1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
2 years ago
13

Big Data, Apple Pie, and the Future In this unit, you were introduced to various kinds of software, particularly databases. Data

bases have made it possible to gather and analyze vast amounts of data. The study of that data has led to some surprises, such as the real favorite flavor of pie for most people—it’s not what you might think! Watch the video Big Data Is Better Data. After you finish watching the video, answer the following questions: Were you surprised by the “pie data”? Is it true for you, your family, and your friends? Why or why not? The speaker argues that more data allow us to see new things. Think about your favorite hobby—skateboarding, listening to music, or whatever you most enjoy doing. What kinds of insights could big data provide about your hobby? How might these insights make things better for you? Are there any ways that big data could make your hobby worse? The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve these problems? Think of—and explain—one or more ways that society could use big data, other than the ones mentioned in the video. Think for a moment about the potential problems with big data that the speaker mentioned: Will we treat people unfairly for crimes they haven’t yet committed? Will most jobs disappear due to automation? Can we protect data from people who shouldn’t have it? Choose one of these topics and research it by reading two articles about it. Here are three sources to use to begin your research: Tween Tribune Newsela Channel One News If you are having a difficult time finding what you want, try searching for “data privacy,” “data breach,” “automation and jobs,” “crime and technology,” or “robots and jobs.” Include the following in your answer to the question you choose: Screenshots of the two articles that you read The question that you chose to answer Your answer to the question Three reasons that explain your answer to the question; use evidence from your research to support your op
Computers and Technology
1 answer:
Andreas93 [3]2 years ago
3 0

Answer:

I want to answer the 1st question. It asks, “Will we treat people unfairly for crimes they haven’t committed?” Well, of course, that’s a 100% chance. But, some people forget that people treat people unfairly for crimes they haven’t committed. Some people stay in jail for up to 35 years and are then released because they are innocent. Yes, computers will make mistakes, but the probability is much, much smaller than a human.

Explanation:

You might be interested in
A keyboard shortcut is a key or combination of keys that you press to access a feature or perform a command. ___________________
andrey2020 [161]
I believe that this is true.
Ctrl+F
Ctrl+C
Ctrl+V
These are all keyboard shortcuts.

8 0
3 years ago
when using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the .
ELEN [110]

When using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the:

  • -hand
  • -eye
  • -mouth

<h3>What is a Screwdriver?</h3>

A screwdriver is said to be a kind of a modern tool that can come in a manual or powered type and it is one that is often used for turning screws.

Note that a typical simple screwdriver is one that has a handle as well as a shaft and it is also one that is often ending in a tip where a given user can be able to put their hands into the screw head before turning the handle.

Therefore, when using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the:

  • -hand
  • -eye
  • -mouth

Learn more about screwdrivers  from

brainly.com/question/20717091

#SPJ4

3 0
1 year ago
HELP ASAP DONT ANSWER WITH A LINK​
OlgaM077 [116]

Answer:

<u>Layout</u>

title

title and content

section header

comparison

<u>Orientatio</u><u>n</u>

landscape

portrait

8 0
3 years ago
For this exercise, you are going to complete the printScope() method in the Scope class. Then you will create a Scope object in
iragen [17]

Answer:

Explanation:

The following is the entire running Java code for the requested program with the requested changes. This code runs perfectly without errors and outputs the exact Sample Output that is in the question...

public class ScopeTester

{

public static void main(String[] args)

{

       Scope scope = new Scope();

       scope.printScope();

}

}

public class Scope

{

private int a;

private int b;

private int c;

public Scope(){

a = 5;

b = 10;

c = 15;

}

public void printScope(){

       System.out.println("a = " + a);

       System.out.println("b = " + b);

       System.out.println("c = " + c);

       System.out.println("d = " + getD());

       System.out.println("e = " + getE());

}

public int getA() {

return a;

}

public int getB() {

return b;

}

public int getC() {

return c;

}

public int getD(){

int d = a + c;

return d;

}

public int getE() {

int e = b + c;

return e;

}

}

4 0
3 years ago
You have been tasked to set up an authentication server on a dmz that will allow only users from a partner company. what kind of
Lapatulllka [165]

The question above has multiple choices as follows;

a. Internet

<span> b. Intranet <span> c. Extranet <span> d. World Wide Web
Correct answer is C. Extranet
<span>You are able to use an Extranet to securely share part of a business’s operation with vendors, suppliers, customers, partners or any other business organization.  We can also view an extranet as an intranet extended to users outside the company.</span> </span></span></span>




7 0
3 years ago
Other questions:
  • To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
    7·1 answer
  • Boolean expressions are named after ____
    9·1 answer
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • If you had to choose, would you consider yourself more of an internet celebrant or a skeptic? On balance, do you think the inter
    10·1 answer
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
    15·1 answer
  • Click this link to view O NET'S Wages and Employment section for Film and Video Editors.
    11·2 answers
  • What is a programming language?
    14·2 answers
  • A __________ is the blueprint for __________ having similar attributes and behaviors. signature, objects class, parameters heade
    11·1 answer
  • You are trying to sell a new product to a store owner. Which method of presentation
    10·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!