Question

F 2. Data mining provides management with daily operational reports: True or False? 3. A Data Base Management System (DBMS) f
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1) False.

​​​​​​Hard disk is a non-volatile memory. As Operating System is stored in hard disk so it is also non-volatile. OS starts slowly after starting of a computer because of hard disk, so, when the computer is started, OS is being copied into RAM from the hard drive to make it fast.

2) False.

The main purpose of data mining is to gather data from daily operations and then use those data to predict patterns or generate new information for the aim of improving current performance.

3) False.

Operation system software is a link between software and hardware. Whereas DBMS is a software which is used to store data and recover them when needed. It's main purpose is to provide security to the data.

4) False.

Data mining is not a function of operating system. The main functions of operations system is data security, booting, loading and execution, memory management etc.

Hope this helps :)

Add a comment
Know the answer?
Add Answer to:
F 2. Data mining provides management with daily operational reports: True or False? 3. A Data...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • Question 1 2.12 pts A hub works as a connection point between computers within a network....

    Question 1 2.12 pts A hub works as a connection point between computers within a network. True * False D Question 2 2.12 pts Virtual private network nodes are linked using secure tunnel connections over the public Internet. True False Question 3 2.12 pts Data stored in electronic form is generally more vulnerable than data stored in its physical form. True False Question 4 2.12 pts A computer virus is a software program that installs itself covertly on computers and...

  • Instructions: For the scenarios that follow, identify the data that would need to be protected. Recommend...

    Instructions: For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one or more of the access controls (listed after the scenarios) for the given scenario and justify your recommendation. Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. 2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smartphones. 3. NetSeclt...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • 111) Which type of software controls basic operations such as file management, disk storage, and hardware...

    111) Which type of software controls basic operations such as file management, disk storage, and hardware interfaces? 111) _____ A) application software B) firmware C) system software D) programming software 112) Durall is a leading manufacturer of decorative crafts in Canada. Which of the following, if true, indicate the threat of new entrants is high for Durall? 112) _____ A) The decorative crafts industry is capital intensive. B) The crafts that Durall manufactures are low-priced. C) Durall has a patent...

  • MULIJ Use choices only once unless otherwise indicated. MATCHING 12-1: KEY TERMS AND DESCRIPTIONS Match each key te...

    MULIJ Use choices only once unless otherwise indicated. MATCHING 12-1: KEY TERMS AND DESCRIPTIONS Match each key term with the best description Key Terms (1-20) Descriptions Accession number Aerosol _Aliquot Bar code Biobank Breach Central processing Centrifuge Cloud Cursor Data DOT A Area where specimens are received and prioriti B. Computer equipment used to process data C. Connect for the purpose of interaction D. Data Leak E. Department of Transportation F. Electronic medical records G. Enter data into a computer...

  • Check Your Understanding 13.1 Instructions: Indicate whether the following statements are true or false (Tor F....

    Check Your Understanding 13.1 Instructions: Indicate whether the following statements are true or false (Tor F. 1. Hacking is more prevalent in healthcare because of the value of patient information on the black market. 2. Internal security breaches are far more common than external breaches 3. The Identity Theft and Assumption Deterrence Act of 1998 makes it a federal crime to commit an act of identity 4. Vulnerabilities and threats are terms that can be used interchangeably. 5. Healthcare organizations...

  • Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on...

    Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. It allows you to talk to the machine. A) hardware protocol B) software protocol C) machine control architecture D) instruction set architecture 12. A ________ consists of an arithmetic logic unit and a control unit. A) processor B) computer C) register D) program 13. ________ are typically used by companies for specific applications such as data...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT