Stores of data that are so large or complex that it is difficult to process them using traditional database management applications are known as ______.

Answers

Answer 1

Answer:

Big Data

Explanation:

From Oracle:

"The definition of big data is data that contains greater variety, arriving in increasing volumes and with more velocity. Put simply, big data is larger, more complex data sets, especially from new data sources. These data sets are so voluminous that traditional data processing software just can't manage them."


Related Questions

Brainy users come back and answer some questions some of us really need help get your ponits today and you will feel good mean while you answer questions other people might have.!

Answers

Answer:

of course we will answer any question at any time

HELP URGENT
When programming, which of the following is true of the editor? A. It is a person who checks your work for spelling errors. B. It is where you write your program and run it. C. It is a coding language. D. It is a program that checks for grammatical errors.

Answers

Answer:

D. It is a program that checks for grammatical errors.

You have a coworker who frequently sends rude and inappropriate comments to the group instant
message platform. Which of these topics should your supervisor address with this coworker?
O collaboration
O resource management
O netiquette
O globalization

Answers

Answer: globalization

Explanation: because telling the boss will tell them why they shouldn’t do that because how it would it effect them later in life and how it would infect people too

Permissions granted from an individual for the use of a likeness is known as a

- likeness release
- location release
- model release
- media release

Answers

likeness release is the term known when a person grants you the ability to use a picture of them

10. What is the value of favorite Animal after the code below is run?
animals = [ 'dog', 'cat', 'cow', 'pig' ]
favoriteAnimal = animals[2]
[1 point]
O a. dog
O b.cat
O c. cow
O d. pig

Answers

Running the code

animals = [ 'dog', 'cat', 'cow', 'pig' ]

favoriteAnimal = animals[2]

will give a result of

"cow"

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol

Answers

Answer:

What kind of question is this?! It's likely that every answer is technically right.

Explanation:

Signals being sent take place over everything. The answer you're looking for is most likely the Transport Layer though. TCP is connection-orientated.

While you are using some files on a workstation running Linux, you determine that a few of the files seem to be corrupted. What should you do

Answers

The best thing to do is to close all files and applications and run fsck.

What is an Application?

This is defined as a computer program designed to carry out a specific task and is used by end-users.

When few files seem to be corrupted, it is best to close all applications and run fsck command as it helps to check and interactively repairs inconsistent file systems.

Read more about Corrupted files here https://brainly.com/question/2596545

Which of the following is an example of a JavaScript property?
A. window
B. border
C. document
D. table

Which of the following is an example of a JavaScript object?
A. background color
B. border
C. color
D. window

Answers

D. Window

Explanation:

Its because everything is an object in Java script

Why is it necessary to be familiar with Microsoft Excel?

Answers

Answer:

It is necessary to be familiar with Microsoft Excel because you will be using it throughout your school years. If you don't no how to use Microsoft Excel you will have an hard time doing your assign paper you need to get done.

Explain the importance of electronics on our daily lives”? 5 sentences minimum

Answers

Answer:

through electronics we have a electrified lighted world. our homes,are lit with light using electricity. the stereo we listen to, electricity makes it happen. tv,computers, and record turntables all need electricity. electricity makes things possible that would otherwise be either impossible or very arduous. we see sounds and enjoy them. we watch entertaining movies. we read books and do our homework with the appreciated help of electricity.

Explain why not having a driver for the old printer is a problem​

Answers

Answer:

Because you won't be able to print anything without it, because there would be no connection to the printer

Etna works on many projects. As she creates a new project file, she goes to the File tab, selects Options, and then goes to the advanced category for the General section to check a box. What is she trying to do

Answers

What Etna is trying to do by going to the file tab and the general section is to Create a new file with a set of parameters.

Steps to creating a new file.

In order to create a new file you have to do the following:

You have to go to the file tab.Then you go to click optionsThe next is the advanced categorythe checkbox is located in the general section.

Following all of the steps that are listed above would help Etna as she works on her project.

Read more on ways to create files here:

https://brainly.com/question/25554117

Complete the sentence.
Accessibility benefits______

• everyone
• people with impairments

The goal of accessibility is to provide_________

• access for as many people as possible
• access for 100 percent of users


Answers

Answer:

Complete the sentence.

Accessibility benefits______

• everyone

• people with impairments✔

The goal of accessibility is to provide_________

• access for as many people as possible✔

• access for 100 percent of users

I put a tick in the answer

Answer:

people with impaired,

access for as many people as possible

Explanation:

what is the salary for an average software dev?

