What best Describes algorithm bias

Answers

Answer 1

Answer:

E

Explanation:

cause e


Related Questions

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?

Answers

Answer:

base station is the answer

can I play the game the last of us with this spec:​

Answers

No . Take my advice
no the cpu is not powerful enough to support a game

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.

Answers

The good answer is: Sacrificial

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

Answers

Answer:

corporate network

Explanation:

A level 3 security system focuses on protecting the corporate network against intrusion, denial-of-service attacks, and unauthorized access.

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.

Answers

Answer:

The correct answer is "Cave automatic virtual environment ".

Explanation:

An interactive virtual setting composed of something like a VR chamber or space throughout the cube form wherein the projection displays represent the boundaries as well as flooring, is determined as Cave automatic virtual environment.This same client computer does have a Virtual reality headset as well as header projection but instead uses devices like walls etc.

 

Which is linux operating system?
1. Private OS
2. Open source OS
3. Windows operating System
4. None of these above​

Answers

Answer: None of these above

hope its help you

have a great day keep smiling be happy stay safe .

IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in the string parameter is uppercase. Otherwise, the function returns "Bad".

Ex: FilterStr("sandwich") returns

Bad

Recall isupper() checks if the character passed is uppercase. Ex: isupper('A') returns a non-zero value. isupper('a') returns 0.

string's at() returns a character at the specified position in the string. Ex: myString.at(3)
)
#include
#include
#include
using namespace std;

/* Your code goes here */

int main() {
string input;
string output;

getline(cin, input);
output = FilterStr(input);
cout << output << endl;

return 0;
}

Answers

Answer:

Replace /*Your code goes here */ with

string FilterStr(string str){

   string retStr= "BAD";

   if(isupper(str.at(4)) != 0){

     retStr = "GOOD";

   }

   return retStr;

}

Explanation:

This defines the function

string FilterStr(string str){

This initializes the return string to BAD

   string retStr= "BAD";

This checks if the string at index 4 is uppercase;

   if(isupper(str.at(4)) != 0){

If yes the return string is updated to GOOD

     retStr = "GOOD";

   }

This returns the return string

   return retStr;

}

See attachment for complete program

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

Answers

Answer:

HIDPSs

Explanation:

The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.

What framework is used for transporting authentication protocols instead of the authentication protocol itself

Answers

Answer:

EAP (Extensible Authentication Protocol)

For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.

What is the Extensible Authentication Protocol (EAP)?

An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.

RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.

For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.

More about the Extensible Authentication Protocol link is given below.

https://brainly.com/question/20813972

#SPJ12

fill in the blank figuring out what type of garden you want to grow is the ____step according to the instructions in how to grow a school garden

Answers

Answer:

First.

Explanation:

How to grow a school garden is an illustrative guide that explains to students the step by step process for growing a school garden.

According to the instructions in how to grow a school garden, the first and most important step is figuring out what type of garden you want to grow. At this step, a student should have a good understanding of the type of garden he or she wants to grow.

Thus, this step answers the question of "what am I growing in the garden?"

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

to which category of software does Microsoft Works belong
a) custom-written
b) customized
c) integrated
d) special purpose ​

Answers

Answer:

c) Integrated

Explanation:

Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost

Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

Write the definition of a public class Simple. The class has no constructors, methods or instance variables.

Answers

Answer:

public class Simple{}

Explanation:

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up

Answers

Answer:

Dial up

Explanation:

Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.

In data representation, what represents one character which may be a
letter, number, or punctuation mark.

Answers

Answer:

Binary ?

Explanation:

Im not 100% sure but it could be binary or 0

Which part of the packet contains the sequencing information that's used by TCP to reassemble packets

Answers

Answer:

During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.

Explanation:

define computer network

Answers

Computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

Why is data processing done in computer?​

Answers

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

a.
5. A red circle and diagonal slash on a sign means
that
a hazard is ahead.
b. the action is not allowed.
c. diagonal crossing is permitted.
d. two roads intersect ahead.

