1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
5

What is a data mining??

Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
3 0
Data mining is the process in which large values of raw data are interpreted to extract something useful out of it. With the help of software, finding pattern using these large data is the main point.


Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
You might be interested in
If you flash UEFI and now your computer is no longer working, is there anything you can do to correct the situation?
Annette [7]

<u>Solution and Explanation:</u>

Unified Extensible Firmware Interface (UEFI) is a software program which connects the computer's firmware to its operating system (OS). UEFI is installed by the manufacturer and the first program to be executed when the computer is not turning on. UEFI or BIOS can be corrupted because of the upgrade error or any other damage.

Launch an automatic BIOS/UEFI recovery of the system so that the previous working best version of UEFI/BIOS is recovered and made available. On successful recovery of the BIOS/UEFI, the computer starts working.

6 0
3 years ago
Your license can be canceled if you __________
Elena L [17]
Its B i think hope this helps ! 
8 0
3 years ago
Read 2 more answers
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Is science fiction always set in the future
Natali5045456 [20]
Yes and No it all depends on how the author wants the poem how to be and become. Majority of the time science fiction is set for the future.
5 0
3 years ago
¿Cual es la ultima combinacion de celdas en Excel 365?
Furkat [3]
I need points but i don’t know so.
i really need points.
4 0
3 years ago
Other questions:
  • An attribute whose value uniquely identifies an object is called a(n) _______.​
    15·1 answer
  • What is the minimum number of bits you need to encode the 26 letters of the alphabet plus a space?Pace?
    11·1 answer
  • How can you tell if a website is secure
    13·1 answer
  • What would you recommend for data segregation if using cloud software
    12·2 answers
  • The force required to slide an object is equal to _____.
    13·1 answer
  • Write a program in python to test if given number is prime or not.
    6·2 answers
  • Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.
    12·2 answers
  • Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s
    11·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • Which type of information could be displayed using this line graph?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!