Data mining is an integral part of knowledge discovery in database (KDD), which is the overall process of converting ____ into _____. a. primary data / secondary data b. input data / output data c. raw data / useful information d. input data / data fusion

Answers

Answer 1

Answer:

c. raw data / useful information

Explanation:

Data mining can be described as the cat of converting raw data into useful information.

In simple terms it can be defined as the process of extracting usable data from a much larger set or data(raw). This is done through the use of various softwares that support the process.

Through data mining patterns, anomalies, correlations etc are found in the data which is then used in the prediction of likely outcomes.


Related Questions

Rafael needs to add a title row to a table that he has inserted in Word. What should he do?

Answers

Answer: C

Explanation:

Edge2020

Answer:

c

Explanation:

There are three main categories of objects to be protected by access controls: information, technology, and _____________.

a. applications
b. processes
c. physical location
d. networks

Answers

Answer:

c. physical location

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device in order to grant or deny them access to a computer resource.

Access control work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials through a process known as authentication and granting the user access if the credentials provided are authentic (valid) through a process known as authorization, else, they would be denied access.

An example of an access control is a password because it is typically a basic and fundamental front-line defense mechanism against an unauthorized use of data or cyber attacks from hackers.

There are three main categories of objects to be protected by access controls: information, technology, and physical location. Information refers to all data sets, technology refers to the software applications, network and computer systems while physical location refers to infrastructures such as building, data centers, campuses, offices etc.

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!
When is Internet Control Message Protocol most often used?


when Internet Protocol does not apply

when a receiver or sender cannot be located

when one needs to reassemble data sent via UDP

in the Network Access Layer

Answers

Answer:

d

Explanation:

because I did this before

Answer:

d

Explanation:

Thanks for ur time :)

is domain name system encrypted?

Answers

Answer:

they are all the same

Explanation:

all the packets look the same tis is because of HTTPS and HTTP/2, and how they both use connection

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!

What does the Address Resolution Protocol do?


transports packets, but does not include data reassembly

reports that a sender cannot be found

sends files across a network

finds the address of the next routing device along the network pathway

Answers

Answer: transports packets, but does not include data reassembly

Explanation: Hope it helps you!

Answer:

finds the address of the next routing device along the network pathway

Explanation:

srry its late

Paghambingin ang malawak na perspektibo sa

ang

limitadong perspektibo sa pamamagitan tatlong

eng lakas halimbawa.


Malawak


1

2

3


Perspektibo


1

2

3

Answers

Answer:

2

Explanation:

Paghambing limitadong perspektibo sa pamamag

Functions can: A. Be used as building blocks to create new programs. B. Return a result to the caller function. C. Be reused any number of times. D. Do all of the above.

Answers

Answer:

D. Do all of the above.

Explanation:

Function: In computer science, the term "function" is described as a process in which it executes, then returns a specific value, and lastly resumes a particular program where the function has been called or initiated. Thus, in the "programming system," a specific named section associated with a program is present that is responsible for performing some specified tasks and is denoted as a "function". In other words, the function is referred to as a kind of routine or procedure.

In the question above, the correct answer is option-D.

Write a program to compute the area of a circle some 'n' times. You must accept n and r from the user. Area is calculated using (22/7.0)*r*r - where r is the radius. Implement using value-returning functions. Hint: create a function to calculate area taking r as a parameter. In the main() function, ask for n and create a loop where you input r and invoke the area function n times.

Answers

In python:

def calculateRadius(r):

   return (22 / 7) * r * r

def main():

   quantity = int(input("How many times do you want to calculate the are? "))

   radius = float(input("What's the radius of your circle? "))

   i = 0

   while i < quantity:

       calculateRadius(radius)

       i += 1

if __name__ == "__main__":

   main()

I hope this helps!

Which of the following projects is most likely be used in STEM education to learn technology concepts?


test different sandbag materials that can help prevent flooding

analyze cleaning products to determine which ones are eco-friendly

investigate search engine criteria to improve search results

conduct a scavenger hunt to see who can find the most geometric shapes

Answers

Answer:

C.)

investigate search engine criteria to improve search results

Explanation:

I go to a STEM school, though the others are good options and are stuff we may do, they wouldn't help to teach technology concepts.

