1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
14

5.7 AP-Style MC Practice edhessive

Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
7 0

Answer:

1. Data Mining

2. A regression analysis of standardized tests scores comparing the two different types of schooling. || Association rules showing links between motivation and happiness levels and the type of schooling students were receiving.

3. Screen Scraping

Explanation:

1. The data analyze big data sets to gain insight, which a person can't do, so it is data mining.

2. A regression analysis shows the mathematical relationship between two variables. Association rule mining finds features of data points which determine the results of other features.

3. Screen scraping generally refers to process recordings.

You might be interested in
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
3 years ago
Every workplace should have an emergency plan of action.
pochemuha

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

6 0
3 years ago
Read 2 more answers
Write a brief description of what the local authorities are recommending in the news people should do to protect themselves from
lana [24]
The brief description of the local author asbestos is Hope and that's what it would too with a heart and another heart which equals 100 which equals yes
3 0
3 years ago
Here is the list of problems to choose from:
olya-2409 [2.1K]

Answer:

There's a parking lot that is 600m² big. The lot must be able to hold at least 3 buses and 10 cars.

Each car takes up 6m² and each bus takes up 30m².

However, there can only be 60 vehicles in the lot at any given time.

The cost to park in the lot is $2.50 per day for cars and $7.50 per day for buses. The lot must make at least $75 each day to break even.

What is a possible car to bus ratio that would allow the lot to make profit?

3 0
3 years ago
Safety glasses should be worn in which of the following situations?
N76 [4]
When any substance is being heated. Safety glasses
8 0
3 years ago
Other questions:
  • What udp port is used for i k e traffic from vpn client to server?
    14·1 answer
  • You can use the results from a search on a database in all of these ways except to ____.
    11·2 answers
  • True or False. A compact disc (CD) stores music in a coded pattern of tiny pits 10−7m deep. The pits are arranged in a track tha
    9·1 answer
  • What is the model for 2017 Ford Mustang v6
    15·1 answer
  • What is the purpose of a career portfolio?
    6·1 answer
  • What is gained by increasing the ritation speed of a disk or cd?​
    9·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • We have studied machine cycle in class. Suppose that each of the four modules of machine cycle is taking 2 seconds. If there are
    5·1 answer
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
  • Which statement is true about biometrics as an authentication method?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!