1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
14

Describe the big data life cycle. Which step do you think is most useful and why?

Computers and Technology
1 answer:
Step2247 [10]3 years ago
7 0

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

I think business cases analysis is the most useful step because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements

Explanation:

mark me brainliest

You might be interested in
Meryl works in the audio-video department
aleksley [76]

Answer:

Graphics: jpg, png

Audio: wav, mp3

Video: mpg avi

4 0
3 years ago
Read 2 more answers
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
What is a sign that content is
Sidana [21]
D. All of the above
7 0
4 years ago
Read 2 more answers
Joanna accidentally leaned on her keyboard and repeatedly typed the letter z. How can she fix this mistake?
Brut [27]

Answer:

just press delete

Explanation:

5 0
3 years ago
Read 2 more answers
What is used in an ipv6 for local device to learn the layer 2 ethernet address of a device that is on a remote nonlocal vlan?
zavuch27 [327]
The devices in IPv6 only need to learn the Layer 2 Ethernet address of a neighbor that is directly connected, and only if they need to communicate with each other on that local network. If the device you are trying to connect to is remote, you will forward the packet to your default gateway’s Layer 2 address.
NDP (Neighbor Discovery Protocol) is used to learn local neighbors’ Layer 2 Ethernet addresses when needed.
ARP is an IPv4 method to learn a local device’s Layer 2 address.
The RIPng (RIP next generation) is RIP version that support of IPv6 networking..
3 0
4 years ago
Other questions:
  • Why does the PC send out a broadcast ARP prior
    14·1 answer
  • To support an internet client, you must have six elements. the first three -- a computer, an operating system and tcp/ip -- are
    7·1 answer
  • How do you solve this.
    12·1 answer
  • ​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
    10·1 answer
  • Problem: you need to write a code that read 2 array of size 10x10 of zero and ones that represent black
    8·1 answer
  • What is the purpose of networking with other businesses?
    10·1 answer
  • (03.04 MC) While working in a group, two members are not getting along. You ask each one what is happening, and they both say th
    7·2 answers
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
  • Hi. I'm a beginner in python. Can anyone tell me what I'm missing or doing wrong, because I can't figure out why my messages in
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!