1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
9

5. In which of the following stages of the data mining process is data transformed to

Computers and Technology
1 answer:
Lena [83]3 years ago
8 0

Answer:B

Explanation: BC I SAID

You might be interested in
Given a positive integer, output its complement number. The complement strategy is to flip the bits of its binary representation
EleoNora [17]

Answer:

var findComplement = function(num) {

   

   var start = false;

       for (var i = 31; i >= 0; --i) {

           if (num & (1 << i)) {//find the leftmost hightest bit 1 and start from there

               start = true;

           }

           if (start) {

               

               num ^= (1 << i);

             

           }

       }

       return num;

};

var findComplement = function(num) {

   var bits = num.toString(2);

   var complement = '';

   for(var i=0;i<bits.length;i++)

   {

       complement += (bits[i]==1?0:1);

   }

   return parseInt(complement,2);

};

Explanation:

The javascript code above would accept a number in the variable complemnt and using the parseint keyword, it converts it to a binary value of that number.

Each bit is converted from the least to the most significant bit, then it is returned to the find compliment function and converted back to an integer.

5 0
3 years ago
For a parking payment app, what option would MOST likely connect a user to a third party/external gateway?
Alik [6]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Almost all app that is doing online business integrated third party payment gateway and login/services. But some apps, don't integrate the third party login/signin services such as go ogle or face book login/sign in services.

But in the context of this question, for a parking payment app, upon reservation of parking space, the pay option connects a user to a third party/external gateway. This gateway will accept payment from the user and upon confirmation of payment, the parking space will get reserved.

so the correct option to this question is:

  • Pay

While the other options are incorrect because:

The sign-in option does not connect the user to a third pay/gateway in case if the app has self-registration and sign-in functionality. Rate and Time remaining are features of the app that does not force the user to connect third-party gateway.

3 0
3 years ago
What is the difference between a spreadsheet and word processing software?
Xelga [282]

Answer:

Only one can calculate numeric data.

Explanation:

Both spreadsheet and word processing software can display graphs and chats.

Both spreadsheet and word processing software can organize data through cells and tables respectively.

Both spreadsheet and word processing software can present text and numeric data.

6 0
3 years ago
Read 2 more answers
Calories, sugars, and total fats could exceed the declared calorie value on the menu by only what percentage?
zysi [14]

Answer:

20

Explanation:

3 0
4 years ago
Producers must understand the marginal benefit of making an additional unit which shows the ...
yan [13]

Producers must understand the marginal benefit of making an additional unit which shows the possible gain. Marginal benefit is used in business and economics as a measurement of the change in benefits over the change in quantity. Possible gain is one example of benefit.  This measurement provides the relevant measurement of benefits at a specific level of production and consumption.

8 0
4 years ago
Read 2 more answers
Other questions:
  • Perception is a simple process.
    11·2 answers
  • Chunking is a good strategy for completing large assignments because it makes the work
    15·1 answer
  • Explain how applying different network topologies could have an impact on the security of a network
    11·1 answer
  • A workplace is where people _____. a. do work b. find new jobs c. go when they are unemployed d. read advertisements for job ope
    15·1 answer
  • How USB FLASH Drives Store Data? Explain, Maximum 5 linesa
    10·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
    14·1 answer
  • Computer data that is suitable for text​
    5·1 answer
  • When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed ha
    5·1 answer
  • Which step do you think is most useful from big data life cycle and why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!