discuss how sentiment analysis works using big data?

Answers

Answer 1
Answer:

sentiment analysis is the process of using text analytics to mine various of data for opinions. often sentiment analysis is done on the data that is collected from the internet & from various social media platforms.


Related Questions

please help me



Match the technology with the appropriate task.



1. graphics software

2. word processor

3. CAD

4. laptop

5. GPS​

Answers

Complete Question:

Match the technology with the appropriate task.

Column A

1. Graphics software

2. Word processor

3. CAD

4. Laptop

5. GPS

Column B

A. Create a company logo.

B. Get directions to a customer’s office.

C. Type a report.

D. Complete many types of tasks on a computer away from the office.

E. Design a building.

Answer:

1. A

2. C

3. E

4. D

5. B

Explanation:

1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.

2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.

3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.

4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.

5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.

Answer:

1. A

2. C

3. E

4. D

5. B

What is the difference between a programming language and natural (every-day) language?

Answers

Natural languages are used for communication between people

The ________ contains links to folders and files that Windows determines you access frequently or links that you have added.

Answers

Answer:

Quick access list

Explanation:

Normally in computers, quick access list is usually the first node in the navigation pane and it contains links to folders and files that you access frequently plus the ones that you add by yourself. Windows detects them.

Which of the following variable names follows the rules for naming variables?
A. snack $
B. favorite_snack
C. lunch time
D. 15 minute snack

Answers

D. 15 minute snack
Sorry if wrong

Give an example of an occasion when you used logic to solve a problem

Answers

you can use it when like confirming a policy

Buying a new computer for which of these reasons is most likely a sound
financial decision?
A. You liked the ad for it on TV.
B. You need it to do your homework.
O c. Your friend has one.
D. You were persuaded by a salesperson.

Answers

Answer:

b. you need it to do your homework

Explanation:

Match the stages of the desktop publishing process with the corresponding actions.

(Design, Setup, Prepress, Printing, and Content)

enter text and images

create an initial outline or draft of the artwork

choose a specific document template with appropriate DTP software

perform the tasks to get the artwork ready for printing

choose either to print or publish the product online

Answers

Answer:

Enter text and images - Content

Create an initial outline or draft of the artwork - Design

Choose a specific document template with appropriate DTP software - Setup

Preform the tasks to get the artwork ready for printing - Prepress

Choose either to print or publish the product online - Printing

--------------

Explanation:

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which statement best describes a characteristic of a relational database?

It contains tables that are completely independent of one another.

It contains tables with fields that are associated with one another.

It is a feature that is primarily used to navigate databases.

It is a feature that is primarily used to add queries to tables.

Answers

The relational database has the characteristic feature of the adjoining of data with one another.

What is a relational database?

The relational database is given as the interconnection of the data with the digital database management system.

The relational database is given with the characteristics of the adjoining of data tables and fields associated with one another. Thus, option B is correct.

Learn more about relational database, here:

https://brainly.com/question/13262352

#SPJ2

The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.

a
Conclusion
b
Introduction
c
Counterclaim
d
Topic Sentence
Question 9 (5 points)

Answers

Answer:

D. Topic Sentence

Explanation:

How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three

Answers

Answer:

one i think

Explanation:

What is the output of the following program

#include

int toronto (int x)

{

int w;
if (x == 0) w = 1; else w = toronto (x-1);
return (w);
}
int main (void)
{
int a = 2;
printf ("%d", toronto (a));
return (0); }

a. 0
b. 1
c. 2
d. -1
e. none of these

Answers

Answer:

The output is 1

Explanation:

Analysing the flow of program (We start from the main method)

The main begins here

int main (void) {

This line declares a as integer and also initializes it to 2

int a = 2;

This line passes 2 to the function names toronto and also prints the result of the function

printf ("%d", toronto (a));

return (0); }

The toronto function begins here.

Note that the function receives 2 as its argument and this is saved in variable x

int toronto (int x) {

This declares w as integer

int w;

If x is 0, w equals 1

if (x == 0) w = 1;

If otherwise

else

This reduces x by 1 and performs a recursion

w = toronto (x-1);

return (w);

}

Because of the structure of the if condition in the toronto function, the function will be repeated until x is 0.

