1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
11

A predictive data analyst ___

Computers and Technology
1 answer:
Arte-miy333 [17]3 years ago
7 0

the answer is B because predictice means to infer


You might be interested in
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
True or False: It is illegal to park in a location that you block or create a hazard for other vehicles.
Feliz [49]
The answer to question is true
5 0
3 years ago
Read 2 more answers
What are the inputs that the model uses to make decisions?
hodyreva [135]

Answer:

It makes the decision better and adds ownership in the implementation

Explanation:

Hope this helps C:

~Chiena

8 0
2 years ago
Anna discovers malware on her computer. After being downloaded, the malware self-activated and replicated itself and infected th
Tresset [83]

Answer:

A.

Explanation:

The malware that replicates itself and can infect the entire system is a worm.

A worm is a type of malware that gets self-activated and replicated. This worm spreads rapidly over the computer system and can corrupt all the files and the entire system.

A worm is a standalone application and does not require action from humans.

Therefore, option A is correct.

6 0
2 years ago
Which word did alexander graham bell want adopted as a telephone greeting instead of hello.
Alik [6]

Answer:

I believe it was Ahoy.

Explanation:

I could be wrong though.

7 0
2 years ago
Read 2 more answers
Other questions:
  • A(n) _____ is the highest educational degree available at a community college. master bachelor associate specialist
    13·2 answers
  • Disconnecting or making the equipment safe involves the removal of all energy sources and is known as _____________. A) Isolatio
    8·2 answers
  • A video streaming website uses 32 bit integers to count the number of times each video is played. In anticipation of some videos
    14·2 answers
  • PLEASE HELP ITS DRIVERS ED
    8·2 answers
  • Which of the following is NOT a Boolean Search term used to refine search engine results? A. AND B. With C. OR D. NOT
    14·2 answers
  • What port in your computer will you use to plug in your camera?
    14·2 answers
  • 6. What is the difference between portrait and landscape orientation? What are the advantages of
    9·1 answer
  • Benching system are prohibited in
    5·1 answer
  • (main.c File)
    7·1 answer
  • what field in the ipv4 datagram header can be used to ensure that a packet is forwarded through no more than N headers
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!