1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
7

Help me will give brainliest. So can you do number 2 about gaming please

Computers and Technology
1 answer:
zvonat [6]3 years ago
4 0

Answer: Some insights big data can provide about my hobby, gaming, is what year a certain game was created or the number of purchases made in a year. These insights can make things better for me by knowing what versions to receive first and what's the best game to get. Although, some ways big data can make it worse is by not understanding what the information is saying due to a lack of data or context. They can also make it worse by data and system errors, causing problems for me due to the decisions I make off of it.  

I hope this helped!

Good luck <3

You might be interested in
Computers can accomplish many tasks today, but there are still some things they cannot do. Think of some of the things you would
postnew [5]
Record our dream.
Since it is from the future and advanced, it is invalid to argue back that the wish to record our dreams cannot be fulfilled.

From here you can elaborate more ...
7 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
4 years ago
What home ribbon group contains the command used for quickly converting selected cells to a table by choosing a table style?
Anni [7]
The answer would be Styles
6 0
4 years ago
You are tasked to connect a new cable to an open port on the patch panel. Which of the following tools will you most likely use?
ki77a [65]

Answer:

A. Loopback tool

Explanation:

Loopback tool or adapter is a small device used to test networks ports and help identify simple network connection issues, this is a great tool when mapping out a physical layout of a network and quickly identify active ports on a switch.

This tool works by taking the transmitted signal and redirecting it or looping it back into the receiving end of the same connection.

3 0
4 years ago
!WILL GIVE BRAINLIEST!
balandron [24]

Answer:

word = input()

if word > "apple" and word < "pear":

   print("Word is valid.")

else:

   print("Word is out of range.")

3 0
3 years ago
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • Why is timbre an important musical element?
    7·2 answers
  • In which of the following situations will a macro make your work more efficient?
    9·1 answer
  • Analyze the problem statement. Select the correct answer. Vision: We want to decrease errors in our billings to clients. Issue:
    5·1 answer
  • what term defines inventiveness uncertainty and futuristic ideas typically deals with science and technology
    15·1 answer
  • In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.
    9·1 answer
  • When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the v
    12·1 answer
  • 1. Describe the sequencing of factors influencing health status codes for patients that also have chronic conditions being manag
    6·1 answer
  • Of what is famous Ted Nelson?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!