And when x = 0; w = 1

This returns w (i.e. 1) back to the main function where 1 is printed as the output

return (w);

Which of these method of ArrayList class is used to obtain present size of an object/

a. size()
b. length()
c. index()
d. capacity()

Answers

Answer:

The method of ArrayList class which is used to obtain the present size of an object is:

a. size()

Explanation:

In ArrayList, the size() method provides the number of objects available in the collection, array, or list.  In Java programming, ArrayList forms a part of the collection framework and has a set of methods to access elements and modify them.  An ArrayList does not have a fixed-size data structure, unlike an Array, but continues to expand in size.

The plugin that changes Jenkins to use green balls instead of blue for successful builds is ________.

Answers

Answer:

The answer is below

Explanation:

Jenkins is a server used by developers to to reliably build, test, and deploy their software. Jenkins has different plugins that can be used for this testing.

Jenkin green ball plugin changes jenkins to use green balls instead of blue for successful builds. This green ball plugin is used as an alternative for blue ball builds and it does not affect the output of the XML and JSON APIs.

How the python programming interesting for non programmers?

Answers

Answer:

The python programming language is interesting for non-programmers as it is easy to learn the syntax.  It has extensive libraries that can support every action of the non-programmer and programmer.

Explanation:

Python as a programming language has proved to be the easiest to learn and use.  It is also powerful and versatile, making it the best choice for all beginners and experts.  The readability of the Python language also makes it a great first programming language to learn.  It enables one to think like a programmer and not waste time over any confusing syntax.  Another great advantage possessed by the Python language is that it is easy to download and install for use.

which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization​

Answers

Answer:

the answer is communication abd organization

The option that is not a type of operating system software is called; D: Communications and organization​

What are the types of Computer operating system?

An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.

The most popular Operating Systems for computers are Windows, Linux,  Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.

Read more about Computer Operating System at; https://brainly.com/question/1763761

#SPJ9

Which is an example of a technology that has changed the safety of humans?
A) a bicycle

B) a window

C) a rope

D) a baseball bat

Answers

Answer:

B

Explanation:

because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city

What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources

Answers

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.

What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?

Answers

Answer:

Nothing

Explanation:

If a seperator value is provided as an argument within the split() method and the string does not include that value then the string will remain the same and will not be split. If no value is provided as an argument within the split() method, then the string that the method is being applied to will automatically be split in every space character (" ") that exists within it. This is the default value of split() when no argument is passed to it.

when you tried to login to server your trail may faild this failure event is recorded in

Answers

Real time not online time...

Text refers to:

A. all forms of printed media
B. any collections of words.
C. Printed, visual, and audio media.
D. written information only.

Answers

Answer:

B

Explanation:

Can you sort by reading the string in reverse in python?

Answers

Explanation:

# Let our string is brainlycom

Main = "brainlycom"

# First we will print the original string.

print("The original string : " + str(Main))

#Now Reverse Sort a String

Reverse_Sort= ''.join(sorted(Main, reverse=True))

print("String after reverse sorting : " + str(Reverse_Sort))

After running the above code you will get the result:

The original string : brainlycom

String after reverse sorting : yronmlicba

rheumatoid arthritis is caused when​

Answers

Answer:

caused by the immune system attacking healthy body tissue.

Explanation:

all though they are not sure what triggers it

Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."

what type of device is a projector ?
a. input
b. memory
c. output
d. storage

Answers

Answer:

output

Explanation:

if I'm wrong sorryyy

Answer:

Output

Explanation:

:D

Review the advantages of database management systems in the Connolly textbook. Which two advantages do you think are the most important

Answers

Answer:

The two advantages of database management systems that are the most important are:

1. Data sharing: Database management systems enable data to be shared among users from different locations.  It provides access to many users of the data, who can make specific data requests to meet their information needs.

2. Data consistency: Database management systems make it possible for all users to have the same data.  It eliminates the problem of inconsistent data for decision making.

Explanation:

Basically, a Database Management System (DBMS) is defined as the software that enables end-users to create, read, update, delete, and access data in each database.  Among the most notable advantages of Database Management System (DBMS) are improved data sharing and security, minimized data inconsistency, better data integration, improved data access, improved decision making, and increased end-user productivity.

NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?

display name

alias

relationship

primary key

Answers

Answer:

relationship

Explanation:

Answer:

I agree the should be C)relationship

Explanation:

edg 2021

A counter is ?

