1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
9

Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m

ethod for each of the following categories:
Data collection on the internet
Digital data collection from a source other than the internet
Analog (non-digital) data collection being performed in physical places

For each of these data collection practices: Describe how the data collection occurs. Analyze the data collection process by answering the following five questions in complete sentences and to the best of your ability:

What data is being collected?
Why is this data being collected?
What are the likely benefits of this data collection?
How might this data collection cause harm?
How likely is it that this data can be accessed by others?

You may use the internet or any other available resources to identify and analyze these data collection strategies.
Computers and Technology
1 answer:
attashe74 [19]3 years ago
4 0

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

You might be interested in
The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
Alisiya [41]

Answer:

public class Reverse {

  1.    public static void reverseList(int list [], int n)
  2.    {
  3.        int[] reversedList = new int[n];
  4.        int k = n;
  5.        for (int i = 0; i < n; i++) {
  6.            reversedList[k - 1] = list[i];
  7.            k = k - 1;
  8.        }
  9.        //printing the reversed list
  10.        System.out.println("The Reversed list \n");
  11.        for (int j = 0; j < n; j++) {
  12.            System.out.println(reversedList[j]);
  13.        }
  14.    }

Explanation:

Using Java, An array is implemented to hold a list of items

A method reverseList() is created to accept an array as parameter and using a for statement reverses the elements of the array and prints each element of the list

See below a complete code with a main method that calls this method

<em>public class Reverse {</em>

<em>    public static void main(String[] args) {</em>

<em>        int [] arr = {10, 20, 30, 40, 50};</em>

<em>        reverseList(arr, arr.length);</em>

<em>    }</em>

<em>    public static void reverseList(int list [], int n)</em>

<em>    {</em>

<em>        int[] reversedList = new int[n];</em>

<em>        int k = n;</em>

<em>        for (int i = 0; i < n; i++) {</em>

<em>            reversedList[k - 1] = list[i];</em>

<em>            k = k - 1;</em>

<em>        }</em>

<em>        //printing the reversed list</em>

<em>        System.out.println("The Reversed list \n");</em>

<em>        for (int j = 0; j < n; j++) {</em>

<em>            System.out.println(reversedList[j]);</em>

<em>        }</em>

<em>    }</em>

<em>}</em>

7 0
3 years ago
Network administrators ____ to set up the browsers on the network to use a proxy server.
julia-pushkina [17]
May use a configuration file
4 0
4 years ago
Does anyone know how to permanently delete photos on a dell computer? For my cousin.
strojnjashka [21]

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

6 0
2 years ago
I need help 50 points and brainless if you answer
Aloiza [94]

Answer:

Sure, what do you need help with

Explanation:

7 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
Other questions:
  • Wordwrap forces you to stop typing words and press the enter key at the end of each line.
    12·1 answer
  • Hello, can you help me answer these questions?
    9·2 answers
  • List 5 different programming languages calls to print
    8·2 answers
  • All tif files start at offset 0 with what 6 hexadecimal characters?​
    11·1 answer
  • Using this tool to help you to visualize your slides and develop your content
    13·1 answer
  • Which of the displays could be represented by a single bit?
    12·2 answers
  • What is 36 Denary in Binary?? PLEASE ANSWER I WILL GIVE U BRAINLY!!
    9·2 answers
  • What is pseudo code?
    11·2 answers
  • If 2 people use my code D9R2M on fetch reward and scan receipts I will give brainliest ​
    13·2 answers
  • Which actions represent parody?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!