1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
4 years ago
8

What is the process of analyzing data to extract information not offered by the raw data alone? data mart analysis data mining d

ata extraction data integrity?
Computers and Technology
1 answer:
ludmilkaskok [199]4 years ago
3 0
The answer is data mining. Hope this helps. :)
You might be interested in
When assigning a value to a string, which of the following rules needs to be followed?
Alecsey [184]

Answer:

Let's say you need to remember some information, the way moviegoers tried to remember the name of the movie. Instead of storing it in your human memory, you can store information in your computer's memory using Python. This is called assigning a string value to a variable.

To assign a string value to a variable in Python, follow this example. Select each part of the code to see how it works with the movie title example.

movieTitle = "Live. Die. Repeat."

This line of Python code is an example of an assignment statement. In an assignment statement, you tell Python, "This variable is assigned this string value."

Explanation:

4 0
3 years ago
Sarah is delivering a presentation on the solar system. Each slide consists of not more than four to five points. However, she n
slava [35]

Answer:

Handouts

Explanation:

Handouts is the section where the audience can have a more detailed grasp on the points presented in the slide for more in dept information about the presentation.

5 0
3 years ago
While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
gtnhenbr [62]
90% sure the answer isTrue
6 0
4 years ago
One symptom of malware infection is that your antivirus software is disabled and cannot be re-enabled. Choose the answer. True F
Trava [24]

Answer:

False

Explanation:

Some malware software take advantage of the fact your computer has a virus and will try to advertise "anti-virus" software they made to hurt your computer even more.

4 0
3 years ago
Which of the following is the fastest growing input technique​
Natali [406]
We need more information for this one, please.
8 0
3 years ago
Other questions:
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • What do you think is the meaning of the saying "Sticks and stones may break my bones, but words can never hurt me"? Do think tha
    5·1 answer
  • ​"To busy multitaskers who need help remembering​ things, Evernote is a digital content management application that makes it eas
    12·1 answer
  • Who the heII is apsiganocj
    14·2 answers
  • What happens when there is a data fail?
    6·2 answers
  • After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
    8·1 answer
  • How to disappear completely from the internet pc magazine
    7·1 answer
  • 8. What is the order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!