1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
15

Which is the best example of someone growing their network while in high-school?

Computers and Technology
1 answer:
Llana [10]3 years ago
3 0

Answer:

C

Explanation:

You might be interested in
Write a detailed three page report that summarizes how data scientists are utilizing data mining to predict future trends and be
LiRa [457]

Answer: given in the explanation

Explanation:

Data mining is referred as an automated processing tool used for sorting and analyzing enormous data and information which indeed are ``aimed towards effectively identifying trends and patterns and establishing relationships to solve business problems and generate new opportunities. Furthermore data mining techniques also helps to predict what’s going to happen in the future and act accordingly to take benefit of forthcoming tendencies.

Data mining is applied to a variety of large-scale data-processing activities such as collecting, extracting, warehousing and analyzing data. It also includes decision-support applications and technologies such as business artificial intelligence and machine learning and is used in varied areas of business research such as product development, sales and marketing etc.

Data mining is for taking advantage of data to predict ;

  • Mathematical algorithms, and, data are used for predictive analytics. One can capture information, and, use it to model sales pattern, trends, and, customer behaviour
  • Data mining uses algorithms to extract, and, analyze information; discover hidden patterns
  • It uses data patterns, and, is thus closely tied to machine learning
  • Historical & current information is used to predict future trends

Data mining can be used for the following:

  • Data mining in gas & oil operations - Mining data in gas & oil operations involves committing to key technologies, and, processes; and, embracing new ways of thinking & problem-solving. Firms can use exploratory data analysis, modelling techniques & model development; approaches to put models into production
  • Big data - Performance computing & advanced analytics
  • Magic Quadrant - Evaluate 16 vendors to identify the right ones
  • Heavy reading, network analytics - Optimize network; evaluate network performance; provide targeted marketing; fine-tune capacity.

5 0
4 years ago
A scale model that proves the initial concept is called a
vlabodo [156]

Answer:

Domain model.

Explanation:

A domain model is a type of conceptual model used to show the structural elements and their conceptual constraints within a domain of interest. A domain model will include the various entities, their attributes and relationships, plus the constraints governing the conceptual integrity of the structural model elements comprising that problem domain.

7 0
3 years ago
Hey should I get a r()blox gift card if so what amount 5 dollars 10 or 100
IRINA_888 [86]

Answer:

yes you should get a 10 bc it not to much and u can still get something cool

6 0
3 years ago
Describe your previous personal or professional experience with Microsoft Word.
Stolb23 [73]

Answer:

Microsoft Word is pretty helpful.

Explanation:

I go to school and at school I have projects with Microsoft Word and it's pretty easy to understand. I'd recommend.

8 0
3 years ago
Which of the following refers to a failure response resulting in open and unrestricted access or communication?
avanturin [10]

Answer:A)Fail-open

Explanation:After opening ,accessing any operation or function in system or communicating through a network ,results in the failure by factor of not being able to be accessed is known as fail-open.The unrestricted access can occur due to several reason like network issue, origin problem etc.

Other options in the given question are incorrect because mission critical ,default flow and fail secure are not the situations that occur when after opening, access gets restricted. Thus, the correct option is option(A).

6 0
3 years ago
Other questions:
  • Imagine a situation where two developers are simultaneously modifying three different software components. what difficulties mig
    11·1 answer
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • What types of storage can be used to access your data on another computer?
    7·2 answers
  • Writa function to read content from "Zone. txt" and write it into another file "zone1. txt" by reversing each line if the line s
    15·1 answer
  • What is a variable? Why is it helpful in programming?
    12·1 answer
  • Who is responsible for developing the physical background for the characters by creating buildings, landscapes, and interiors?
    14·1 answer
  • Can someone else kill Raz and I can still get the challenge done by collecting the artifact in fort nite?
    13·1 answer
  • Classify computer software and write short note about it ?​
    6·1 answer
  • A company is concerned that hackers may gain access to its computer system or that it may be
    11·1 answer
  • I don't know what to do for these two questions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!