINTS!!!!!!!!!!!!!
Paladinen [302]
A leaking data exhaust
7 0
2 years ago
Read 2 more answers
How often should administrators and network users be required to change their password?
Sergeu [11.5K]
Once every 3 month's
8 0
3 years ago
Other questions:
  • A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
    5·1 answer
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • Given the strings s1 and s2 that are of the same length, create a new string consisting of the last character of s1 followed by
    10·1 answer
  • ​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
    13·1 answer
  • Explain why the control bus is not a bus.
    7·1 answer
  • Where on the internet can you find a site that will allow you to tour bill gates mansion
    8·2 answers
  • Answer this question for points lol
    7·2 answers
  • What should you do if your computer is running slower
    12·1 answer
  • (Comparable interface) Write Rectangle class that implements the Comparable interface. Override the equals method so that two Re
    12·1 answer
  • Explain different users of computer in briefly?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!