1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
15

Every noticeable event, transaction, interaction, request and reply, and so on are being expectantly captured and saved in stora

ge appliances and arrays for real-time as well as posterior investigations create something we call it ______________.
Computers and Technology
1 answer:
Debora [2.8K]3 years ago
7 0

Answer:

Every noticeable event, transaction, interaction, request and reply, and so on are being expectantly captured and saved in storage appliances and arrays for real-time as well as posterior investigations create something we call it <u>Big Data.</u>

<u></u>

Another way to look at is that it comprises massive amounts of data that keeps on growing exponentially over time so much so that it cannot be processed or analyzed using usual data processing techniques.

Cheers!

You might be interested in
When you open a program, the hard drive___
Papessa [141]

Answer:

When you open a program, the hard drive <u>Registers the program and runs the program accordingly. </u>

I hope this helped!

3 0
3 years ago
A computer understand..............codes.<br>​
KiRa [710]

Answer:Computers only understand machine code - they do not understand high-level language code. Any high-level programming language code has to be converted to executable code. Executable code is also known as machine code which is a combination of binary code 0s and 1s.

Explanation:

6 0
3 years ago
Which version of Windows was considered an operating environment rather than an operating system?
maksim [4K]
The answer is A. Windows 1.O
4 0
4 years ago
What source ip address does a router use by default when the traceroute command is issued?
maw [93]

When sending an echo request message, a router will use the IP address of the exit interface as the source IP address.

<h3>What is traceroute IP address?</h3>

Traceroute, also called tracepath or tracert, is a network tool used to determine the “path” packets take from one IP address to another.

It provides the hostname, IP address, and the response time to a ping. Enter the IP address that you want to lookup.

Traceroute ensures each hop on the way to a destination device drops a packet and sends back an ICMP error message.

This means traceroute can measure the duration of time between when the data is sent and when the ICMP message is received back for each hop—giving you the RTT value for each hop.

To learn more about IP address, refer

https://brainly.ph/question/4632300

#SPJ4

4 0
2 years ago
A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a
kap26 [50]

Answer:

A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a unique username and password before being able to associate with the wireless access points. Which of the following wireless features would be the MOST appropriate to achieve this objective?

Option A is the correct answer -  WPA2 PSK.

Explanation:

Data is the most essential asset for obtaining knowledge and information. Therefore, it has to be protected from various threats. However, the wireless network provides the option of sharing data without wires, but it is flying in the air. Thus, to secure it, we need to secure it with the right tools.

Option A: WI-FI Protected Access Pre-shared-Key (WPA2 PSK) is the best protection tool because it has 2 modes-PSK and Enterprise mode.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a Python function merge_dict that takes two dictionaries(d1, d2) as parameters, and returns a modified dictionary(d1) cons
    5·1 answer
  • For all those among our fans and SpongeBob fans which is better SpongeBob or amount us
    11·2 answers
  • Help PLEASE (in attachment)
    8·1 answer
  • You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
    5·1 answer
  • When using color in a computer - generated presentation aids you should use?
    7·1 answer
  • Which of the following sentences use personification 
    9·1 answer
  • EASY What does the Backspace key do?
    6·1 answer
  • Each drop-down menu.
    8·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!