1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
3 years ago
7

Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr

ected or deleted through data cleansing.​ T/F
Computers and Technology
1 answer:
sergey [27]3 years ago
4 0

Answer:

True.

Explanation:

The database can contain "bad data".

Bad Data is incorrect,incomplete,irrelevant or inaccurate records and the bad data can only be corrected or by data cleansing.

Data cleansing is deleting the bad data from the database.It is very important technique which is implemented by almost every one dealing with bad data.

Hence we conclude that the answer to this question is True.

You might be interested in
Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.
11111nata11111 [884]

Answer:

The "a" Option is correct.

Explanation:

The "COUNTIF" function counts every cell that, given a condition (value), suits into it. As you want to know the number of cells that contain a value of at least 50, the condition must be properly written to get the correct answer. Unless it is a cell value (e.g. B3), the condition must always be written with quotes (""). So, the options b and c are automatically discarded.

The d option appears to be correct, but it's not. If the condition is written ">50", the function will count every cell with a value above 50. But we're searching values at least (including) 50. So the correct answer is the a option.

7 0
3 years ago
Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
never [62]

Answer:

Consider the given data

There are two host S and R communicating over a TCP connection.

Host R received from S all bytes from 1 through 233.

Host S sends three segments to Host R.

The sizes of the three segments are 50, 70, and 90 bytes.

In the first segment, the source port number is 212 and the destination port number is 80.

a)

For segment 1:

As, Host R received 233 bytes from Host S, the sequence number of the first segment is 234.

The source port number = 212

The destination port number = 80.

For segment 2:

As the first segment size is 50 bytes and the sequence number of the first segment is 234, the sequence number of the second segment will be 50+ 234= 284.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

For segment 3:

As the second segment size is 70 bytes and the sequence number of the second segment is 284, the sequence number of the third segment will be 70+ 284= 354.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

b)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 2, 3.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 3. The sequence number of the segment 3 is 354.

Therefore, the acknowledgement number of the second segment arriving is 354.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

c)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 3, 2.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 2. The sequence number of the segment 2 is 284.

Therefore, the acknowledgement number of the second segment arriving is 284.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

d)

The first segment acknowledge is the sequence number of the second segment that is lost.

The second and third segment acknowledgements arrive after the timeout interval. The timing diagram of these segments along with their sequence number and the number of bytes of data is shown in the below diagram.

Explanation:

See the attached picture for timing diagram.

4 0
4 years ago
What is the purpose of the backoff on Ethernet networks?
stellarik [79]

Answer: Please see below as the answer is self-explanatory.

Explanation:

In the original Ethernet standard, IEEE 802.3, the method used to deliver packets within a Ethernet network, is called CSMA/CD, and the acronym includes all the Ethernet features in brief.

Let's explain the different parts of the acronym.

CSMA= Carrier Sense Multiple Access.

This means that when any computer in the network (with no privileges for nobody) has a packet to transmit, it first "listen"if the network is idle. If it is the found condition, deliver the packet, and wait for an acknowledgement.

If past a given time, the ACK is not received, assumes that the packet was lost, due to a collision with another packet coming from another computer (this can happen because the packets don't travel instantaneously from one host to another, so one machine could have started to transmit before the another one could sense this fact).

This process is described by the other part of the acronym:

CD = Collission Detection

In order to avoid this type of problem, before trying to resend the packet, it waits some time, which is called "backoff".

This time increases exponentially each time that it is not possible to send a packet successfully, in order to try to find a moment in which finally the network be clear.

8 0
4 years ago
What is data and instructions entered into the memory of a device
lyudmila [28]

A POINTING DEVICE IS AN INPUT DEVICE THAT ALLOWS A USER TO CONTROL A POINTER ON THE SCREEN. ... A KEYBOARD IS AN INPUT DEVICE THAT CONTAINS KEYS USER TO ENTER DATA AND INSTRUCTIONS INTO A COMPUTER.                                                                            

SORRY FOR CAPS MY CAPS KEY GOT STUCK

3 0
4 years ago
The retention of encoded information over time refers to
Crank

It refers to Storage

7 0
2 years ago
Other questions:
  • What is the name of the keyboard developed in the 1930s?
    13·1 answer
  • Your task is to improve a multi-threaded program that frequently writes small entries to a shared file by introducing a layer th
    7·1 answer
  • In a stream channel what is deposited first?
    7·1 answer
  • Why do you think it is important to consider ethical considerations when reviewing technology and assessing the impact of partic
    9·1 answer
  • Write a function that removes duplicates from an array. For example, if remove_ duplicates is called with an array containing 1
    15·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • Discuss any five factors that hinder the application of a computer in business organisations​
    15·2 answers
  • What is the size of BIOS?
    13·2 answers
  • Which step do you think is most useful from big data life cycle and why?
    12·1 answer
  • Which option in PowerPoint allows users to configure the number of columns and rows manually, using numerical values?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!