1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
5

Big data are used to _____. Select 3 options.

Computers and Technology
1 answer:
Anon25 [30]3 years ago
8 0

Answer:

Big data are used to _____. Select 3 options.

understand people’s hobbies

analyze people’s interests

make decisions about marketing

Explanation:

100%

You might be interested in
All of these are required categories on a safety data sheet except
ale4655 [162]

I think it is D because you would need there contact information in case something happens not there trade name

3 0
3 years ago
Read 2 more answers
Someone plz Help I am desperate.
sasho [114]

It would help if there is a programming language in the context of which you need this answered. For instance in Python you can create a program like this:

print(type("Hello"))

print(type(1337))

print(type(True))

print(type("3.14"))

It will return:

<class 'str'>

<class 'int'>

<class 'bool'>

<class 'str'>

8 0
3 years ago
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
friend wanted us to decode this message ----- .---- ----- ----- .---- ----- ----- .---- / ----- .---- .---- .---- ----- .---- .-
hodyreva [135]

Answer:

01001001?01110111?01100001?01111001?00100000?01101001?01101011?01100101?01101100?01100001?01111001?00100000?01110101?01101110?01100001?01101100?01100001?01111001?00101110

3 0
3 years ago
So I bought a mechanical keyboard with cherry mx red switches. you're called "linear and silent" they are linear but they aren't
Gnom [1K]

Answer:

If the keys were silent in the review, it could have been one of two things. The first thing being, the microphone just wasn't picking up the audio as good and the second being, you could have just got scammed. Would you mind telling me the model of your keyboard so I can do some research. Cherry mx switches are loud because they bottom out on the keyboard. The actual switch itself is very quite. All linear means is that they keystroke is consistent and smooth rather than a Tactile switch which has a bum in the middle of its' stroke. In advertisement, they will lightly press they switch and that catches your attention when in reality whatever you are doing gaming or typing you will be slamming your keys down with a considerable amount of force. If you want a quiter keyboard I would pick a low profile keyboard which means that they keystroke is not as long as a mechanical keyboard which also means that the noise from the key hitting the keyboard will be a lot less loud.

Explanation:

Hopefully that kinda answers your questions.

7 0
3 years ago
Other questions:
  • Students can use eNotes to type notes directly on screen and
    11·2 answers
  • Describe at least three things you could do to prepare for giving an effective and engaging business presentation. (1-3 sentence
    15·2 answers
  • Which one of these variables has an illegal name?
    11·1 answer
  • Who is responsible for customer service?
    14·1 answer
  • The listing of a directory shows certain files with permissions set to rwsr-xr-x. what does this indicate?
    12·1 answer
  • Who would use a CLI? (Command Line Interface)
    9·1 answer
  • The best time to visit a college is: A. during spring break. B. on a weekend. C. when the college is in session. D. during winte
    8·2 answers
  • Find the maximum value and minimum value in milesTracker. Assign the maximum value to maxMiles, and the minimum value to minMile
    10·1 answer
  • What keyword must be used on any method (function) on your class that is called from your main() method?
    15·1 answer
  • Roles of computer in business areas​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!