Answer:
please can you make this question make sence so i can at least try to help by answering this question for you
why we use cluster computing and hadoop framework for big data sysetm
Answer:
Explanation:
Hadoop clusters can boost the processing speed of many big data analytics jobs, given their ability to break down large computational tasks into smaller tasks that can be run in a parallel, distributed fashion.
organizational behavioural aspects
Answer:
Organizational behavior aspects are the points of view represented by external environments, including people and technology. We can make improvements to our physical aspects by using this particular aspect to understand how everyday elements interact with one another.
A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-time adjustments to service delivery. Which technology would the business combine with its current cloud operations to make this possible
The technology would the business combination with its current cloud operations to make this possible are ERP and loT.
What is the ERP?Enterprise resource planning (ERP) refers to a shape of a software program application that companies use to manipulate each day industrial organization sports activities in conjunction with accounting, procurement, task management, chance manage and compliance, and supply chain operations.
Given the organization has a cloud setup, we need a company solution (ERP system) which needs to be to be had to all stores and loT to build up facts from devices and deliver it over to the ERP system. This will help to connect records at some crucial databases in cloud from all the stores. There need to be record protection features as well to maintain the records intact, all profits features need to be incorporated and tested.Read more about the ERP :
https://brainly.com/question/14635097
#SPJ1
What is disability? discuss all types of disability?
Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the computer network. A new methodology for finding patterns in data that signify infections was investigated in IEEE Transactions on Information Forensics and Security (May 2013). The method uses multiple filters to check strings of information. For this exercise, consider a data string of length 4 bytes (positions), where each byte is either a 0 or a 1 (e.g., 0010 ). Also, consider two possible strings, named and In a simple single filter system, the probability that and differ in any one of the bytes is .5. Derive a formula for the probability that the two strings differ on exactly of the 4 bytes. Do you recognize this probability distribution?
Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.
The probability distribution is 1.25.
Read more about the probability distribution:
https://brainly.com/question/24756209
#SPJ1
how does abstraction make programming languages easier to use
A. It eliminates the need for codes to be automated
B. It uses calculations that all computers understand
C. It uses words instead of binary code
D. It uses letters instead of numbers
Abstraction make programming languages easier to use as It eliminates the need for codes to be automated.
How does abstraction make programming languages easier to implement?Data abstraction is known to be a tool that helps a person to change a complex data structure into simple ones which can be used easily.
Note that Abstraction make programming languages easier to use as It eliminates the need for codes to be automated.
Learn more about abstraction from
https://brainly.com/question/7994244
#SPJ1
What is returned by the code: range (20, 100, 20)
The code that is returned by the code: range (20, 100, 20) is known as (20, 50, 80).
What is this code about code?The line of code is known to be one that often returns the ASCII code as the ASCII is known as American Standard Code for Information Interchange.
Note that the code is made up of seven bit code and thus the code returned for range (20, 100, 30) is (20, 50, 80).
Learn more about code from
https://brainly.com/question/20796198
#SPJ1
How often your users’ geolocation and your geofences trigger depends on your:
age.
interface.
event models.
user base.
Answer:
user interface
Explanation:
Geofences are like virtual boundariesThey define your boundaries or limit while dealing with something virtually.They try to help in locating you or use your proximate location sometimes for privacythe building of an online presence and authority is called
A. a status update
B. social media
C. social capital
D. Web feed
Answer:
I think A sorry if wrong
Explanation:
have a good day
Answer: C, social capital
Explanation: I just did the test
3) Managers use information systems to help them make decisions that will improve their businesses. What three levels of information do managers need to make these decisions? Provide one example of how information systems can provide this data. (2 points)
The three levels of information do managers need to make these decisions are Strategic information, Tactical information, Operational information. An example of an information system to provide data is a transaction processing system.
What is an information system?An information system is a socio-technology and an organizational system that collect, organize, and provide and distribute data.
Thus, the three levels of information do managers need to make these decisions are Strategic information, Tactical information, Operational information. An example of an information system to provide data is a transaction processing system.
Learn more about information system
https://brainly.com/question/13299592
#SPJ1
Wollongong City council is interested in the growing tourism market and opens an office to launch services for people who travel on holidays and cannot look after their properties (houses or units) while they are away. This new office currently has 200 employees whose PCs are linked by a small LAN. Each PC shares files and also services (such as printing) with the others on the LAN. What type of network model is suitable to build a small LAN for this new office? How can you protect your LAN from Malware attacks?
Answer:
list five characteristics of cpu
What is the biggest advantage of flow batteries?
A. the complete simplicity and purity of the energy provided by the battery
B. their use of solid conductive material like ceramic or polymer to function
C. their ability to almost instantly recharge by replacing the electrolyte liquid while simultaneously recovering for re-energization
D. the power efficiency of their operating systems that never fail or shut down
Answer:
C. Their ability to almost instantly recharge by replacing the electrolyte liquid while simultaneously recovering for re-energization
Explanation:
The main advantage of these types of batteries is the instantaneous response time due to the energy that had been stored as circulating current.
MissSpanishDistinguish clearly between displayed and printed output and support your answer with two (2) limitation each
Answer:
refer to the above attachment!