1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
9

Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m

ethod for each of the following categories:
Data collection on the internet
Digital data collection from a source other than the internet
Analog (non-digital) data collection being performed in physical places

For each of these data collection practices: Describe how the data collection occurs. Analyze the data collection process by answering the following five questions in complete sentences and to the best of your ability:

What data is being collected?
Why is this data being collected?
What are the likely benefits of this data collection?
How might this data collection cause harm?
How likely is it that this data can be accessed by others?

You may use the internet or any other available resources to identify and analyze these data collection strategies.
Computers and Technology
1 answer:
attashe74 [19]3 years ago
4 0

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

You might be interested in
Linux distributions overview? information​
disa [49]

Answer:

Debian

Arch Linux

Ubuntu

Fedora

Manjaro

Linux Mint

Elementary OS

openSUSE

Explanation:

6 0
3 years ago
1. The letters that appear after the dot after a file name are called the:
Murrr4er [49]

Answer:

Files Extension.

Explanation:

The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file.

7 0
2 years ago
?What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
pickupchik [31]
Open flow protocol is used
6 0
3 years ago
CPT, which is used to code procedures in an office, is an example of a/an
ExtremeBDS [4]
 <span>Current Procedural Terminology

is used for general check up

</span>
3 0
3 years ago
*URGENT!!* *100 POINTS!**9 questions for 100 points*
Lena [83]

Answer:last day of school

Explanation:

sorry, im looking for it as well

7 0
3 years ago
Other questions:
  • After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
    13·1 answer
  • How do i download my music from my computer to google play?
    14·1 answer
  • How can you best protect yourself when using social media?
    14·2 answers
  • Which feature of a blog allows an author to interact and get feedback from his or her readers?
    14·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • Suppose that the performance measure is concerned with just the first T time steps of the environment and ignores everything the
    14·1 answer
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • Consider the following code: x = 9 y = -2 z = 2 print (x + y * z) What is output? 9 13 14 5
    5·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • An analogue sensor has a bandwidth which extends from very low frequencies up to a maximum of 14.5 kHz. Using the Sampling Theor
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!