Answers

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

Which practices promote efficient keyboarding? Check all that apply.

curving your fingers a little when you rest them lightly on the home keys
returning to the home key after you have typed another key
keeping your eyes on your hands when typing
working at a comfortable pace when typing
using your thumbs for the space bar
never using a shortcut

Answers

Answer:

Curving your fingers a little when you rest them lightly on the home keys returning to the home key after you have typed another key

Explanation:

It is important to position the fingers on the keyboard in such as way that they are prepared to move when selecting keys. The fingers should be slightly curved and the hands should be down

At the start of typing, the left fingers should be placed on the A, S, D, and F keys, while the right fingers should be placed on the J, K, J, and ; keys

Answer: both thumbs should be on the spacebar

Explanation:

Other Questions
Using the following image , find the value for x Question 9 of 10Which elements are in the substance that makes up about 60% of the malehuman body?A. Carbon and phosphorusB. Phosphorus and nitrogenC. Hydrogen and oxygenD. Calcium and oxygenSUENT Assume the following information from a schedule of cost of goods manufactured: Beginning work in process inventory 30,000Direct materials used in production 50,000Direct labor 60,000Total manufacturing costs to account for 219,000Ending work in process inventory 72,000 What is the manufacturing overhead applied to work in process? A. $15,800 B. $144,500 C. $150.000 D. $79,000 7. Shawn plotted the data in a bar graph with two bars: one representing the number of bees per colony in the control cages and the other representing the number of bees per colony in the cages exposed to the fungicide. If the results support the hypothesis that fungicides harm bee development, what would you expect this bar graph to show? Describe the expected pattern in a few sentences. What does the myth attempt to explain? Check all that apply.why the Maasai herd cattlewhy there is rain and droughtwhy caring for cattle can be troublesomewhy a volcano erupts in the middle of the cattle plainshow the Maasai interact with naturewhat the relationship is between supernatural beings and humans currently, the US interest rate is at 2% annually. how long it will take an investor to make 10% of money from an investment if the bank pays simple interest Danni placed $5700 in a savings account which compounds interest continuously at a rate of 2.1%. How much will she have in the account after 4 years What is the highest peak in North America? A. Mt. Saint Helen B. Mt. McKinley C. Mt. Whitney D. Mt. Rainier Please select the best answer from the choices provided A B C D Explain why continuing to practice email skills is important as a modern communicator. Posibilities of development in lumbini province lets evaluate (3^6)^1/2step by step. An elected government official is interested in the opinion of teachers in her voting area. She randomly selected five schools at random from the 20 schools in her area and then interviews each of the teachers in those five schools. The government official is using g Steel plates (AISI 1010) of 4 cm thickness initially at a uniform temperature of 500 deg C are cooled by air at 50 deg C with a convection coefficient of 30 W-m2-K-1. Estimate the time it will take for their midplane temperature to reach 100 deg C. Which of the following would not occur as a result of a monopolistically competitive firm suffering a short-run economic loss? A) The firm could exit the industry in the long run. B) If the firm does not exit the industry in the long run its demand curve will shift to the left. C) If the firm does not exit the industry in the long run its demand curve will shift to the right. D) If the firm remains in the industry in the long run it will break even. choose "A" choose "B" choose "C" choose "D" The total mass of 8 identical dictionaries is 9.92 kilograms. What is the mass, in kilograms, of one dictionary? Enter your answer in the space provided find the area of the kite. please help thank you WHAT ARE THE VOVELS?? Neeeeed helpppppppppp Australia is also called _____(a) Namib(b) saudi Arabia(c) Oz(d) Anadaman island Which phrase is most similar in meaning to "run into" as it is used in the excerpt above?A. They are all bland.B. learned to blend, as if no line was drawn C. to shop, for things legal and illegal D. disturbs his rest