1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
11

A predictive data analyst ___

Computers and Technology
1 answer:
Arte-miy333 [17]3 years ago
7 0

the answer is B because predictice means to infer


You might be interested in
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Suppose a program is operating with execution-time binding and the physical address generated is 6730. The relocation register i
zaharov [31]

Answer:

730

Explanation:

Calculation for What is the corresponding logical address

Using this formula

Corresponding logical address=Physical address generated-Relocation register

Let plug in the formula

Corresponding logical address=6730-6000

Corresponding logical address=730

Therefore the corresponding logical address will be 730

4 0
3 years ago
What type of operation can be performed on a package that hasbeen built and saved for furtheruse?
forsale [732]

Answer: Password protected

Explanation: Package is the namespace which carries the set of all the related classes and related interfaces. Package class has the right to access the package members. If a package is built and is kept for the future use then it should be made secured so there can be no unauthorized access of the class that package contains,therefore it should be password protected. This will help the class and the members to be in security an can be accessed by authority in future.

5 0
3 years ago
Commands are organized into tabs on the A. Ribbon. B. Quick Access toolbar. C. Status bar. D. ruler.
saw5 [17]
Commands are organized into tabs on the A. Ribbon
7 0
3 years ago
Read 2 more answers
Write a function that receives an integer list from STL and returns the sum of even numbers in the list (return zero if no even
Doss [256]

Answer:

int sumeven(int lis[],int n)

{

   int sum_e=0;//integer variable to store the sum.

   for(int i=0;i<n;i++)

       {

           if(lis[i]%2 == 0)//if the number is even adding to sum_e.

           sum_e=sum_e+i;

       }

   return sum_e;//retuning the sum.

   

}

Explanation:

The above written function is in C++.This function find the sum of even numbers in the list provided.It loops over the array and if the number is even adds to the variable sum_e finally return sum_e which having the sum of even numbers now.

8 0
3 years ago
Other questions:
  • Electricity was seen as a mysterious force and began to creat a stir when people called​
    13·1 answer
  • Quick Search lets you refine or narrow your search results using links on the right side of the screen. Do a search on nano-mate
    12·1 answer
  • Convert to binary140
    5·1 answer
  • What command is used to generate an RSA key pair?
    9·1 answer
  • Consider the following code: // Merge mailing list m2 into m1 void merge (MailingList m1, MailingList m2) { for (int i = 0; i &l
    12·1 answer
  • If a user's input string matches a known text message abbreviation, output the unabbreviated form, else output: Unknown. Support
    14·2 answers
  • Writing in Java, write a program that prompts the user to input an integer and then outputs both the individual digits of the nu
    15·1 answer
  • What two benefits are a result of configuring a wireless mesh network? Check all that apply.
    12·1 answer
  • PLEASE HURRY!!<br> Look at the image below
    15·1 answer
  • Which of the following are the most important reasons people in the 1920s were so interested in seeing lifelike stories in audio
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!