1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
13

Different methods of developing useful information from large data bases are dealt with under

Computers and Technology
1 answer:
oee [108]3 years ago
4 0

Answer:

The answer to this question is option "d".

Explanation:

In this question, the answer is data mining. Because Data mining is a technique that finds a piece of new information in a lot of the data. In the data mining collecting information from data is hopefully both new and useful. Data mining help us to discover new patterns and relationship in data to help make better decisions. It is used everywhere like Television and radio, Banking, Retail, and business. That's why data mining is useful.

You might be interested in
What task do the referential integrity settings prevent?
Cerrena [4.2K]

Answer:

D

Explanation:

5 0
3 years ago
Read 2 more answers
Give reasons why mind-mapping software is important to project development.
Shtirlitz [24]

Answer:

Explanation:Mind mapping software can help you to make connections and become a better creative problem solver.

...

It helps you to make better decisions. ...

It helps you to become better organized. ...

You can see the forest and the trees. ...

It helps you to identify, prioritize and track key project tasks.

7 0
3 years ago
A VALENTINE
-Dominant- [34]

Answer:

i dont see the image

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
Other questions:
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    9·1 answer
  • How can you tell that a website is valid and reliable 10 points
    10·1 answer
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • You are having problems on your Windows 7 computer and you pull up Device Manager to see if there are any alerts. Two of your de
    11·1 answer
  • The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
    5·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    10·1 answer
  • quiz Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appear
    7·1 answer
  • You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!