One of the features of using web mining is that it improves website usability. This usability refers to how easily website users can ________ with the site.

Answers

Answer 1

This usability above refers to how easily website users can query with the site.

What is Web content mining?

Web content mining is known as the act of looking into the unstructured content of Web pages thoroughly

Web structure mining  is one that is done to analyze or handle the universal resource locators found or seen in Web pages. Web mining is known as the application of data mining methods to known the various patterns from the World Wide Web.

Learn more about web mining from

https://brainly.com/question/2889076


Related Questions

C a n_ I_P l s_H a v e_S u b s_O n_ Y T

Answers

Answer:

Ok

Explanation:

Answer: No

Explanation:

what amount of memory enough to store alatter of the alphabet or store a small number​

Answers

Answer:

It can be "ON" or "OFF". So it can store the numbers 1 and 0, but it certainly doesn't have the capacity to store a letter of the alphabet.

Explanation:

4. All executed programs in the windows
environment is displayed on
the?

Answers

All executed programs in the windows environment are displayed on the Windows manger.

What is a program?

In Computer programming, a program can be defined as a sequence of instructions that are written in a specific programming language and can be executed or interpreted by a computer.

The programs that are executed in the windows environment by the operating system (OS) of a computer system are generally displayed on the Windows manger and stored in the computer's main memory, which is the random access memory (RAM).

Read more on programs here: https://brainly.com/question/23275071

Write a program that: program starts; declares and initializes to .06625 constant float variable NJSALES_TAX; declares and initializes to 1000 an integer variable total; declares and initializes to zero a float variable grand_total; prompt and input on new line total; calculate grand_total to equal total plus (total*SALES TAX); if grand_total <= 1000 print on new line "Grand total is less than or equal to 1000 it is $" and the grand_total to two decimal places; else if grand_total between 1000 <= 2000 print on new line "Grand total is more than 1000 less than or equal to 2000 it is $" and the grand_total to two decimal places; else print on new line "Grand total is greater than 2000 it is $" and the grand_total to two decimal places; just before ending print on new line "Program finished!" then terminate program.

Answers

Answer:

Written in C++

#include<iostream>

using namespace std;

int main() {

const float SALES_TAX = 0.06625;

int total = 1000;

cout<<"Total: ";

cin>>total;

float grand_total = 0;

grand_total = total + total * SALES_TAX;

if (grand_total <= 1000) {

cout<<"Grand total is less than or equal to 1000 it is $";

printf("%.2f", grand_total);  

}

else if (grand_total > 1000 && grand_total <= 2000 ) {

cout<<"Grand total is more than 1000 less than or equal to 2000 it is $";

printf("%.2f", grand_total);  

}

else {

cout<<"Grand total is greater than 2000 it is $";

printf("%.2f", grand_total);  

}

cout<<"\nProgram finished!";

return 0;

}

Explanation:

I've added the full source code as an attachment where I use comments to explain difficult lines

Which option is used once a sparkline has already been inserted to format it to a particular type and color? Insert tab, Sparklines group Insert tab, Filters group Sparklines Design contextual tab Sparklines Format tab

Answers

Answer:

A. Insert tab, Sparklines group

Explanation:

Answer:

a your welcome

Explanation:

Explain the four (4) important attributes that all professional software should have. ​

Answers

Answer:

Acceptability, Dependability and Security, Efficiency, and Maintainability.

Explanation:

Acceptability, Dependability and Security, Efficiency, and Maintainability.

Answer:

1. Maintainability

2. Dependability and security

3. Efficiency

4. Acceptability/Usability

Explanation:

Maintainability, dependability and security, efficiency (performance), and acceotability/usability are the four most critical characteristics. Reusability (can it be reused in other applications), distributability (can it be distributed over a network of processors), portability (can it operate on multiple platforms, such as laptop and mobile platforms), and inter-operability (can it communicate with other systems) are all important attributes to consider (can it work with a wide range of other software systems).

ps. i would really appreciate it if you mark me as brainliest:> (i'm trying to reach virtouso) but it's fine if u don't.

hope this helps

When will a student most likely need to read a text aloud?

when doing homework
when studying for a test
when preparing a speech
when taking notes in class

Answers

Answer:When preparing a speech(c)

Explanation:

Answer:

C. when preparing a speech.

Explanation:

the only answer that makes sense :p

I need help please this computer class.

Answers

Answer:

C

Explanation:

The Correct way of spelling Internet

40 POINTS AND IF CORECT I WILL MARK AS BRAINLIEST
Which part of project management involves determining the overall work?

