1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
13

Different methods of developing useful information from large data bases are dealt with under

Computers and Technology
1 answer:
oee [108]3 years ago
4 0

Answer:

The answer to this question is option "d".

Explanation:

In this question, the answer is data mining. Because Data mining is a technique that finds a piece of new information in a lot of the data. In the data mining collecting information from data is hopefully both new and useful. Data mining help us to discover new patterns and relationship in data to help make better decisions. It is used everywhere like Television and radio, Banking, Retail, and business. That's why data mining is useful.

You might be interested in
What are informational sessions?
arsen [322]

Answer:B

Explanation:

7 0
3 years ago
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
In a C++ program, two slash marks ( // ) indicate:
Ganezh [65]

Answer:

The option(B) is the correct answer .

Explanation:

In C++  the // (two slash marks ) indicating the beginning of a comment .The two slash marks ( // ) comment the single line in a program.To use two slash marks ( // ) comment we simply write  // in which line we have to make comment.

following are the example of code in c++

#include<iostream.h> // header file

void main() // main method

{

cout<< " india"; // print india

}

here // indicating the beginning of a comment .

5 0
2 years ago
Is the number of hits to a website in a daynumber of hits to a website in a day a discrete random​ variable, a continuous random
marissa [1.9K]

Answer:

The correct answer to the following question will be "It is a discrete random variable".

Explanation:

A variable that assumes algebraic expressions defined by a randomized occurrence result, is a Random variable.

  • There are several potential or possible values for a single randomized variable.
  • A discrete random variable's chances for each value is between 0 (zero) and 1 (One), as well as the total amount among all possible outcomes, is equitable to 1.

So, a Discrete random variable is the right answer.

3 0
3 years ago
Read 2 more answers
An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to c
kolezko [41]

Answer:

The answer is "Option D".

Explanation:

A system or a group of components that communicate with your environment through the sharing of resources, materials, and knowledge with a view to system regeneration and development is known as an Open system. In other words, we can say that it is a system that includes a non-proprietary hardware and advert-based software which enables third parties to add or interact with products to plug in the system and It is freely available on the internet. In this question, the incorrect options can be described as follows:

  • In option A, The management system is used by an organization. It is a paid system that's why it is not correct.
  • In option B, This system enables users in online communities and evaluates one another that's why it is not correct.
  • In option C, This type of system provides resources for upgrade user knowledge. It is a paid system that's why it is not correct.  

6 0
3 years ago
Other questions:
  • After several incidents in __________ the company’s computer systems were not ready to support new products, the CEO established
    12·1 answer
  • Noticing his reduced performance at work, Dan enrolled himself for training sessions offered by the company and saw his producti
    13·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • So I’m doing a PowerPoint of how social media changed my life any ideas what I should right down and what kind of topics should
    11·2 answers
  • Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
    9·1 answer
  • Any looping construct can be nested inside another loop is known as
    11·1 answer
  • What is the output of the following JavaScript code?
    9·1 answer
  • Which best explains a password attached to a document?
    6·2 answers
  • ISO 400 is twice as sensitive and ISO 100 true or false
    7·1 answer
  • To what extent do you agree with the assertion that “Collection development begins with community analysis”. (Give reasons to bu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!