1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
10

Why should data anaylst should learn about computer arichtecture.

Computers and Technology
1 answer:
torisob [31]3 years ago
8 0
The knowledge serves as good foundation for me to understand how technology works behind the scene as well. So I must say a good understanding of computer architecture gives the data scientist the ability to propose feasible solution in capturing and maintaining data, implementing models and algorithms in IT systems.
You might be interested in
A diagram of a flow chart to find the average of 10 numbers​
Nat2105 [25]

Answer:

Kindly check attached picture

Explanation:

Flowchart gives a graphical representation of a steps taken towers the execution of a program.

In the flowchart attached, A variable was initialized and set to 0 ; then a for loop was used to iterate integers 1 up to 10, for each number. It is added to the initialized variable sum until all the 10 integer numbers are added. The the average is obtained by dividing by 10.

4 0
3 years ago
Today's Apple Mac computers run with the same I-Ternal hardware as the Windows based PC true or false
Ksivusya [100]
Kinda of both. The processor, memory, hard drive and displays are all standard components and are provided by a variety computer competent manufacturers (except for the processors which are all supplied by Intel). Yet - while many components are standard - NO, the core, hardware components, like logic boards (motherboard), video cards, and other specialty components (some display connectors and displays, for example) are propriety Apple designs.
5 0
3 years ago
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is kn
Zina [86]
A) Social Collaboration

Social Collaboration is a way for people to combine their information and make it easier to go through and to work well as a team.
7 0
3 years ago
How can you add more bytes to your iPad if there isn't enough storage space?
miv72 [106K]
You cant, you have to either delete items off to gain some storage back or go buy an ipad with more storage
3 0
3 years ago
Read 2 more answers
A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of
leonid [27]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
  • The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
  • It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
  • Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
6 0
3 years ago
Other questions:
  • You are writing a program that defines a variable within a loop, and then tries to use that variable outside the loop. However,
    9·1 answer
  • Which aspects of a project do project makers oversee?
    12·2 answers
  • Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the info
    5·1 answer
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    13·1 answer
  • The fraction 460/7 is closest to which of the following whole numbers?
    11·1 answer
  • Demographics and psychographics influence database marketing.<br><br><br> False<br><br> True
    7·1 answer
  • If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreemen
    15·1 answer
  • I know that this will be taken down for not being a real question but is anyone else not able to search for anything? I can type
    13·1 answer
  • Write any four causes of cyber crime
    12·1 answer
  • How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!