1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
14

What are the three common forms for mining structured and unstructured data?

Computers and Technology
1 answer:
diamong [38]3 years ago
3 0
I would like to help you, but can you be more specific please?
You might be interested in
Database management systems _____. a. include transaction-processing reports for database analysis b. are used to create, organi
GaryK [48]

Answer:B. Are used to create, organize, and manage databases

Explanation: Database management system (DBMS) is a computer software which is used to collect, analyse or evaluate and retrieve data from a database. It is essential to the flow of businesses or other activities of an organisation.

Examples of database management system softwares MICROSOFT ACCESS,FOXPRO,ORACLE etc all this are effective as it helps to manipulate the data structure,field names,the file formats etc.

3 0
3 years ago
A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and
Musya8 [376]

Answer: (B) Lossless compression

Explanation:

 According to the question, the given technique is the example of the lossless compression. The lossless compression is one of the technique that decompress the data into the original data form without any type of losses.

The lossless compression is the technique that usually compress the data, text and the databases. This technique also improve the compression rate helps in reconstruct the original data. It is used in various types of encoding methods, GNU tool and zip file.

3 0
3 years ago
1.Write a Java program to solve the following problem using modularity. Write a method that rotates a one-dimensional array with
Westkost [7]

Answer:

Explanation:

The following code is written in Java and it asks the user for the size of the array. Then it randomly populates the array and prints it. Next, it rotates all the elements to the right by 1 and prints the new rotated array.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Random r = new Random();

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Size of the Array: ");

       int arraySize = in.nextInt();

       ArrayList<Integer> myList = new ArrayList<>();

       for (int x = 0; x < arraySize; x++) {

           myList.add(r.nextInt(15));

       }

       System.out.println("List Before Rotation : " + Arrays.toString(myList.toArray()));

       for (int i = 0; i < 1; i++) {

           int temp = myList.get(myList.size()-1);

           for (int j = myList.size()-1; j > 0; j--) {

               myList.set(j, myList.get(j - 1));

           }

           myList.set(0, temp);

       }

       System.out.println("List After Rotation :  " + Arrays.toString(myList.toArray()));

   }

}

6 0
2 years ago
Given: int[][] values = new int[4][5] Using the statement above, write a nested loop to set values as follows: (3 pts) [0] [1] [
marshall27 [118]

Answer:

The question is a bit unclear. Are you asking how to add these values in this 2D array?

Explanation:

8 0
3 years ago
Get the user to enter some text and print it out in reverse order.
svetlana [45]

Answer:

strrev in c/c++

Explanation:

3 0
2 years ago
Other questions:
  • Extend the flow properties and definitions to the multiple-source, multiple- sink problem. Show that any flow in a multiple-sour
    13·1 answer
  • According to the lecture, when communicating men prefer to concentrate on _____________.
    13·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • I'm gonna get grounded for getting a 52 on my test :(
    13·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • What do people in the movie e.t think about the character E.T
    9·1 answer
  • In additon to setting up services, what other tasks does a sysadmin have to keep in mind? check all that apply.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!