1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
15

The velocity dimension of Big Data refers to _____.

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
6 0

Answer:

The answer is "Option B".

Explanation:

The information is also known as an organized and unorganized data, it record data in file or fixed field file. In this process, the data is not organized by a predetermined data model, and some other choices, that could be explained as follows were wrong:

  • Option A and Option C are wrong because it can't collect, and process the data.
  • In option D, It can't provide diversity, that's why it is wrong.
  • In option E, It doesn't depend upon the speed, that's why it is wrong.
You might be interested in
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
What does a proxy server do?
Otrada [13]

I believe your answer would be C, but that also falls under a VPN.


8 0
3 years ago
Read 2 more answers
Razer blade 15 1070 max q 144 hz ( 2018 ) vs Alienware m15 r2 luna white 1660ti 144 hz
kicyunya [14]

Answer:

I believe razor blade 15 1070

Explanation:

Because it seems more sleak

3 0
3 years ago
Define the following terms: data model, database schema, database state, internal schema, conceptual schema, external schema, da
PolarNik [594]

Answer:

Following are the solution to the given terms:

Explanation:

Data Model: A set of concepts that are ideal for describing the layout, computational tools, relations, semantics, constraints on accuracy.

Database Scheme: It is also known as the overall design of the database.

Database State: It is the data in the database at a particular moment in time.

Internal Schema: The physical structure of the database is defined.

Conceptual Schema: It hides the details of physical storage.

External Schema: It describes the part of the database the user group sees. In other words, we can say that it is a view of the database.

Data Independence: The ability to modify the schema at a single level while modifying the schema at a higher level is often recognized.

DDL: It stands for the Data Definition Language, which is used by DBA and dev use for creating With particular scheme.  

DML: It refers to the Data Manipulation Language, which is used to manipulate, add, recover, insert, remove, and alter data.  

SDL: It stands for the storage definition language, in which the internal schema of the database is applied for storage description.  

VDL: The view definition language specifies the user to view and mapping their conceptual schema.

Query Language: It is just an independent, dynamic, high-level dialect used during manipulation.  

Host Language: It is also the machine language, that would be incorporated into the general programming language by low-level data handling commands.  

Data sublanguage: It uses for embedding in the last language.  

Database Utility: It is a program, which helps to handle the database with DBA's modules.  

Catalog: The entire structure and constraints of the database is defined.

client/server architecture: The design of the database server system that device usability: model user, model server (landless storage) software Government computer design in which many users (remote processors) demand a central server to receive service (host computer).  

Three-tier architecture: It is the application, data, user interface.

n-tier architecture: multiple levels. The nth level must only be able to handle the n+1 application and transmit it to the n-1 point.

3 0
3 years ago
What are two composite numbers that both have 8 as a factor?
Vinvika [58]
A composite number is a number that can be divided by a number other than one and itself.
Composite numbers with 8 as a factor:
16, 24, 32, 40, 48.
Choose two of the numbers.
6 0
3 years ago
Other questions:
  • Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
    9·2 answers
  • What is data security
    14·1 answer
  • Anyone who uses Edmentum Plato homeschool can anyone please help me my biology is not loading and it says flash is not available
    7·2 answers
  • When possible, you should avoid using _________ variables in a program?
    11·1 answer
  • Which tool is used to view stars in galaxies far from the Milky Way?
    10·1 answer
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • Edhesive intro to cs term 2 8.9 practice
    13·2 answers
  • If you were programming a robot to respond to touch, the path might look something like this:
    13·2 answers
  • You have been supporting CSM Tech Publishing's Windows Server 2016 server network for over a year. The office has two Windows Se
    12·1 answer
  • Write a program that demonstrates how various exceptions are caught with catch(Exception exception). This time define classes Ex
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!