1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
13

Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It

is a core component of the _____ platform, which also includes cloud computing, ____ devices, and social networking. The five Vs of big data are high volume, high ____, diversified variety, unknown veracity, and low-____ value. Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as ____ has become popular. These tools work well when databases scale _____ (horizontally) and when databases are broken into subsets called ____. Modern database tools also handle ____ scaling as devices are added when additional capacity is required. NoSQL tools are sometimes said to create ____databases, but they usually have some type of structure, though it may be more flexible than the relational model. A key- ____ data model provides each data element with a key. A(n) ____-oriented data model makes it easy to access data stored in similar fields, rather than in individual records. Two very popular NoSQL tools include _____, which is a big data file system, and ____, which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.
Computers and Technology
1 answer:
Helga [31]3 years ago
4 0

Answer:

3rd;mobile;velocity;NoSQL;out;shards;dynamic;schema-less;value;column;Hadoop;MapReduce.

Explanation:

Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It is a core component of the 3rd platform, which also includes cloud computing, mobile devices, and social networking. The five Vs of big data are high volume, high velocity, diversified variety, unknown veracity, and low-density value. Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as NoSQL has become popular. These tools work well when databases scale out (horizontally) and when databases are broken into subsets called shards. Modern database tools also handle dynamic scaling as devices are added when additional capacity is required. NoSQL tools are sometimes said to create schema-less databases, but they usually have some type of structure, though it may be more flexible than the relational model. A key-value data model provides each data element with a key. A column-oriented data model makes it easy to access data stored in similar fields, rather than in individual records. Two very popular NoSQL tools include Hadoop, which is a big data file system, and MapReduce which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.

You might be interested in
How many free passes do you get for skipping videos and getting answers
blondinia [14]

Answer:

I think it is 1 because that is all that works for me

3 0
1 year ago
What electronic appliances at your home / school can be controlled remotely? Name any 4
Paladinen [302]

Answer:

Hi how are you doing today Jasmine

8 0
2 years ago
How do u answer questions on brainly if ur on the app and on a phone. For me there is no answer button :(
Rudik [331]

Answer:

oh for me there is maybe try reloading?

Explanation:

8 0
3 years ago
A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disab
VladimirAG [237]

Answer:

He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.

Explanation:

  • UPnP stands for Universal Plug n Play.
  • It is an easiest way that allows gadgets to find all other devices connecting to your network.
  • This can also modify router settings to allow devices from outside the network to access the router.
  • External IP address can also be obtained by the gadget and a new port forwarding map can be set
  • So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
  • UPnP is a vulnerability to the secure system
6 0
3 years ago
Which best describes a computer bug?
yanalaym [24]

Answer:

a piece of computer software containing defects that prevent a program from running properly

Explanation:

i got a 100% on the test

6 0
3 years ago
Other questions:
  • A(n) ____ backup only archives the files that have been modified since the last backup.
    11·1 answer
  • The eastern front was longer than other fronts of the war true or false
    7·2 answers
  • Which of the following describes the function of a web browser?
    11·1 answer
  • Explain in three to four sentences what happens to data packets once they leave a node.
    11·2 answers
  • If you give an actual answer I'll give brainliest​
    13·2 answers
  • Flash drive DVD and hard drive are all examples of
    6·2 answers
  • What means the data is still saved even if you turn the computer off or unplug it?​
    5·1 answer
  • How do I go to files in Brainly I need help
    13·1 answer
  • Word can only print documents on one size of paper.<br><br> True or false
    15·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!