1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
3 years ago
9

What is data analysing data and give three examples ?​

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
3 0

Answer:

Data Analysis is the process of systematically applying statistical and/or logical techniques to describe and illustrate, condense and recap, and evaluate data. ... An essential component of ensuring data integrity is the accurate and appropriate analysis of research findings.

Inferential Analysis. Diagnostic Analysis. Predictive Analysis. Prescriptive Analysis are examples.

You might be interested in
What is the full form of ALU​
Alexandra [31]

Answer: arithmetic logic unit: the part of a central processing unit that performs arithmetic and logical operations.

Srry if it is wrong

I hope it  helps you

6 0
2 years ago
Read 2 more answers
How to delete a brainly account?
dmitriy555 [2]

Answer:

Fill the deletion form go to settings and open FAQ ..

7 0
3 years ago
Read 2 more answers
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
Morgarella [4.7K]

Answer:

Same browser

Explanation:

3 0
3 years ago
T F Static local variables are not destroyed when a function returns.
Virty [35]

Answer:

False

Explanation:

Static local variables are destroyed when a function returns.

They are always destroyed after a function returns.

5 0
3 years ago
you have just finished developing a new application. before putting it on the website for users to download, you want to provide
Nostrana [21]

If you have just finished developing a new application, but before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified, a process which you must implement is: C. Code signing.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

<h3>What is code signing?</h3>

In Computer technology, code signing can be defined as a process through which software developer and computer programmers digitally sign executable software codes and scripts in order to confirm the author of the software, as well as guaranteeing that the software code has not been altered (modified) or corrupted, especially through the use of a cryptographic hash so as to validate authenticity and integrity.

In this context, we can reasonably infer and logically deduce that it is important for software developer and computer programmers to implement code signing before making a software available for download on a website.

Read more on software development here: brainly.com/question/28262663

#SPJ1

Complete Question:

You have just finished developing a new application. Before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified.

Which of the following would you implement?

answer choices

Normalization

Code obfuscation

Code signing

Memory management

3 0
1 year ago
Other questions:
  • Why does the PC send out a broadcast ARP prior to sending the first ping request
    12·1 answer
  • A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
    13·2 answers
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • A "start transaction" is set to be the system's first screen displayed once you log in to GCSS-Army. Setting up a start transact
    14·1 answer
  • What activities are the most likely to infect your computer vith a virus? Check all that apply.
    10·1 answer
  • Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(
    8·1 answer
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
  • Who has more Tanks? Russia or USA? You get ti right and you get BRAINLIEST
    12·2 answers
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!