What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?

Answers

Answer 1
Data mining is not an easy task, as the algorithms used can get very complex and data is not always available at one place. It needs to be integrated from various heterogeneous data sources. These factors also create some issues. Here in this tutorial, we will discuss the major issues regarding −
Mining Methodology and User Interaction
Performance Issues
Diverse Data Types Issues

Related Questions

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

which tool is used to create a selection by drawing it free hand? (ellipse/rectangle/free select/All) ​

Answers

Answer:

The lasso tool

By clicking down and dragging, the lasso tool allows you by freehand to draw the selection line. Many programs offer different types of lasso tools that can be used to make selections. The polygon lasso tool allows you to create a selection by clicking on individual points that connect to create a selection line.

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like

Answers

It uses network usage monitoring software to know the level of traffic on that local network.

We can arrive at this answer because:

Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.

To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.

More information:

https://brainly.com/question/8118353

b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer:

b

Explanation:

When a program unit refers to other database objects, the program unit is considered dependent on that object.

Answers

It is true that a program unit is dependent on a database object when the program unit refers to a database object

A program unit may or may not have dependency.

However, when a program unit have a dependency, the program unit will make reference to its dependency which is sometimes a database object.

Without the database object, the program would either crash or not perform as expected.

Hence, the given statement is true.

Read more about program dependency at:

https://brainly.com/question/12696037

1. how did the prototype help you think about your idea?
2. what was frustrating about making a prototype?

Answers

[tex] \: \: \: \: \: [/tex]

1. how did the prototype help you think about your idea?

it can clarifies the things about the products as well as the user flow.

2. what was frustrating about making a prototype?

There may be too much variation in requirements.

hope it helps

[tex] \: \: \: \: \: \: [/tex]

What is the role of a control in a system that is functioning correctly

Answers

A control system manages, commands, directs, or regulates the behavior of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large industrial control systems which are used for controlling processes or machines.

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.

Answers

Answer:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

# num 2 #

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

# num 3 #

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

# num 4 #

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

# num 5 #

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

# num 6 #

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

Explanation:

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

See more about python at brainly.com/question/13437928

which of these is not enumerated as a motivation to create accessible web content?

Answers

Answer:

Which of what?

Explanation:

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

Lists can not hold strings and numbers in the same list.
True
False

Answers

i think it is false??

What is Acronyms in Design and Technology?

Answers

Answer:

In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.Students also take into account the ethical, legal, aesthetic and functional factors that inform the design processes.

Explanation:

Hope its help

Software that enables information to be obtained from a computer without the user's knowledge is ____________

Answers

Answer:

Spyware

Explanation:

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

a ____________ is the intersection of a column and row in an excel spreadsheet.

Answers

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don

Answers

Answer:

Changes the look and feel of the display

Explanation:

Because you don't change the data nor the values in the char

And it does not change the type of chart.

Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros​

Answers

The feature of spreadsheets that will help Rohan decide where to invest his money is;

Option A; Solver

Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".

The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results.

The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.

Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.

Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.

Read more at; https://brainly.com/question/15032995

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.

Answers

Answer:

Telemedicine refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other. Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.

Explanation:

There's a tool designed to collect data. It allows you to specify which counters you want to collect data for by clicking on the plus sign and adding the counters you want. What's the name of this tool

Answers

Answer:

social engineering is a way to collect data

Explanation:

What are software applications?
lines of code that were written by developers
devices that you insert into the computer
files that are stored on the computer

Answers

Answer:

the person above is correct if i were you id take notes!

Explanation:

Answer:

Only A (Top answer)

Explanation:

Files do not create any software alltogether and devices pluged in are not considered software.

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

Explanation:

Which career path involves working directly with computer networks?

Answers

The career path involves working directly with computer networks are analyst, network manager, and data analyst.

What are Networking?

Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.

Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.

Read more about the networking :

https://brainly.com/question/1027666

#SPJ1

Answer: Computer systems administrator

Explanation:

The command used to save a file for the first time and or to save a file with a new file name, location and formatT

Answers

cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy

Other Questions
adding value to products and services sold to consumers in households for their personal or family use is known as The first term of an arithmetic sequence is 4. The rule an=an+1 + 5 can be used to find the next term of the sequence.a 4b 5c 9d -1 What do you notice about the lines of earthquakes and volcanoes and where they seem to occur on Earth's surface? todas las noches, los aullidos retumbaban la fria selvacual es el sujeto y el nucleo del sujeto y cual es el predicado y el nucleo del predicado? Function or non functional ? Pls help :c make me brainless pls pls pls pls pls actions that take the problem from one state to another are known as how many meridians are there what evidence supports Hess's theory of seafloor spreading? What is the slope of this line?12122 40 PTSWhat do you think is the importance of listing the references used in research? Use the information to complete the Venn diagram. 80 people surveyed on pets they own. 64 people indicated they owned a dog. 34 people indicated they owned a cat and a dog. help me with this please! The half-life of krypton-91 is 10 seconds. At time t = 0 a heavy canister contains 3 g of this radioactive gas. How much remains after one minute? A client with a forceful, pounding heartbeat is diagnosed with mitral valve prolapse. Which client statement indicates to the nurse a need for additional teaching Pre-Algebra simple question At a particular time, a tree casts a shadow 17 m long on horizontal ground. At the same time, a vertical pole 3 m high casts a shadow 4 m long. Calculate the height of the tree to the nearest tenth of a meter. jake y t___________ policas. somos son sois eres The new Apple Watch series 7 cost $799. There is an additional 7% sales tax rate . If Oscar has a total of 850.00 to spend, will he be able to purchase the new Apple Watch Series 7? Explain. Rickets Vitamin D is essential for strong, healthy bones. Our bodies produce vitamin D naturally when sunlight falls upon the skin, or it can be taken as a dietary supplement. Although the bone disease rickets was largely eliminated in England during the 1950s, some people there are concerned that this generation of children is at increased risk because they are more likely to watch TV or play computer games than spend time outdoors. Recent research indicated that about 20% of British children are deficient in vitamin D. Suppose doctors test a group of elementary school children.a) Whats the probability that the first vitamin D deficientchild is the eighth one tested?b) Whats the probability that the first 10 children testedare all okay?c) How many kids do they expect to test before findingone who has this vitamin deficiency?d) They will test 50 students at the third-grade level. Findthe mean and standard deviation of the number whomay be deficient in vitamin D.e) If they test 320 children at this school, whats theprobability that no more than 50 of them have the vita- min deficiency?