1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
5

Big data are used to _____. Select 3 options.

Computers and Technology
1 answer:
Anon25 [30]3 years ago
8 0

Answer:

Big data are used to _____. Select 3 options.

understand people’s hobbies

analyze people’s interests

make decisions about marketing

Explanation:

100%

You might be interested in
How is a WAN different from a LAN?
RSB [31]

<em>A</em><em> </em><em> </em><em>WAn</em><em> </em><em>(</em><em> </em><em>Wide</em><em> </em><em>Area</em><em> </em><em>Network</em><em> </em><em>)</em><em> </em><em>is</em><em> </em><em>made</em><em> </em><em>up</em><em> </em><em>of</em><em> </em><em>LANS</em><em> </em><em>(</em><em> </em><em>Local</em><em> </em><em>Area</em><em> </em><em>Network</em><em>)</em><em>…</em><em>…</em><em>…</em><em>…</em>

4 0
3 years ago
Write a function, named "wait_die_scheduler" that takes a list of actions, and returns a list of actions according to the follow
lidiya [134]

Answer:

See attached picture for complete code.

Explanation:

See attached picture.

4 0
3 years ago
A call center is a _______.<br><br> JIT<br><br> CMA<br><br> CIC<br><br> SFA
sp2606 [1]

Answer: CIC

Explanation:

A call center is a customer interaction center (CIC) and it is the interface between call center agent with the customers directly. CIC are connected by the external telephone system and it uses as call center.

And the caller are basically identify by the telephone number and customer information are display in the CIC.

CIC are the modular structure for communication which include various components of CIC and framework.

4 0
4 years ago
Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
raketka [301]

Answer:

The answer is "True"

Explanation:

In the given statement some information is missing that is "True or false"

Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.

  • The security of the Internet is recognized as the privacy of the User.
  • It is secure and unique passphrases or two-factor authentication.
7 0
3 years ago
Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE"
Bad White [126]

Answer:

print("I like to code")

Explanation:

In the Programming Languages, print() function is used to print any string, display any output or both at the same time as well as we can print it one by one. We can also print addition, subtraction, multiplication and other problems directly without saving it in other objects or variables.

In the above statement, the correct method of printing any string is to write that string inside the parameter with a double-quote.

The second option is incorrect because in it double-quote is not used.

The third option is incorrect because the following sequence is not correct.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Is Apple a consumer or luxury brand? Give examples.
    10·1 answer
  • A way to have cells in your spreadsheet change formats based on the value of the cells is called ________.
    8·1 answer
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • An information system is the entire set of __________, people, procedures, and networks that enable the use of information resou
    8·1 answer
  • Which is a correctly formatted Python tuple?
    9·1 answer
  • Write a program which:
    10·1 answer
  • What is a googleplex?
    7·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:
    10·1 answer
  • You need to extract data from the system your predecessor created. you discover tables have been created according to the third
    7·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!