1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
15

What effect is this most likely to have in readers

Computers and Technology
1 answer:
marysya [2.9K]3 years ago
6 0

Answer: B. For sure 100 %

Explanation:

<u><em>I f a doctor recommends a material and others also have a high rate on it and you also like it then why not buy it correct?</em></u>

You might be interested in
7. How many tables should a relational database contain?
Leona [35]

Im not sure but i think its C at least two but once again im not sure hope this helps :)

7 0
3 years ago
How long do deleted items remain in the recycle bin? forever one week until it is emptied until you log off or shut down?
GarryVolchara [31]
C. Until it is emptied is the answer to your question!
7 0
4 years ago
Read 2 more answers
The big data v that defines the fact users expect their data to be accurate and trustworthy is?
dedylja [7]

Veracity is the big data term that describes the reality that people want their data to be reliable and accurate.

<h3>What is big data?</h3>
  • Big data refers to data collections that are too large or complex for software used for traditional data processing to manage. Despite having greater statistical power, data with more fields may also have a higher probability of false discovery than data with fewer fields.
  • Big data is characterized as data that is more diverse, arrives more quickly, and comes in bigger amounts.
  • Another term for this is the three Vs. Big data is just a word for larger, more complicated data collections, particularly from new data sources.
  • One example of the numerous sources of big data is transaction processing systems, customer databases, documents, emails, medical records, internet clickstream logs, mobile apps, and social networks.

To learn more about big data, refer to:

brainly.com/question/19049345

#SPJ4

5 0
2 years ago
What are some of the opportunities that the stem program offers?
Vlada [557]

Science, technology, engineering, and mathematics (STEM) programs open the door to many different careers, including opportunities in engineering, science, and research. STEM professionals can explore diverse fields like aeronautics and biochemistry. Some STEM students also apply their technical knowledge in law, politics, and education.

Information obtained via: https://www.bestcolleges.com/careers/stem/

7 0
3 years ago
Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
Aleksandr [31]

Answer:

Data Masking

Explanation:

Data masking, also known as data obfuscation, is a process companies use to hide data. The main reason for applying masking to a data field is to protect data that is classified as personally identifiable information, sensitive personal data, or commercially sensitive data. Imagine a scenario where your organization is working with a contractor to build a database. Masking your data allows the contractor to test the database environment without having access to actual sensitive customer information.

5 0
4 years ago
Other questions:
  • Write a detailed three page report that summarizes how data scientists are utilizing data mining to predict future trends and be
    11·1 answer
  • QUESTION: Which is not an example of a video port or cable?
    10·1 answer
  • .____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
    10·1 answer
  • What is top down design? a. Top down design is a way of designing your program by starting with the biggest problem and breaking
    7·1 answer
  • The spoken version of your company's purpose is called
    14·1 answer
  • Network administrators use _______ technology to get antivirus updates to be automatically downloaded on employees' workstations
    15·1 answer
  • Localize the software problem and describe it<br>​
    14·1 answer
  • To use the shortcut for inserting a row,_____
    8·1 answer
  • A computer has __________processing device
    13·1 answer
  • What are the main approaches for dealing with deadlock?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!