subject
Computers and Technology, 23.09.2019 17:20 Rusven

Which of the following is true about unstructured data? a. computer logic programs can identify and extract patterns in it. b. it must be analyzed manually. c. it is more likely to come from direct sources than indirect sources. d. it is less valuable than structured data in terms of providing insights into customer behavior. e. it cannot be combined with other data sources.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 23:30
To check spelling errors in a document, the word application uses the to determine appropriate spelling. internet built-in dictionary user-defined words other text in the document
Answers: 1
question
Computers and Technology, 23.06.2019 03:30
Ihave a singular monitor that is a tv for my computer. recently, i took apart my computer and put it back together. when i put in the hdmi cord and booted the computer to see if it worked, the computer turned on fine but the screen was blue with "hdmi no signal." i've tried everything that doesn't require buying spare parts, any answer is appreciated!
Answers: 1
question
Computers and Technology, 23.06.2019 09:50
Allison and her group have completed the data entry for their spreadsheet project. they are in the process of formatting the data to make it easier to read and understand. the title is located in cell a5. the group has decided to merge cells a3: a7 to attempt to center the title over the data. after the merge, allison points out that it is not centered and looks bad. where would the title appear if allison unmerged the cells in an attempt to fix the title problem?
Answers: 2
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
You know the right answer?
Which of the following is true about unstructured data? a. computer logic programs can identify and...
Questions
question
Mathematics, 31.08.2019 08:30
question
Mathematics, 31.08.2019 08:30
question
Social Studies, 31.08.2019 08:30
question
Mathematics, 31.08.2019 08:30
question
Mathematics, 31.08.2019 08:30
Questions on the website: 13722362