1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
13

Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It

is a core component of the _____ platform, which also includes cloud computing, ____ devices, and social networking. The five Vs of big data are high volume, high ____, diversified variety, unknown veracity, and low-____ value. Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as ____ has become popular. These tools work well when databases scale _____ (horizontally) and when databases are broken into subsets called ____. Modern database tools also handle ____ scaling as devices are added when additional capacity is required. NoSQL tools are sometimes said to create ____databases, but they usually have some type of structure, though it may be more flexible than the relational model. A key- ____ data model provides each data element with a key. A(n) ____-oriented data model makes it easy to access data stored in similar fields, rather than in individual records. Two very popular NoSQL tools include _____, which is a big data file system, and ____, which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.
Computers and Technology
1 answer:
Helga [31]3 years ago
4 0

Answer:

3rd;mobile;velocity;NoSQL;out;shards;dynamic;schema-less;value;column;Hadoop;MapReduce.

Explanation:

Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It is a core component of the 3rd platform, which also includes cloud computing, mobile devices, and social networking. The five Vs of big data are high volume, high velocity, diversified variety, unknown veracity, and low-density value. Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as NoSQL has become popular. These tools work well when databases scale out (horizontally) and when databases are broken into subsets called shards. Modern database tools also handle dynamic scaling as devices are added when additional capacity is required. NoSQL tools are sometimes said to create schema-less databases, but they usually have some type of structure, though it may be more flexible than the relational model. A key-value data model provides each data element with a key. A column-oriented data model makes it easy to access data stored in similar fields, rather than in individual records. Two very popular NoSQL tools include Hadoop, which is a big data file system, and MapReduce which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.

You might be interested in
What is a text designed for editing and authoring code is<br> A code editor <br> B
Otrada [13]
The text designed for editing and authoring code is source code editor.
A Source code editor is a text program designed specifically for editing source code of computer program by programmers. It may be a standalone application or it may be built into an (IDE) integrated development environment or web browser. source code editors are most  fundamental programming tools as the fundamental job of programmers is to write and edit source code.
6 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
amm1812

Answer:

Option (A) is the right answer.

Explanation:

According to the scenario, the user system is giving the error of invalid certificate while other users on the same network do not report any error, which means that there is some problem in a particular system.

Date and time can also be one of the main cause of this error because wrong date and time creates problem in surfing many websites by giving certificate error.

Hence the most appropriate answer is option (A).

While other option are wrong because of the following reasons:

  • UEFI boot mode is mainly used in booting the operating system and has no connection with network.
  • Logon time is also wrong because if the problem is with the login server, it can not give certificate error.
  • User access control is also not correct because it is used to control the access of the user.
7 0
3 years ago
Which task might be suitable for moving into a separate function so you can re-use it from multiple places in your code?
Fudgin [204]

Answer:

The answer is "All of these could make good functions ".

Explanation:

In the given question some information is missing, that is options which can be described as follows:

a. Ask the user to confirm an input with a yes/no answer

b. Sort some input data into an ordered list

c. All of these could make good functions

d. Calculate a complex mathematical expression

A method is a collection of ordered code and provides a generic code, that is used to execute a single, connected operation.

  • A good function is a function, which takes values from the user and it will sort all the data and store in memory, and whenever we call the function, it will give the values.
  • It is also used to calculate some complex values,
8 0
3 years ago
Decrypt this secret message if your able to a lot will come..
nata0808 [166]

Answer:-

Failure

and 0008

Hope This Helps

7 0
3 years ago
Read 2 more answers
Other questions:
  • Mark had been a resident of Larchmont for 17 years, and local folks thought of him as a solid citizen. "In this sentence, the wo
    7·2 answers
  • In doing a load of clothes, a clothes drier uses 18 A of current at 240 V for 59 min. A personal computer, in contrast, uses 3.0
    7·1 answer
  • Ryan has created a Word document to be used as a review quiz for students in a classroom setting. The document contains both que
    6·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
    7·1 answer
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Compare the two items in a summary of qualifications taken from a resumé. Which is better?
    9·1 answer
  • SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SU
    6·2 answers
  • question 5 you need to find the internet protocol (ip) address for a website. which command do you use on a windows system?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!