Breakdown
Incomes
Scope
Time

Answers

Answer:

I think it's income.

Explanation:

Answer:Time because stermining your overall work and what you’ve done includes time

Which is a software application used to analyze an organization’s data to improve decision making?

Answers

The software application used to analyze an organization’s data to improve decision making is said to be Business intelligence software.

What is Business intelligence?

Business intelligence is known to be a kind of app that has been set up and it is known to have a set of data analysis applications that has been made to meet a lot of information needs.

Business intelligence are known to be a kind of procedural and technical input that takes , stores, and analyzes the data made by a company's activities.

Learn more about Business intelligence from

https://brainly.com/question/13339276

Name and describe the seven types of things that can be added to websites to increase audience engagement. hurry please :3

Answers

Answer:

Java script functions, example, buttons that perform an action or on click.Responsive webpages. This is so the screen can resize depending on your device.Pagination, where a user can use a link to get to another part of the same page if it is too long.Styling. This is essential to good-looking web pages.Customization. This is so that the user can change the page to their liking. It is complicated, but different than styling.Good GUI. Graphic user interface is interactive, and is used to create login forms and such.Images. Images can describe things more than words and can have very deep meaning.

Hope this helps!

What query class will you choose
for this query "women are evil"?

Answers

Answer:

A) Gibberish or Vague Profane

Explanation:

Hope this helps

The query class will you choose for this query "women are evil" is Gibberish or Vague Profane. The correct option is A).

What is a query?

A query might ask your database for data results, a specific action to be taken with the data, or both. A query can add, alter, or remove data from a database, conduct computations, integrate data from other databases, and answer simple questions.

A search for information or a question is what a query is. The phrases inquiry, question, quest, request, and query all derive from the Latin verb quaere, which means "to ask." As follows: SQL queries include select, action, parameter, crosstab, and parameter queries.

Swearing or profanity refers to words that are considered impolite, inappropriate, or objectionable. The adverb is vulgar.

Therefore, the correct option is A) Gibberish or Vague Profane.

To learn more about the query, refer to the link:

https://brainly.com/question/29575174

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A) Gibberish or Vague

Profane

C) Foreign Language

D) Valid

E) None

When creating and modifying templates, which keys are used to add placeholders?
Alt+F9
Shift+F8
Delete+F8
Ctrl+F9

Answers

Answer:

Ctrl + F9

Explanation:

D is the answer to you're question!

Answer:

d

Explanation:

right on edg <3

Conveying an appropriate tone is important when communicating online. How is shouting represented in online communication

Answers

Answer:

very bad because shouting in even some ones ear can cause him not to hear

what does receive input mean in coding? I will give brainliest if you want just ask :3 no random answers please. AND HURRY.

Answers

Answer:

It is a way for the codebase to interpret data based off of what a user types or enters in a specified area.

Answer:

to provide or give something to the computer
in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.

Explanation:

Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology: Mesh topology: ISP: Dial-up: DSL: Cable Broadband: Fiber Optic: Mobile: explain all pls

Answers

Answer:

IT terms Network:

Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.

Packet: Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.

Router: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.

IP address: For the most part, an IP address tells you the city, ZIP code, or area code of your ISP, as well as your ISP's name. What can an IP address tell you? To some degree, your physical location and also the name of your ISP

Server: A server operating system, such as Windows Server or Linux, acts as the platform that enables applications to run. The operating system provides applications access to the hardware resources that they need and enables network connectivity. The application is what enables the server to do its job.

LAN: A local area network (LAN) consists of a series of computers linked together to form a network in a circumscribed location. The computers in a LAN connect to each other via TCP/IP ethernet or Wi-Fi. A LAN is normally exclusive to an organization, such as a school, office, association or church.

WAN: A wide area network (also known as WAN), is a large network of information that is not tied to a single location. WANs can facilitate communication, the sharing of information and much more between devices from around the world through a WAN provider.

Bus topology: also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

A ring topology: is a network configuration where each networked device is connected to two other devices on either side of it to form a circular “ring” data path. When data is transferred in a ring topology, the data is sent in one direction along the single continuous pathway.

Star topology: is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients.

A mesh topology: is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

Your ISP: is the company that gets you onto the Internet – your home Internet or mobile data provider. If your ISP is spying on you, it means they can use or sell your browsing history to others for things like creepy ads that follow you around the Internet or to junk mail providers.

Dial up: relating to or being a standard telephone line used for computer communications also : accessible via a standard telephone line a dial-up Internet provider.