List the name and purpose of twenty (20) different C++ commands.

Answers

Answer:

Drivers and help a new program to run

Are their ethical issues to consider when planning a database? For example, should personal data, such as medical information be stored in the same DBMS that manages employee salary and benefits data? Why or why not?

Answers

Answer:

Yes

Explanation:

When planning a database, we must actually consider legal implications.

Let's say, a database of salary and all benefits of every worker in a company. Every one who is a worker in this company, either senior or junior worker can access this information in this database.

But in a case of more personal information like medical information, it would be wrong to make it accessible to all who have access to the database. Because it may cause issues like misuse of personal informations of others. Such an information in the hands of a wrong person may be used against someone with serious health conditions.

If information are stored separately, then it won't be accessible by just anyone and it would be better for all workers as no one would possess any information he or she is not supposed to have.

Which of the following best describes the purpose of an IP address?

Answers

Answer:

IP addresses provide a unique number for identifying devices that send and receive information on the internet

Explanation:

The IP address that best describes the purpose of an IP address is IP addresses provides a unique number for identifying devices that send and receive information on the Internet. The correct option is A.

What is an IP address?

An IP address is an address of the network of computers connected to the internet. The address is a sequence of numbers that are provided by the internet servers.

The full form of the IP address is internet protocol. It is the online address that is provided by the internet provider, The address will easily recognize if the person is using the internet. This address will be connected to the computers.

Therefore, the correct option is A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet.

To learn more about IP addresses, visit here:

https://brainly.com/question/18722788

#SPJ6

The question is incomplete. Your most probably complete question is given below:

IP addresses provide a unique number for identifying devices that send and receive information on the Internet

IP addresses assist in the reconstruction of a message that has been divided into many packets

IP addresses indicate the location where an internet-connected computing device was manufactured

IP addresses indicate how many times an individual packet has been requested by a router

Can hackers actually hack into a built in camera on a laptop?

Answers

Answer:

Most of us have a camera built into our phone, tablet, laptop, or a desktop webcam we use for work, study or virtual socialising. Unfortunately, this privilege can leave us vulnerable to an online attack known as camfecting. This is when hackers take control of your webcam remotely.

Answer:

yes

Explanation:

how can I write 3*3*3=27 in C langueg

Answers

Answer:

x³ - 27 = 0

-Astolfo

Each element in a dictionary has two parts: a key and a value. You use a key to locate a specific value.
a) True
b) False

Answers

Answer: TRUE

Explanation:

Elements in a dictionary are usually composed of two parts ; the key which could be viewed as the file name used to store the value. In general a dictionary written in the pattern; {key : value}. A certain value can be located, modified, deleted and added to a dictionary by using the dictionary key attached to each value in the dictionary object created. Each dictionary key should be unique and will be a string of letters which holds a particular value.

Create an IF function in which the logical_test argument determines if there are 8 or more seats. Use Yes for the value_if_true argument. Use No for the value_if_false argument. (If you type the formula, enclose the text arguments within quotation marks.)

Answers

Answer:

See explanation

Explanation:

To answer this question, I'll assume the following.

The application package is Microsoft Excel and the column with the seats is A1 (could be anything)

Hence: The IF Function is as follows;

=IF(A1 >= 8, "YES","NO")

Analyzing the above, we have:

=IF( --- This specifies the function

A1 >= 8,  --- This states the logical test

"YES", --- This represents the condition if true

"NO" --- This represents the condition if false

The IF function in Microsoft Office Excel is used to perform conditional operations.

The required IF function is: =IF(A1 >= 8, "Yes","No")

The syntax of an IF function is:

=IF([logical_expression],[value_if_true],[value_if_false])

Where

logical_expression represents the expression to comparevalue_if_true and value_if_false are the values that will be returned if the condition is true or false

From the question, we have:

The logical_expression is: A1 >= 8The value_if_true is "Yes"The value_if_false is "No"

Hence, the IF function is: =IF(A1 >= 8, "Yes","No")

Read more about Microsoft Excel formulas at:

https://brainly.com/question/2198360

what is a compter software​

Answers

Answer:

Software, instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. ... A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be really used on its own.

