1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
15

Data mining is Group of answer choices a specialized type of program that is used in the mining industry creating a database war

ehouse from many smaller databases finding and extracting hidden predictive information from the data in large databases batch processing using files stored in a mainframe computer system
Computers and Technology
1 answer:
yulyashka [42]3 years ago
5 0

Answer:

finding and extracting hidden predictive information from the data in large databases.

You might be interested in
Currently James’s company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. How
icang [17]

Answer:

Terminal Access Controller Access Control System (TACACS+)

Explanation:

Terminal Access Controller Access Control System (TACACS+) can be used as an upgrade to RADIUS (Remote Authentication Dial-in User Service) for AAA (Authentication Authorization Accounting) services to connect wireless users to the Windows Active Directory domain.

TACACS+ is a Cisco-based wireless network that uses Transmission Control Protocol (TCP) and provides separate authentication, authorization and accounting services for users in bigger networks.

TACACS+ uses TCP port 49 while RADIUS uses UDP port 1812 and 1813.

3 0
4 years ago
What are 2 ways to access the vendor credit screen in quickbooks online?
kiruha [24]

Answer:

First by

Clicking

New Button (+) THEN click Vendor THEN click Credit

Secondly

Click Expenses Center then click New Transaction then finally click Vendor Credit

4 0
3 years ago
Which type of evidence should victims collect to help officials catch cyber bullies
iren [92.7K]

Answer:

How you get cyberbullied just look away from the screen -Tyler The Creator

Explanation:

3 0
4 years ago
Read 2 more answers
What are output statement in QBASIC?
Roman55 [17]

Answer:

<h2> hi. here's your answer ....</h2>

<h3>print statement provides output on the screen . it prints the value of the expression on the screen . if the expression list is blank , no character is print . the expression in the list may be numeric or string .</h3><h2>Hope you like it..</h2><h2>(◕ᴗ◕✿)</h2>

5 0
3 years ago
Many people keep time using a 24 hour clock (11 is 11am and 23 is 11pm, 0 is midnight). If it is currently 13 and you set your a
lozanna [386]

Answer:

<em>The program written in Python is as follows;</em>

time_now = int(input("Time: "))

wait_time = int(input("Alarm: "))

time_now = time_now + wait_time%24

if time_now < 12:

     print(str(time_now)+"am")

else:

     time_now = time_now - 12

     print(str(time_now)+"pm")

Explanation:

This line prompts user for current time

time_now = int(input("Time: "))

This line prompts user for the alarm hours

wait_time = int(input("Alarm: "))

This line calculates the time of the alarm

time_now = time_now + wait_time%24

The following if statement determines if the time will be am or pm

If the time is less than 12, then the time will be in am

<em>if time_now < 12: </em>

<em>      print(str(time_now)+"am") </em>

If otherwise,  then the time will be in pm

<em>else: </em>

<em>      time_now = time_now - 12 </em>

<em>      print(str(time_now)+"pm")</em>

<em></em>

6 0
3 years ago
Other questions:
  • what would happen if a large number of computer users are attempting to access a web site at the same time that you are
    15·2 answers
  • How do i protect my computer from electrical spikes
    14·2 answers
  • What kinds of variables are accessible from outside of the class?
    8·1 answer
  • What does the Auto Fill tool do?
    15·2 answers
  • What is the relationship between IaaS and TCP/IP and network services?
    10·2 answers
  • 6) RAM, 5 main memory<br>which storage conbe used<br>as permanent storage<br>Rom<br>a) R<br>)​
    8·2 answers
  • Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the following are typically assigned an IP address in t
    13·1 answer
  • Here is free points im leaving
    11·2 answers
  • Need help with this
    12·1 answer
  • Jimmy wrote the procedure scoreToGrade which accepts as a parameter score - a quiz score in the range 0-100. The procedure is su
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!