A. used only outside of the loop

B. none of the above

C. a variable used in a loop to count the number of times an action is performed

D. A person with a pen and paper

Answers

Answer: In digital logic and computing, a counter is a device which stores (and sometimes displays) the number of times a particular event or process has occurred, often in relationship to a clock. The most common type is a sequential digital logic circuit with an input line called the clock and multiple output lines.

WHat is 100 digits of pi?

Answers

Answer:

3.1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923078164 0628620899 8628034825 3421170679

Answer:

And now

AsapSCIENCE presents-

100 digits of π

3.14159, this is π

Followed by 2-6-5-3-5-8-9

Circumference over diameter

7-9, then 3-2-3

OMG! Can't you see?

8-4-6-2-6-4-3

And now we're on a spree

38 and 32, now we're blue

Oh, who knew?

7, 950 and then a two

88 and 41, so much fun

Now a run

9-7-1-6-9-3-9-9

Then 3-7, 51

Half way done!

0-5-8, now don't be late

2-0-9, where's the wine?

7-4, it's on the floor

Then 9-4-4-5-9

2-3-0, we gotta go

7-8, we can't wait

1-6-4-0-6-2-8

We're almost near the end, keep going

62, we're getting through

0-8-9-9, on time

8-6-2-8-0-3-4

There's only a few more!

8-2, then 5-3

42, 11, 7-0 and 67

We're done! Was that fun?

Learning random digits

So that you can brag to your friends

Explanation:

Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace. She visits a library and a museum in Cairo to check the authenticity of the items. What responsibility is Vanessa undertaking?

Answers

Answer:

the responsibility of cultural and historical accuracy checking

Explanation:

Vanessa seems to be undertaking the responsibility of cultural and historical accuracy checking. By visiting the library and museum, Vanessa is researching historical data in order to make sure that the items that she has selected match the same type of items that Individuals living in Ancient Egypt times would use as well. This provides both historical and cultural accuracy to the film by representing The citizens of Ancient Egypt as they were in that time.

C - researching

PLATO

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which section available in the Design view for the form actually includes the record data itself?

header

footer

detail

Overview

Answers

Answer:

the answer is detail

Explanation:

please it's detail

The Design view for the form actually includes the record data itself will be known as Overview.

What is a detail?

If the file is completed, then all the record that was done during completing the file will be mentioned in the section known as detail.

The Design view for the form actually includes the record data itself will be known as detail.

Then the correct option is D.

More about the detail link is given below.

https://brainly.com/question/9208069

#SPJ2

Other Questions
The number of electrons in 1.6 gram CH, is: Can someone help please Which sequence explains a geometric method of determining StartFraction 3 minus 17i Over 2 + 2 I EndFraction ? I nee help please help me helpppppp What should be the minimum amount of years you allow your retirementinvestments to grow?a. 10 yearsb. 20 yearsc. 30 yearsd. 40 years I uhhhhh please help its all on the picture. Find the article adjective(s) in the following sentence.The horse ran quickly. The term Pax Mongolica describes A. the treaty agreements the Mongols required of all the peoples that they conquered. B. the rights and responsibilities of the peoples conquered by the Mongols. C. the guarantee given by the Mongols not to invade India or the Arabian Peninsula. D. the period of peace and stability in Asia following the conquest of the Mongols. Which statement best describes how figurative language contributes to the tone of the text? Help plz! 2. Mr. Morton my English teacher says we have to learn how to use commas Please help me its due at 3 In organisms other than plants, when and where is the most ATP produced?in cytoplasm, during photosynthesisin nuclei, during cellular respirationin chloroplasts, during photosynthesis in mitochondria, during cellular respiration Calculate the area of trapezium CDEF. Emma, Brandy, and Damian will cut a rope that is 32.8 feet long into 3 jump ropes. Each of the 3 jump ropes will be the same length.Enter a division sentence using compatible numbers to estimate the length of each jump rope. Round numbers to the nearest whole number.The division sentence is __ __= __Plz help i have a test tomorrow and i dont understand thiseasy 10 points come on people True Or False Bible question2. The instructions for the tabernacle were Given by Moses PLEASEE HELPP PLEASEEEEE THIS IS URGENT helppppp please !!!!!! 6Which subatomic particle can be found revolving around the nucleus?protonneutronelectron While Mary was at the store, she pictured her dog eating food out of a watermelon, which reminded her that she needed dog food and watermelon. This is an example of __________. A. schema B. method of loci C. serial-position effect D. link method which lines must be parallel? A)r and sB)p and qC)p and rD)q and s