1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
5

Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperati

on
Computers and Technology
1 answer:
lutik1710 [3]3 years ago
5 0

Answer:

uh

Explanation:

yesyesyesyesyesyeysyeys

You might be interested in
you are sitting in a coffee shop with your laptop computer and have connected to the internet through an unrestricted wi-fi conn
amm1812

Since you are sitting in a coffee shop with your laptop computer and have connected to the internet through an unrestricted wi-fi connection,this type of wi-fi connection called hotspot.

<h3>What is the difference between hotspot and Wi-Fi?</h3>

WLAN is a wireless technology for local area networks (Local Area Networks). While the hotspot uses wifi to connect wireless devices to the internet. Without wifi, a hotspot does not exist. whereas wifi is used to generate a hotspot.

Because it uses your cell phone number to authenticate, a mobile hotspot is a secure network. You should be prompted to create a password on your phone, which you can later use on other devices to access the internet. As opposed to accessing free public Wi-Fi, a mobile hotspot is safer and more secure because of this.

Therefore, A hotspot is a physical site where users can connect to a wireless local area network (WLAN) with a router connected to an Internet service provider to access the Internet, generally using Wi-Fi.

Learn more about internet  from

brainly.com/question/28078151
#SPJ1

7 0
1 year ago
Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time th
Alja [10]

Answer:

The answer is "Option c"

Explanation:

Plug and Play is a general term that is used to define gadgets operating with a computer network while connected to it. This technology allows the hardware to use automatically by adding it, and other option can be described as follows:

  • In option a, This technology is used in monitoring the commercial vehicles system, which is why it's incorrect.
  • In option b, It is wrong because It is used in Microsoft Windows, which increases the physical security.
  • In option d, It describes the details about the hardware and switches to configure the device, that's why it is incorrect.
5 0
3 years ago
Which part of project management involves determining the required materials?
oksian1 [2.3K]

Answer:

Resources I think because what you have all depends on resources which required money

PLZ CORRECT ME IF I AM Wrong please and thank you

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the following does Moore's law predict?
Korolek [52]

Answer:

Hi!

The correct answer is the a.

Explanation:

The Moore's law is an a empirical law that Gordon Moore predicted doing some observations about how the density of the transistors on a integrated circuit was increasing over time.

For example, this law state that if you have an integrated circuit with: 1000 transistors in 1980 then in 1981 and six months later you will have the same integrated circuit with 2000 transistors, and so on..

  • Jan 1980: 1000 transistors.
  • Jul 1981: 2000 transistors.
  • Jan 1983: 4000 transistors.
  • Jul 1984: 8000 transistors.

And that's the reason because its cost will fall too.

7 0
3 years ago
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
Other questions:
  • Simon wants to use an invoice template created by Office.com. The first step after selecting the File tab is to select
    14·1 answer
  • Why is technology potentially important to the banking industry? What consumer needs does it fulfill?
    15·1 answer
  • What is a content creator? Multiple Choice The person responsible for creating the original website content. The person responsi
    14·1 answer
  • What should you remember about typography while creating your résumé?​
    14·1 answer
  • How do i cancle my account on brainly
    11·1 answer
  • The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This funct
    11·1 answer
  • Which statement in switch case structure transfers the control flow outside the structure? switch statement break statement case
    5·2 answers
  • A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune poli
    13·1 answer
  • How to resize an image in photoshop without losing quality.
    11·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!