1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
6

A data __________ is trained in both computer science and statistics and knows how to effectively process and analyze large amou

nts of data.
Computers and Technology
1 answer:
Inga [223]3 years ago
3 0

Answer: data scientist

Explanation:

You might be interested in
Which of the following describe why a repeat block would be used in a project
iogann1982 [59]

Answer :If a project uses a  Repeat block  the same logic always holds when the commands are executed. Both block stacks perform the same behaviour.

Explanation:

4 0
3 years ago
Read 2 more answers
What service determines which resources a user can access along with the operations that a user can perform?.
sweet [91]

The authorization services determine which resources a user can access along with the operations that a user can perform.

<h3>What is authorization service?</h3>

The authorization service makes sure the user has permission to access a certain resource. Role-based access control (RBAC) and list-based access control are two methods for authorizing (LBAC).

The process of granting anyone permission to use a resource is called authorization.

The description may sound bizarre, but there are numerous actual examples that may help you comprehend what authorization means and how to utilize it with computer systems.

Thus, the authorization services determine which resources a user can access along with the operations that a user can perform.

Learn more about the authorization services here:

brainly.com/question/10436962

#SPJ4

8 0
2 years ago
Knowing what you know now about frequency analysis, would you feel comfortable sending your password over the Internet using a s
EleoNora [17]

Answer:

The following scenario is False.

Explanation:

In the following question, there is some information about the question is missing that is True / False.

The above statement is false because though hard, it would still be decoded by others. So, we cannot feel safe or comfortable while sending our password to anyone through the internet because it is not safe and someone decodes it and they steal the following information or they can misuse the following data also.

3 0
3 years ago
Tiffany is writing a program to help manage a bake sale. She writes the following code which prompts the user to enter the total
Gekata [30.6K]

Answer:

Add the line numItems=numItems-1 after the 3rd code line.

Explanation:

As the loop is not terminating thus the counter is to be added such that the value is decreased in each iteration. As the last item is entered the value will become 0. Now when the loop will again reach the while point, the condition will become false and thus the loop will be terminated.

3 0
4 years ago
A(n) ____ is a set of permissions that are attached to an object
rewona [7]

The answer is “ACL” or also known as “Access Control List”. The Access Control List is a list of permission that are attached to an object. An ACL identifies which manipulators or structure procedures are allowed access to objects, as well as what procedures are permitted on given objects. Each admission in a distinctive ACL identifies a subject and an action.

8 0
3 years ago
Other questions:
  • (Financial application: compound value) Suppose you save $100 each month into savings account with an annual interest rate of 5%
    6·1 answer
  • Without ____, a bus network would suffer from signal bounce.
    6·1 answer
  • Professor Zak allows students to drop the four lowest scores on the ten 100 point quizzes she gives during the semester. Design
    13·1 answer
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • TWO MINUTES LEFT<br> ________ __________ is the physical arrangement of devices on a network.
    9·1 answer
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • How can using Prezi software for a presentation allow the presenter to better respond to audience needs?
    10·1 answer
  • Please help me
    7·2 answers
  • Can someone help me with this question, i know all except psuedocode, help me please
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!