1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
9

Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m

ethod for each of the following categories:
Data collection on the internet
Digital data collection from a source other than the internet
Analog (non-digital) data collection being performed in physical places

For each of these data collection practices: Describe how the data collection occurs. Analyze the data collection process by answering the following five questions in complete sentences and to the best of your ability:

What data is being collected?
Why is this data being collected?
What are the likely benefits of this data collection?
How might this data collection cause harm?
How likely is it that this data can be accessed by others?

You may use the internet or any other available resources to identify and analyze these data collection strategies.
Computers and Technology
1 answer:
attashe74 [19]3 years ago
4 0

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

You might be interested in
Jason is driving 1,050 miles from Miami, Florida, to New
Mandarinka [93]

Answer:

he have to travail 17.5 miles i know by dividing 1050 to 60 and got 17.5 then multiplyed 60 then got 1050

Explanation:

5 0
3 years ago
Joe wants to use an engaging image as a hook in his presentation , but he’s afraid of violating any copyright law. What should h
vivado [14]

Answer:

he should cite the websites of where he got his information.

Explanation:

6 0
4 years ago
Which of the following situations is least likely fair use
kolezko [41]

Answer:

Is there more to the question or is that it?

8 0
3 years ago
Read 2 more answers
Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
faust18 [17]

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

5 0
3 years ago
Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
Inessa05 [86]

Answer:

False

Explanation:

Methods inherited from the base/super class can be overridden only if behvior is close enough. The overridding method should have same name, type and number of parameters and same return type.

6 0
3 years ago
Other questions:
  • When using static ip addressing, software automatically configures the network connection on each device.?
    9·1 answer
  • According to the chart, which degree would you have to earn in order to make the most amount of money? A bar graph titled Averag
    13·2 answers
  • Assume that we are using 0-1 integer programming model to solve a capital budgeting problem and xj = 1 if project j is selected
    6·2 answers
  • The Internet has made going global easier than it has ever been, but the promise of "borderless commerce" remains restrained bec
    12·1 answer
  • Which tool should be used when a fastener, such as a lug nut, is extremely tight
    6·2 answers
  • Related to Image Classification
    13·1 answer
  • Define foreign key. What is this concept used for?
    6·1 answer
  • Use the drop-down menus to explain how to save a presentation to a CD.
    5·2 answers
  • As the complexity of a network increases, the possibility of security breaches decreases. is this true or false
    6·1 answer
  • Which remote access role service allows publishingweb-based applications for use by clients outside thenetwork?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!