DSL: DSL stands for Digital Subscriber Line, and describes a family of technologies used for digital data transmission and connection to the Internet. It is a type of broadband communication service available to homes and businesses that uses existing phone lines without interrupting telephone use.

Cable Broadband:  Cable broadband connects your home to a fibre cabinet in your area. However, instead of using copper wires, cable broadband uses coaxial cables to connect to the cabinet, giving you a much faster internet connection than the traditional copper phone line cables used for 'superfast' broadband connections (up to 60Mbps)

Fiber optics: is used for long-distance and high-performance data networking. It is also commonly used in telecommunication services, such as internet, television and telephones.

A mobile network (also wireless network) route's communications in the form of radio waves to and from users. It is composed of base stations that each cover a delimited area or "cell." When joined together these cells provide radio coverage over a wide geographic area.

Explanation:

Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must provide an internet connection as an access point, mirror a smartphone screen on the LED dash display, and have a hands-free system where drivers can use voice controls to browse their phone's contact list, make and receive hands-free phone calls, and use navigation apps. Which technology should he use and why

Answers

The best technology that he should use to achieve the desired usage as described is; Bluetooth Technology

What is Bluetooth technology?

Bluetooth is a wireless technology that makes use of short-range RF transmissions.

This method of operation of bluetooth  is to aid users in connecting wirelessly to a wide range of computing and telecommunications devices by providing rapid connections between Bluetooth-enabled devices. Furthermore, Bluetooth provides the ability to mirror screens and use voice controls.

From the design of the new car, the best technology to be used is Bluetooth.

Read more about wireless technology at; https://brainly.com/question/24395331

Which is a benefit of collaboration and teamwork?

Answers

Answer:

Increases efficiency and productivity

Explanation:

A benefit of collaboration and teamwork is increased productivity and efficiency.

Collaboration and teamwork offer several benefits that can positively impact individuals and organizations as

1. Enhanced creativity and innovation: Collaboration brings together diverse perspectives, experiences, and skills. When individuals work together as a team, they can brainstorm ideas, challenge assumptions, and generate innovative solutions.

2. Increased productivity: Teamwork enables the division of tasks among team members, allowing for simultaneous progress on multiple fronts.

3. Improved problem-solving and decision-making: When multiple minds come together, there is a broader range of knowledge and expertise available to tackle complex problems.

4. Enhanced communication and interpersonal skills: Collaborating in a team environment necessitates effective communication and active listening.

5. Increased motivation and engagement: Working as part of a team can foster a sense of belonging and shared purpose. Collaboration allows team members to feel supported and valued, leading to increased motivation and engagement.

6. Building strong relationships and trust: Collaboration requires trust, respect, and cooperation among team members. Through collaborative experiences, individuals can build strong professional relationships based on mutual support and shared goals.

Learn more about Collaboration and teamwork here:

https://brainly.com/question/14394282

#SPJ4

Complete a program that reads a vector index as input and outputs the element of a vector of 10 names at the index specified by the input. Use a try block to output the name and a catch block to catch any out_of_range exceptions. When an out_of_range exception is caught, output the message from the exception object and the first element in the vector if the index is negative or the last element if the index is greater than the size of the vector.

Answers

The program segment is an illustration of the try and catch program exceptions

The complete program

The program segment written in C++, where comments are used to explain each action is as follows:

//This opens the try block

   try{

       //This prints the vector element

       cout<<names[index];

   }

   //This opens the catch block

   catch (const std::out_of_range& oor) {

       //This prints the exception

       cerr << "Out of Range error: " << oor.what() << '\n';

 }

Read more about program segments at:

https://brainly.com/question/11623795

Colin found a website he would like to use for his research assignment. What should he look for to determine if the website is reliable?

He should determine if the website is entertaining.
He should look for goods and services on the website.
He should look for opinions on the website.
He should look for when the website was last updated.

Answers

Answer:

He should look for when the website was last updated.

Explanation:

if the website is out of date, then the sources may not be as reliable or accurate

what’s The abbreviation of afk and what does That Mean in gaming playing in Multiplayer online battle arena games

Answers

Answer:

afk means away from keyboard so if someone says they are going afk it means they have to go for like a couple of minutes or so

Create a file using any word processing program or text editor. Write an application that displays the fie's name, containing folder, size, and time of last modification. Save the file as FileStatistics.java.

Answers

Answer:

yes

Explanation:

yeah

visual basic is an example of...

Answers

Answer:

Basic Programming language

how can a security framework k assist in the deisng and implementation of a secuiry infrastructure what isn information security governance

Answers

Answer:

on January 1st the new year begins rewrite and punctuate correctly

ASAP!
Choose the correct term to complete the sentence.