Answers

Answer:

$73,213

Explanation:

Answer:

500

Explanation:

maybe ldk I'm not a electronic seller





Why are volt guards necessary to connect with the computer? .:​

Answers

It prevents our computer system against sudden power surge. ... As we have known that our computer needs voltage between 220 to 240 volts and high or low voltage affects our computer, Volt Guard plays important role to save our computer system from damage due to high voltage.

A popular game allows for in-app purchases to acquire extra lives in the game. When a player purchases the extra lives, the number of lives is written to a configuration file on the gamer's phone. A hacker loves the game but hates having to buy lives all the time, so they developed an exploit that allows a player to purchase 1 life for $0.99 and then modifies the content of the configuration file to claim 100 lives were purchased before the application reading the number of lives purchased from the file. Which of the following type of vulnerabilities did the hacker exploit?
a. Sensitive data exposure.
b. Dereferencing.
​c. Broken authentication.
​d. Race condition.

Answers

Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is d. Race condition.

What is a race condition?

This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.

This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.

In conclusion, option D is correct.

Find out more on the race condition at https://brainly.com/question/13445523.

What is the primary tool that retrieves data and helps users graphically design the answer to a question

Answers

Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

What is Query by Example?

It is a database query language where the first results presented are those that the search engine considers the most relevant for the search carried out.

It is characterized by having a system for ranking and ordering search results that allows the user to return more relevant results.

Therefore, we can conclude that Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

Learn more about Query by Example (QBE) here: brainly.com/question/7479160

Create a list that will contain 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom”.

Answers

A list that contains 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom” is as follows:

list1 = ["badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "mushroom" "mushroom"]

Code explanation

List are used to store multiple items in a variable. The items stored accommodate different datatype. List are represented with a square bracket "[]". The elements stored are placed inside the square brackets.

The python list is stored in the variable list1The python list has the first 12 elements as "badger" and the last two elements as "mushroom".

learn more on list here: https://brainly.com/question/24941798

for what work photoshop is used?

Answers

its for making commercials and background that look cool
Adobe Photoshop is a software used for editing photographs, compositing digital art, animating, and graphic design

What information most likely presents a security risk on your personal social networking profile?.

Answers

Answer:

Your personal social networking profile may pose security risks if you post certain information publicly. Individuals' Personally Identifiable Information (PII) or Protected Health Information (PHI) is considered to be PHI.

Explanation:

hope this helps!!!!!

The information that is most likely presents a security risk on your personal social networking profile is birthday and hometown. The correct option is B.

Your birthday and hometown are the two pieces of information on your personal social networking page that most likely pose a security issue. Malicious persons may use this information to pose as you or obtain unauthorised access to your accounts.

Through identity theft or phishing scams, attackers may try to use your birthdate to access sensitive information about you, like your social security number or account passwords.

Your online accounts could be compromised if someone uses information about your hometown to crack passwords or figure out security questions.

To safeguard your privacy and improve your online security, you should exercise caution while disclosing such sensitive personal information on social media networks.

Thus, the correct option is B.

For more details regarding social networking, visit:

https://brainly.com/question/29708102

#SPJ6

Your question seems incomplete, the probable complete question is:

What information most likely presents a security risk on your personal social networking profile?.

A) Status

B) Birthday and hometown

C) List of favorite movies and music

D) Number of friends and followers

Which of the following can be used to enter or display one complete row of information in a range or table
without scrolling horizontally?

Answers

End users can use database tools to enter or display one complete row of information in a range or table on Microsoft Excel without scrolling horizontally.

What is Microsoft Excel?

Microsoft Excel can be defined as a software application that was designed and developed by Microsoft Inc., for analyzing and displaying (visualizing) spreadsheet documents by using rows and columns in a tabulated format.

In Microsoft Excel, end users can use database tools to enter or display one complete row of information in a range or table on Microsoft Excel without scrolling horizontally. Some examples of these database tools include:

PivotTablesExcel Tables

Read more on database here: brainly.com/question/26053797

Answer all the questions correcty and the first answer get to be marked brainliest!!!!!!
1. ___________________ is a sort of advertisement that disturbs your Web browser by
appearing in a separate window on the top of your current window.
2. The ____________________ is a quick and easy way to create new objects in MS
Access.
3. _________________ present data from tables and queries in an attractive format.
4. . A __________________ is a column in a table that contains a specific piece of
information within a record.
5. What is the storage capacity of a free Picasa account?
6. What displays the current record number and navigate to other records?
7. Name any five tools present in MS Access Window.
Need it now!!!

Answers

allowed public advertisement

opening a new database

column format

database record

1gb

the navigation button will show the current record and the correct no.

table,querie,relatinship,macros,forms

instead of selecting a _________ and destination, I just click on the area.