Hope this helps!!

What is the best pokemon game?

Answers

Answer:

all of them

Explanation:

Answer:

i had the most fun playing omega ruby

Explanation:

Xbox or Playstation? I wanna know why with a valid reason {:^)

Answers

There both good but playstation because on xbox you have to have a gamepass to play most games on there for ps4 you dont and the controllers don’t need batteries

how many years of prior experience in tech support do most MSP positions require?

Answers

Answer:

1

Explanation:

you need at least one year, (google says so)

For MSP positions, experience in tech support must have at least one year of prior experience.

What is tech support?

It is a service provided by a hardware or software company which provides registered users with help and advice about their products.

To work as a technical support, one must be experienced enough to understand the software and hardware complete terms.

Thus, most MSP positions require one year of prior experience.

Learn more about tech support.

https://brainly.com/question/6955119

#SPJ2

Data becomes _______________ when it is presented in a context so that it can answer a question or support decision making.

Answers

Answer:

Information

Explanation:

Data becomes information when it is presented in a context so that it can answer a question or support decision making.

Data comes in raw forms which is as a result of studying a particular behavior or pattern over time.

By processing data, we are trying to get appropriate meaning from the raw forms that we have.

When we arrive at a conclusion based on these raw data, then we primarily have deduced information from the data

It is thus information that helps answer a question or appropriately support making of decisions

Website managers use
every day.

Answers

Answer:

google

Explanation:

hsjsjwjwwjajakakaka

What is the best way to describe eNotes?

A.it is a tool students can use to take notes during an online lesson

B.it provides access to an extensive back up system on the nternet

C.It allows students to clip a portion from a webpage for later use.

D.It is a tool for storing images and recordings in one location.​

Answers

Answer:

A.it is a tool students can use to take notes during an online lesson

Explanation:

ENotes is a tool used to take notes, particularly targeted towards online learners. Note-taking generally help students to possess a far better understanding of what they learn. It also helps the scholars to enhance their writing skills. There are many sophisticated and straightforward note-taking tools available on the market.

Answer:

(A) It is a tool students can use to take notes during an online lesson.

Explanation:

what are the three component parts
of floating point number

Answers

Answer:

IEEE floating point numbers have three basic components: the sign, the exponent, and the mantissa. The mantissa is composed of the fraction and an implicit leading digit (explained below).

Explanation:

[tex]hii[/tex]hope this helps you ✌️

Why do schools block literally evrything?

Answers

Don’t know but butter dawg is better than school

Answer:

I'm wondering the same thing because I'm a pro at cool math games but don't know how to a arithmetic sequence

Jenny is preparing a presentation on the health statistics of the 10 most populated countries. She wants to apply a blinking effect to the names
of the countries, and a motion effect between the exit and entry of every slide. Which options should she use?
Jenny should use the v option to apply a special blinking effect to the names of the countries and the
option to
apply a motion effect between the exit and entry of every slide

Answers

Answer:

Jenny opens presentation software and insert data in slides

then, click on country names one by one and apply animations as you want, to apply animation on text. animation are occur in animation tab. Different type of animations are found in animation section such as blinking, fade , Wipe, Fly in etc.

After applying animations on country names

Secondly, You apply motion effect on exit and entry  of every slide.

Select slide on which you want to apply motion effect then click on Transitions tab and apply that motion effect as you want. the effect will apply on this slide.

If you want to apply same motion effect on all slide then you will first select all slide and then apply desire motion effect.  

The motion effect will apply on exit and entry of every slide.

Explanation:

Answer:

Jenny should use the Animation option to apply a special blinking effect to the names of the countries and the Transition option to apply a motion effect between the exit and entry of every slide.

Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.

Answers

Answer:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

   print("You are old enough to drive. \n")

else:

   print("Still taking the bus, I see. \n")

   

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

   print("That is good to hear.")

elif(feel == "Sad"):

   print("I'm sorry to hear that. ")

else:

   print("Oh my!")