A _____ search can only be done on an ordered sequence or collection.

Options

1. linear
2. binary​

Answers

the answer is 1. linear



hope this helped! please mark as brainliest!

Answer:it is binary

Explanation:just did the test

Is there a parrapa level for stage 1 in umjammer lammy?

Answers

Answer:yes there WAS a parrapa level but it was scrapped from the game I think you can find it in beta versions of the game but

Write a program in Java programming language to display or calculate “Hello, Daddy and Mum”

Answers

Answer:

class Simple{

public static void main(String args[]){

System.out.println("Hello Daddy and Mum);

}

}

Explanation:

First, we create a class, then a method and then give the Integrated Data Environment (IDE) the command to give out an output that says Hello, Daddy and Mum”

Answer:

public class Program

{

public static void main(String[] args) {

System.out.println("Hello, Daddy and Mum");

}

}

Explanation:

Java is a high level, modern programming language designed in the early 1990s by Sun Microsystems.

The above one is simple program that displays “Hello, Daddy and Mum” on the screen.

In Java, every application begins with a class definition. Here we have named class Program.

The main() method is the entry of the program. A valid Java program must have main() method.

The code prints the text “Hello, Daddy and Mum” using System.out.println() function.

a computer never gets tired or bored while working for a long time .. ​

Answers

Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.

Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.

any two example of numeric​

Answers

Answer:

Numeric is anything of, relating to, or containing numbers. The numbering system consists of ten different digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. If a value is an alphanumeric, it contains letters and numbers.

I’m select circumstances is a permissible character on the Mac operating system

Answers

Answer: /

Explanation: Answer

Other Questions
Help me please urgent Which of the following is not correct concerning database design? question 2 options: identify all fields needed to produce the required information group related fields into tables determine each table's primary key organize each piece of data into its largest useful part why does Simon change in lord of the flies? Someone solve this plz Which intangible assets are amortized over their useful life?a. trademarksb.goodwillC. patentsd. all of these Why fair use is justified in school work Jaime has 636 blocks. About how many blocks does he have ?a. 500B.600C.700D.800 Children should not have to pay to learn at a young age _also known as "closed source,"referring to code that only its legal ownercan use and manipulate Which of the following inverse operations do you perform on the multiplication equation 3x=27 to isolate the variable? A.Divide by 3 on both sides of the equationB.Multiply by 3 on both sides of the equationC.Add 3 to both sides of the equationD.Subtract 3 from both sides of the equation 40 divided by 28 .can you pls exsplain in a way a 5th grader can understand? Nash Furniture Company started construction of a combination office and warehouse building for its own use at an estimated cost of $7,500,000 on January 1, 2020. Nash expected to complete the building by December 31, 2020. Nash has the following debt obligations outstanding during the construction period. Construction loan-12% interest, payable semiannually, issued December 31, 2019 $3,000,000 Short-term loan-10% interest, payable monthly, and principal payable at maturity on May 30, 2021 2,100,000 Long-term loan-11% interest, payable on January 1 of each year. Principal payable on January 1, 2024 1,500,000 Assume that Nash completed the office and warehouse building on December 31, 2020, as planned at a total cost of $7,800,000, and the weighted-average amount of accumulated expenditures was $5,400,000. Required:a. Compute the avoidable interest on this project.b. Compute the depreciation expense for the year ended December 31, 2020. YOU WANT THE CROWN THEN HELP ME!!!!!!!!!! In which of the following scenarios can a child be tried as an adult? A. The child has committed a felony. B. The child is a repeat offender for minor crimes. C. The child has become addicted to illegal drugs. D. The child is accused of theft. Thx guys (i will vote brainliest)have an awesome daydjkal;fjkdla;jkdfl;ghkjhkjlhklkjlhkjl which expression would be easier to simplify if you use the associative property to change the grouping?A: 0.85 + [0.15+(-1/3)]B: 1+[3/4+(-1/4)]C: [(-1/3) + +(-2/3)] + (-4/5)D: (160 + 40) + 27 Gift Wrapping A gift box has the shape of a rectangular prism. How much wrapping paper do you need to coverthe box?14 in4 in12 in Explain why some systems of equations have no solutions, why some systems have one solution, and why some systems have infinitesolutions. what is the vertex of Y=4x+8r-2 Spyware is :___________a) software that tells the user if anyone is spying on his computer. b) software that monitors computing habits and sends the data it gathers to someone else. c) software that monitors whether spies are looking at the computer. dangerous activities, like drinking and driving, only pose a threat to one individual - the one performing the unsafe dead.