Answers

url is the answer

hope this helps

scav

Which type of shape allows you to add text that can be moved around.

Answers

Answer:

Move a text box, WordArt, or shape forward or backward in a stack. Click the WordArt, shape, or text box that you want to move up or down in the stack. On the Drawing Tools Format tab, click either Bring Forward or Send Backward.

If you intercept a message that has been encrypted using a Caesar Cipher, what is the maximum number of times you would need to guess-and-check different keys for the cipher before cracking it

Answers

The maximum number of times you would need to guess-and-check different keys for the cipher before cracking it is; 25 times

Encryption and Decryption of Caesar Cipher

The Caesar Cipher is a type of shift cipher. Shift Ciphers work by using the modulo operator to encrypt and decrypt messages. The Shift Cipher has a key K, which is an integer from 0 to 25.

To encrypt a message, you just enter the message in the Plaintext textbox, specify the shift, and click Encrypt. However, to decrypt a message, enter the message in the Ciphertext textbox, specify the shift, and click Decrypt.

Now, For Caesar's Cipher there are only 25 possible ways to shift the alphabet and as such that is the maximum number of times you can guess and check.

Read more about Caesar Cipher at; https://brainly.com/question/14298787

Your best strategy would be to use a heuristic if ________ is most important; your best strategy would be to use an algorithm if ________ is most important.

Answers

Answer:

First blank : Time

Second blank : Being right

Knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network. This reflects

Answers

An subject of distributed representation relates to when some knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network.

What is distributed representation?

In technology, distributed representation refers to similar data features across multiple interdependent layers.

In conclusion, the subject of distributed representation relates to when some knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network.

Read more about distributed representation

brainly.com/question/17673062

Which of the following can be used to enter or display one complete row of information in a range or table
without scrolling horizontally?

Answers

Answer:

A. Create

Explanation:

I just took the test for Microsoft Access the answer to Which of the following can be used to enter or display one complete row of information in a range or table without scrolling horizontally? is Create

The one that can be employed to show an entire row containing information in a table would:

Data Form

What is Data Form?

The data form is described as the source in Microsoft Excel that offers the user an option to either enter or show a whole row having details or information without even scrolling the cursor west to east or horizontally.

This option has made the data editing very convenient and quick for the users and made the process more effective and efficient.

This is very useful with this option as one can continue data entry more easily as it helps in keeping records more quickly.

Thus, the above response is correct.

Learn more about "Table" here:

brainly.com/question/14231889

Legends are titles given to three-axis X, Y, and Z-axis. True or false?

Answers

Answer:

true the legends are the names on each side of the chart that show what the chart shows

true

Hope This Helps!!!

In a 100m sprint, identify some of the phases that you would see the athlete complete?

Answers

Answer:

