1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
4 years ago
9

What does it mean by MYRIAD of data?

Computers and Technology
1 answer:
pentagon [3]4 years ago
5 0

Answer:

The term Myriad means an indefinitely large number of things. And when we say Myriad of data, we mean an indefinitely large amount of data like in Petabytes.

Explanation:

What it does implies is that you are dealing with a large amount of data. And hence we are dealing with something like bigData. And hence, technologies related to BigData are going to operate. And this term is used as a noun as well as an adjective when we talk about English. And hence, you can use it with "a" or without the "a" as well. It has been a part of reputable English and has been repeatedly used by top authors like Milton.

You might be interested in
The residual volume can be measured directly with: Select an answer and submit. For keyboard navigation, use the up/down arrow k
TEA [102]

The residual volume can not be measured directly.

<h3>How is residual volume measured?</h3>

Residual volume is known to be measured by what we call a gas dilution test.

Note that this test often  measures how the concentration of the gases in the container changes.

<h3>What is residual volume?</h3>

This is known to be the Volume of air that is left over after a FORCED EXPIRATION. Note that it is one that cannot be measured by a spirometer.

Hence, The residual volume can not be measured directly.

Learn more about residual volume from

brainly.com/question/12897209

#SPJ1

6 0
2 years ago
github Portfolio Balances An investor opens a new account and wants to invest in a number of assets. Each asset begins with a ba
OLEGan [10]

The following code will be used to determine the maximum amount invested

<u>Explanation:</u>

long maxValue(int n, int rounds_rows, int rounds_columns, int into rounds)

{

   // Define the variable to store

   // the maximum amount invested.

   long max = 0;

   

   // Define an array of size n,

   // to store the n investments.

   long *investments = (long*)malloc(sizeof(long)*n);

   int i=0;  

   // Initially set all

   // the investments to 0.

   for(i=0;i<n;i++)

   {

       investments[i] = 0;

   }

   i=0;

   // Run the loop to

   // perform the rounds.

   while(i<rounds_rows)

   {

       // Get the left value

       // of the current round.

       int left = rounds[i][0];

       

       // Get the right value

       // of the current round.

       int right = rounds[i][1];

       // Get the contribution

       // for the current round.

       int contribution = rounds[i][2];

       // Since the user uses 1-based

       // indexing, subtract 1 from left

       // and right as the program uses

       // 0-based indexing. That is, the

       // investments in the array start

       // from 0 and not 1.

       right = right - 1;

       int j=0;

       // Run the loop to add the

       // contribution to all the investments

       // between left and right, both inclusive.

       for(j=left; j<=right; j++)

       {

           investments[j] += contribution;

       }

       i++;

   }

   // Traverse the investments array

   // to find the maximum element.

   max = investments[0];

   for(i=1; i<n;i++)

   {

       if(investments[i]>max)

       {

           max = investments[i];

       }

   }

   // Return the

   // maximum investment.

   return max;  

}

6 0
4 years ago
Regarding Group Policy in Windows Server 2008 and Windows Vista, Microsoft used the token-based administrative template (ADM) fi
melamori03 [73]

Answer:

ADMX files which is in XML file format.

Explanation:

Regarding Group Policy in Windows Server 2008 and Windows Vista, Microsoft used the token-based Administrative Template (ADM) files. Microsoft replaced ADM files with ADMX files (XML-based file format), and it is used in Windows Server 2012 and Windows Server 2012 R2.

ADMX files are registry-based policy settings used for defining the display of the Administrative Template (ADM) policy settings in the GPO Editor in an XML-based structure.

5 0
3 years ago
You want to compare the goal blocking percentages of all goalies in the National Hockey League. Which type of chart would be bes
galina1969 [7]

Answer:

Bar Graph

Explanation:

Bar graph is used to capture data but is also able to store more data

6 0
3 years ago
Which occupation is expected to increase according to the segment? Plz help me with question 5
pantera1 [17]
In the Declaration of Independence it states, "To secure these rights, governments are instituted among men deriving their just power from the consent of the governed. Whenever any form of government becomes destructive of these ends, it is the right of the people to alter or abolish it."

What Enlightenment idea is reflected in this passage?
6 0
3 years ago
Other questions:
  • A client is concerned that a power outage or disaster could impair the computer hardware's ability to function as designed. The
    13·1 answer
  • How to create a delete button in Python?
    15·1 answer
  • Write a python program that contains a main function and a custom, void function named show_larger that takes two random integer
    15·1 answer
  • Pick the JavaScript code for the following pseudocode. If age &gt;= 65 Then discountRate = 0.10 End If Group of answer choices
    12·1 answer
  • Should students be able to use their phones during class
    14·1 answer
  • Which is the biggest known issue specific to satellite Internet connections?
    13·2 answers
  • During which phase of film making does the team outline their vision for the film?
    5·1 answer
  • The engine that runs the computer. Small computers have one, while larger computers may
    15·1 answer
  • PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the
    13·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!