1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
2 years ago
9

Which step do you think is most useful from big data life cycle.why?

Computers and Technology
1 answer:
12345 [234]2 years ago
7 0

Explanation:

Business xase evaluation is most useful because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements.

Mark me brainliest

You might be interested in
What is the binary answer to the binary number 100 added to the binary number 11?
olasank [31]
I will use 0b to refer to binary numbers: ex: 0b1 = 1, 0b10 = 2

0b100 = 4 and 0b11 = 3

4+3 = 7

convert 7 to binary and you get 111.

Hope this helps, and May the Force Be With You!
<span>-Jabba</span>

6 0
3 years ago
Read 2 more answers
What is installing?
GalinKa [24]

The process of putting new software on a computer

3 0
2 years ago
Read 2 more answers
What is sampling?
Mama L [17]
The answer is either B) or D) because I remember learning this and the keyword I remember is analogue

Hope this helps —- XoXo
3 0
3 years ago
What provides access to the internet?
Sphinxa [80]
A router!
12345678901234567890
6 0
3 years ago
What would happen if your computer was infected with the virus or if your network went down?
tatuchka [14]

Your computer will programs more slowly, when you go to an anti-virus software, for some, it will block you from allowing you to access the application. Your information may be stripped from your computer, allowing the infection to take your personal identity and money.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Identify the function for the following computer part: Printer Question 23 options: Input
    6·1 answer
  • Branching is so called because <br>​
    5·2 answers
  • Categories of general purpose application software and examples each​
    13·1 answer
  • THE DOMAIN IN AN EMAIL MESSAGE TELLS YOU THE
    11·1 answer
  • Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
    5·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • 10(            )  8(532.2 )                         
    15·1 answer
  • List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13
    7·1 answer
  • What service determines which resources a user can access along with the operations that a user can perform?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!