in a 100m sprint identify some of the phases

Other Questions
PLEASE HELP THE TEST IS DUE AT 11:59PM24 p and 25 e is a negative atom because it has one electron and became For a project in his Geometry class, Nathaniel uses a mirror on the ground to measure the height of his schools flagpole. He walks a distance of 7.95 meters from the flagpole, then places a mirror on flat on the ground, marked with an X at the center. He then steps 1.15 meters to the other side of the mirror, until he can see the top of the flagpole clearly marked in the X. His partner measures the distance from his eyes to the ground to be 1.65 meters. How tall is the flagpole? Round your answer to the nearest hundredth of a meter. What does this graph mean? explain in brief about family planning for prosperous family life. Which exponential function matches the table?01234f(x)2793113A. f(x) = 27(3)*=OB. f(x) = 27(3)*OC. f(x) = 3(1)3*O D. f(x) = 27(0)*C.= How do Ozymandias and the Prelude compare? In world war ii, one of the primary american commanders in the pacific was. why do scientists break the biosphere into categories like species population community ecosystems and biome when conducting studys Label L, U, N, A with the correct angles. please help! (NO BOTS!) The large band of muscle that controls the size of the chest cavity. Why was the battle of Trenton important to the American revolutionary cause? A. It convinced the French kind to support the AmericansB. It proved that Americans could fight in the European styleC. It improved patriot morale due to American victoryD. It was the last major battle of the American revolution Explain how frequency, wavelength, and energy are related to each other. Drag the tiles to the correct boxes to complete the pairs.Match the stages to their features.low birth rates, death rates are constanthigh birth rate and death ratehigh birth rate and low death ratePre-modernMature industrialIndustrialization Can anyone help me with this Identify the choice that best answers the question.1.) In Act 1 of The Tragedy of Macbeth, how does Macbeth become the Thane ofCawdor?a. He receives the title from the king after defeating the previous Thane of Cawdor in battle.b. He inherits the title from his father, who served King Duncan.c. The witches use a spell to make him the Thane of Cawdor.d. Lady Macbeth has him assassinate the previous Thane of Cawdor and seizethe title.2. What do the three witches predict in Act I of The Tragedy of Macbeth?a. Lady Macbeth will kill Banquo.b. Macbeth will become king.c. Lady Macbeth will bear only male children.d. Macbeth will win an important military battle.3. Choose the statement that best describes King Duncan in Act I of The Tragedy of Macbeth.a. He is conflicted about giving his power to Malcolm.b. He places a high value on bravery and loyalty.c. He is reluctant to join his troops in battle.d. He is a well-meaning but weak leader.4. Which of the following phrases best describes Macbeth's feelings about possibly assassinating King Duncan, as revealed in Act I of The Tragedy of Macbeth?a. relentless guiltb. growing confidencec. determined ambitiond. tortured ambivalence5.) At the end of Act 1 of The Tragedy of Macbeth, what is l Lady Macbeth's plan?a. She wants Macbeth to challenge King Duncan's right to the throne.b. She will put poison in the wine she serves King Duncan.c. She and Macbeth will kill King Duncan and his men as they sleepd. She will flatter King Duncan and convince him to name Macbeth his successor.Identify the choice that best answers the question.6.) What is the definition of assault as it is used in this sentence?When a newspaper published an assault on her record, Mayor Davis was quick to defend her actions.a interferenceb. approvalc. analysisd. attack7.) Which of the following situations best illustrates the meaning of flout?a. Nervous about his exam results, Liam counted the moments until the results would be posted.b. Excited to have the chance to pinch-hit in the big game, Diego got to the ballpark early.c. In defiance of the lights-out rule, Min turned on her flashlight to read in bed.d. Alyssa showed off her favorite jacket, which she had designed herself.8.) If a tiger is living in captivity, which of the following must be true? Base your answer on the meaning of captivity.a. The tiger is roaming at large in the wild.b. The tiger is about to have a litter of cubs.c. The tiger is confined within a certain area.d. The tiger is under the care of a veterinarian.9.) In the opening moments of The Tragedy of Macbeth, Act I, the witches chant, "Fair is foul, and foul is fair. Macbeth's own first dialogue in the play is "Sofoul and fair a day I have not seen." Which statement best explains the effect ofMacbeth's unconscious echo of the witches' chant?a. It proves that Macbeth has overheard the witches' conversation.b. It suggests that Macbeth's fate is tied to the witches' predictions.c. It indicates that the witches have been hired to follow Macbeth's orders.d. It reveals that the witches are accomplices in the plot to murder Duncan.10. The following question has two parts. Answer Part A first, and then Part B. Part A In Scene ii of The Tragedy of Macbeth, Act I, several characters discussMacbeth's role in the battle. Part A: According to their view, which of the following best describes Macbeth?a. He is cowardly and treacherous.b. He is cautious and prudent.C. He is decisive and forceful.d. He is logical and practical.Part B : Which quotation from Act I best supports the answer to Part A?a. Captain. Doubtful it stood. / As two spent swimmers, that do cling together / And choke their art.b. Captain. For brave Macbethwell he deserves that name / Disdaining fortune, with his brandished steel, ... / Like valor's minion carved out his passage / Till he faced the slave....C. Ross. That now/Sweno, the Norways' king, craves composition; / Nor would we deign him burial of his men / Till he disbursed ... / Ten thousand dollars to our general use.d. King. No more that Thane of Cawdor shall deceive / Our bosom interest: go pronounce his present death, / And with his former title greet Macbeth.11.) In The Tragedy of Macbeth, Act I, after the Thane of Cawdor is executed for treason, Duncan makes this comment.There's no art To find the mind's construction in the face:He was a gentleman on whom I builtAn absolute trust.Which of the following best describes the effect of this speech?a. It increases sympathy for Macbeth by showing that Duncan is not a wise or capable monarchb. Increases tension by indicating that Duncan is unlikely to discover the plot against himc. It Decreases sympathy for Duncan by showing that he is not very intelligentd. it decreases tension by giving away the likely outcome of the tragedy ,/,/,/,//,/,/,/,//,,,,,,///,,/,///,/,,/,,/,/,/,/,, what temperature is 2C higher than normal body temperature Which of these is NOT a characteristic of eutrophication?high oxygen levelshigh nitrogen levelsthe massive growth of algaedying out of fish species Answer it for me plz, its in Spanish In some school kitchens, one problem for worker safety is that ovensO are at a low level and require heavy lifting from a position lower than the kneesO do not workOmay explodeO are too high for workers to reach