1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
11

All waves consist of a continuous series of _____.

Computers and Technology
2 answers:
Musya8 [376]3 years ago
5 0
Compressions and rarefactions

kondaur [170]3 years ago
5 0

All waves consist of a continuous series of _____.

pulses

You might be interested in
What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
Stolb23 [73]
There is no truly unique identifier assigned to a PC. Any appearance of a unique ID is merely an illusion. The closest thing there is to a unique identifier is a MAC address, which is actually assigned to a network adapter (Ethernet port, wireless radio, etc.) and is usually unique but can be faked
7 0
3 years ago
The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capt
lys-0071 [83]

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

8 0
3 years ago
You listened to a song on your computer. Did you use hardware, software, or both?
Bogdan [553]
The answer to your question is: <span>Explain- </span>
<span>The CPU, monitor, speaker or earphone, keyboard, mouse etc. that you can touch are hardware. </span>
<span>The software or program such as the operating system, windows media player, ms office, paint etc that you cannot touch actually but they are shown on the monitor are called software. </span>

<span># You play the music with Windows media player or any music player that means you are using software. And the software itself is showing on the monitor(hardware) that is run by CPU, another hardware. </span>

<span>Hope you got it.. Please give me brnliest.



</span>
7 0
3 years ago
Read 2 more answers
What are the methods of identifying publicly switched networks?
Sav [38]
I believe that the answer to the question provided above is that the <span> methods of identifying publicly switched networks is by locating the IP address if the source.</span>
Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

8 0
3 years ago
L
Artist 52 [7]

Answer:

I tried, I falid, I sorry :(

Explanation:

......

5 0
3 years ago
Other questions:
  • To use hand and power tools safely, you should:
    9·2 answers
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    12·1 answer
  • Joshua needs to join in two cells together which of the following would perform the function
    14·1 answer
  • Which of the following is a file on the host computer used for temporary memory storage when a sudden surge in memory requiremen
    9·1 answer
  • What is one way a senior employee can mentor a new employee? Give orders about what to do and what not to do Gossip about which
    10·1 answer
  • Get someone get her for me if need snap kell.c11
    10·1 answer
  • Assume a computer uses pipelining of 9 stages. Each stage demands 3 clock cycles to finish its task. How many clock cycles are n
    9·1 answer
  • match the parts of a project plan listed in Column A to the specific examples given in Column B.Write the letter of your answer
    13·1 answer
  • Which term means the push that makes electrons move in a wire?
    13·2 answers
  • Memory of the computer is measured by the following units which is = to 1 character
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!