1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
2 years ago
14

What are the three common forms for mining structured and unstructured data?

Computers and Technology
1 answer:
diamong [38]2 years ago
3 0
I would like to help you, but can you be more specific please?
You might be interested in
Write a pyhton program to calculate area of a circle?
marta [7]

Answer:

The code to calculate the area of a circle is:

from math import pi

def circleArea(radius):

 if radius > 0:

   return pi * (radius ** 2)

 else:

   return None

if __name__ == '__main__':

 radius = 5

 print("Radius: {} Area: {}".format(radius,circleArea(radius)))

Explanation:

A detailed explanation of each line of code is given below.

#Define the number pi used to calculate the area

from math import pi

#We define a function that calculates the area of a circle

def circleArea(radius):

#Check if the radius is valid ( radius > 0) since there aren´t negative radius

 if radius > 0:

#Compute the area formula for a circle \pi * radius^{2}

   return pi * (radius ** 2)

 else:

#Return None if the radius is invalid

   return None

#Run the function we´ve defined

if __name__ == '__main__':

#Define a radius

 radius = 5

#Call the function and parse the radius through it, then print the result

 print("Radius: {} Area: {}".format(radius,circleArea(radius)))

8 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Can you help me with this?
kramer

Answer:lol :)

Explanation:

Yes, the special order is 6 5 and 7 and it is/

3 0
3 years ago
Which two of the following are analog signals? A) whether a place of business is open or closed B) the volume of the radio C) th
ella [17]

Answer: B) The volume of the radio and D) the outdoor temperature.

Explanation:

The analog signal is the signal that continuously varying with the time and it continuous analog signal. Analog signal is basically used to carry information or data from one device to another device.

The volume of the radio is the example of the analog signal as it carry voice from one place to another. The analog signal  is the type of signal that use to measure the particular change in the physical phenomena like pressure, sound and temperature in the environment. So, outdoor temperature is also the example of analog signal.

And the other options (A) and (C) are incorrect because it is represent any physical change in the environment.  

8 0
3 years ago
Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, yo
kupik [55]

Answer:

The correct option for accessing the value in sarray[3] is : d) *(sptr+3)

Explanation:

a) *sptr[*3]  is wrong option because its syntax is not right it will give errors.

b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].

c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.

d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer

4 0
2 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • Select all ways that databases may help you manage and manipulate data and records.
    11·1 answer
  • Name one app that currently has a positive impact on society and explain why you think it has had a positive effect.
    10·1 answer
  • HELP ME ASAP PLS BEING TIMED
    8·2 answers
  • One way to prepare for filing the PROFILE is to:
    12·2 answers
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • What is a difference between a waxing crescent and a waning gibbous? (1 point) waxing crescent: first quarter waning gibbous: th
    11·1 answer
  • I need help with yes lol please and thank you
    15·2 answers
  • With SQL, how do you select all the columns from a table named "Persons"?
    8·1 answer
  • Using C, Write a program that reads a series of strings from standard input and prints only those strings beginning with the let
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!