   

print("Tell me more. \n")

next=input("")

import random

r = random.randint(1, 3)

if(r==1):

   print("Sounds interesting. \n")

elif(r==2):

   print("That's good to hear. \n")

else:

   print("How unusual. \n")

print("Well, " + name1 + ", it has been nice chatting with you.")

Explanation:

This worked for me.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

  print("You are old enough to drive. \n")

else:

  print("Still taking the bus, I see. \n")

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

  print("That is good to hear.")

elif(feel == "Sad"):

  print("I'm sorry to hear that. ")

else:

  print("Oh my!")

print("Tell me more. \n")

See more about python at brainly.com/question/26104476

guys can u guys help me write the program plz

Answers

public class MyProgram{

   public static void main(String [] args){

       System.out.println("*****");

       System.out.println(" ****");

       System.out.println("  ***");

       System.out.println("   **");

       System.out.println("    *");

   }

}

That's all there is to it. I hope this helps!

According to Get2 College, which of the following can you receive text messages about as a high school senior?

Answers

Answer:

A scholarship

Explanation:

how can i hide my browsing history from internet service provider??? for free:)​

Answers

There are several technologies to hide your browsing history from an internet service provider. The most private is the Tor Network. You can install it from the Tor Project (just search the web to find it). Alternatively, you can try a VPN (will probably cost money) or a proxy (many are free, but often poorer quality).

Please mark as Brainliest!

answer:

yes! use any mobile vpn app (there are about 4 free ones) & that should block anyone including your internet service provider from knowing your location or what you do on your phone!

explanation:

hope this helped!

i answered your question & hope you have a great day!

pls give me brainliest <3

Other Questions
WILL GIVE BRAINEST! write a sentence using a indefinite pronoun One example of an environmental factor that might influence organism growth is:amount of waterOright or left handedness How did the Columbia Basin Project benefit Washington? Check all that apply.A:It brought water to almost 700,000 acres of land.B:It developed the states infrastructure quickly.C:It created new reservoirs, canals, and dams.D:It helped agriculture to grow in the region.E:It provided government loans to farmers. 2. Simplify the expression: 5 x 6 + 6 = 6 - 12 x 2c. 6a. 4b. 5d. 7 Henry Louis Gates says that David Levering Lewis called the Harlem Renaissance "art as civil rights." What does Lewis mean and why does Gates bring this up? The civil rights movement began when Harlem Renaissance writers took to the streets in protest. The writers and artists of the Harlem Renaissance sought to gain rights by proving their humanity. The writers of the Harlem Renaissance facilitated the demand for civil rights by focusing on the disadvantages of blacks in their art. The civil rights movement occurred in tandem with the integration of whites and blacks in Harlem. Whats The answer I'll mark brainliest to the first ONE WHO GETS IT CORRECt I need help with the operation management assignment plz 4. The time needed to complete the final exam in statistics at CAU is normally distributed with a mean of 90 minutes and a standard deviation of 10 minutes.What is the probability that the exam will be completed in one hour or less How are responses not a type of tropism? The slope is ___orThe slope is undefined Hurry please, I am being timed!Identify the fraction that is not equal to a repeating decimal.A. 1/9B. 3/11C. 3/20D. 7/12 The measurement of an object's mass is a ____. Is 0.3 a rational number i will give brain quick how much water will fill after 1 second How did the locations of missions change over time? What happens to the acceleration of a system when the mass of the system increases but the net force stays constant? Victor runs three laps around the track every five minutes to complete the table to show the relationship between the number of laps and time spent running. write your answers in the blank This is a photo of a famous movie archaeologist named Indiana Jones. What does and archaeologist study? Last year 10 teachers went on the 8th grade field trip to six flags, they used 3 school buses to transport the teachers and the 85 students who were able to attend. what is the student to the teachers ratio Your estimate of the market risk premium is 5%. The risk-free rate of return is 4%, and General Motors has a beta of 1.5. According to the Capital Asset Pricing Model (CAPM), what is its expected return