Answer:
a)
Explanation:
Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.
Answer:
Explanation:
The diagrams attached to the questions are shown in the first and the second image below. The first image shows the code and the second image shows the error that appears at the moment of running it.
To answer that ; We will notice that the error in the second image is what it says; what happened is that the individual subject performing this action is trying to to open the file called "h.txt", but the python interpreter is unable to find the file. The individual subject will need to have h.txt inside your current working directory for python to open it.
From the third image attached ; I have careful attached an image that illustrate how you can add the file by going to file → open (right from your jupyter notebook). Afterwards you can either upload the file, or create a new text file and paste the contents on it as displayed in the fourth image attached in the diagram below.
Answer:
A. Big Data
Explanation:
It is big data. The internet searches, customer transactions, social media posts, medical tests, weather sensors, military surveillance, and all the data source you are seeing around yourself forms together with the big data. And a big social media company gathers around so many petabytes of data each day. And there are so many such companies, plus all sorts like eLearning sites, etc. And all these together form the big data.
Answer:
Explanation:
With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.
An anti-virus can detect virus with several methods like:
- Digital signature
- Heuristic detection
- Behavior detection
- Sandbox detection
Is necessary for personal laptops and desktops, even in companies hardware.