answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
1 year ago
6

Select the correct answer. James is a sales analyst of a departmental store chain. He checked the sale records for the past 12 m

onths and found that a few products had not done well in spite of heavy discounts. Which application of a data warehouse is James using? A. data mining B. web mining C. metadata creation D. reporting
Computers and Technology
2 answers:
aleksandr82 [10.1K]1 year ago
6 0

Answer:

A. data mining

Explanation:

Taya2010 [7]1 year ago
4 0

Answer:

I believe the answer is A) data mining

Explanation:

You might be interested in
Which of the following is true with regard to defensive programming? Preconditions should never be visible to callers. Program c
Firlakuza [10]

Answer:

The correct point about defensive programming is that the "program code frequently assumes that input will be valid and that algorithms will behave as expected".

Explanation:

8 0
2 years ago
Select the examples that best demonstrate likely employers for Journalism and Broadcasting workers. Check all that apply.
Delicious77 [7]

Answer:

a radio station

a newspaper

a television network

Explanation:

4 0
2 years ago
Read 2 more answers
Given an integer variable strawsOnCamel, write a statement that uses the auto-increment operator to increase the value of that v
Reptile [31]

Answer:

The program to this question can be given as follows:

Program:

#include <stdio.h> //include header file for using basic function

int main() //defining main method

{

int strawsOnCamel=0; //defining integer variable and assign value

for(int i=1;i<=5;i++) //loop for increment integer variable value

{

//code

strawsOnCamel++; //increment value by 1

printf("%d\n", strawsOnCamel); //print value

}

return 0;

}

Output:

1

2

3

4

5

Explanation:

In the C language code above the header file is entered, and a whole variable strawsOnCamel is specified within the main method, which gives a value of 0.

  • Then a for loop is defined inside a loop an integer variable i declared that starts from 1 and ends with 5.
  • Inside a loop, the strawsOnCamel variable is used that increments its value by 1 and prints its value.

5 0
2 years ago
The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * sym
Juli2301 [7.4K]

Answer:

num = int(input("enter a number:"))

print(num * 8)

Explanation:

num is just a variable could be named anything you want.

if code was like this num = input("enter a number:")

and do a print(num * 8)

we get an error because whatever the user puts in input comes out a string.

we cast int() around our input() function to convert from string to integer.

therefore: num = int(input("enter a number:"))

will allow us to do  print(num * 8)

6 0
2 years ago
IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to re
VikaD [51]

Answer:

The American Registry for Internet Numbers ARIN

Explanation:

The American Registry for Internet Numbers (ARIN) is a not for profit organization that serves as the administrator and distributor of Internet numeric resources such as IP addresses (IPv4 and IPv6) ASN for the United States, Canada, as well as North Atlantic and Caribbean islands

There are four other Regional Internet Registry including APNIC, RIPE NCC, LACNIC and AFRINIC.

6 0
2 years ago
Other questions:
  • U.S. industries like steel, computers, and energy need to be protected from foreign competition to ensure which of the following
    6·2 answers
  • When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the swit
    13·1 answer
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • A(n) ______close to a cover letter leads to more interviews because you are contacting the employer. a. passive b. lengthy c. ac
    11·2 answers
  • Which of the following can you NOT apply for at any FLHSMV office? A. Certificate of title B. License plates C. Vehicle registra
    15·2 answers
  • If Maya wants to access a view that would control multiple slides within a presentation, which view should she utilize? Master v
    9·1 answer
  • 5.19 LAB: Exact change - functions
    10·2 answers
  • Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma
    12·1 answer
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!