1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
7

Pls help me this quation give me the answer Do you think that dealing with big data demands high ethical regulations, accountabi

lity, and responsibility of the person as well as the company? Why?
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
6 0

Answer:

yes, in case of big data demand it's duty of person as well as company to follow ethical principal and adhere the moral standard for keeping the information of the big data company confidential.

Explanation:

may it's help you

You might be interested in
Define a class in Java to accept and store the list of 10 names in an array. Print the
dem82 [27]

Answer:

public class Main

{

public static void main(String[] args) {

String[] strs = new String[10];

java.util.Scanner sc = new java.util.Scanner(System.in);

    for(int i = 0; i < 10; i++){

        System.out.print("Enter string " + (i+1) + ":");

        strs[i] = sc.nextLine();

    }

    System.out.println("The strigs with even number of characters is");

    for(int i = 0; i < strs.length;i++){

        if(strs[i].length() % 2 == 0){

            System.out.println(strs[i]);

        }

    }

}

}

Explanation:

8 0
2 years ago
The laser in a compact disc (cd) player uses light with a wavelength of 715 nm. what is the frequency of this light?
oee [108]
In order to get the frequency of this light you have to d<span>ivide the speed of light by the wavelength. 
The formula: </span>F = c / w<span>
Set the values in the appropriate form:</span>740nm = 7.40e-9m


Solution: 
3.00e8m/s : 7.40e-9m &#10;&#10;&#10;F = 6.38e16Hz
The answer:  = 63.8PHz
6 0
3 years ago
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Are robots that fix other robots engineers or doctors.
Hatshy [7]
The robots are Engineers
5 0
3 years ago
Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
marishachu [46]

Answer:

A

Explanation:

TCP numbers the packets before sending them so that the receiver can correctly reorder the packets, and it can request missing packets be resent.

UDP- sends all the packets at once

IP- rules on the networks

HTTP- used for transmitting web pages over the Internet

4 0
4 years ago
Other questions:
  • Why is binary code made up of a series of ones and zeros?
    15·1 answer
  • In excel, a cell is referred to by its cell __________, which is the coordinates of the intersection of a column and a row. answ
    14·1 answer
  • Will mark brainliest if correct. First come, first serve.
    10·1 answer
  • Text documents images audio clips and software applications are all examples of blank that are stored in files
    8·2 answers
  • If you want to implement fault-tolerance on your network, what type of raid would you use on the drives that contain the os and
    9·1 answer
  • The default paper size is _____. <br> a. letter <br> b. legal <br> c. executive <br> d. statement
    7·1 answer
  • 1.Can ICTs be innovatively used in the absence of minimum literacy levels among the poor?
    5·1 answer
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • O O O O O O O
    9·1 answer
  • List out the input and output device .​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!