Answers

Answer 1
Presenter notes are for showing to other people
Answer 2

Answer:

notes on like a presenting app that will help you present better so like your notes

Explanation:


Related Questions

Fill in the blank: PMML, PFA, and ONNX are __________________. 1 point Open standards for predictive model serialization, exchange, and deployment. Codes for getting rid of undesired data or models. Robots that are plotting to take over the planet. Passwords for some super-secret system. Abbreviations for machine learning algorithm names.

Answers

Answer:

Option A: Open standards for predictive model serialization, exchange, and deployment.

Explanation:

PMML which is also known as Predictive model markup language, is basically an open interchange format for predictive models.

ONNX which is also known as the Open Neural Network Exchange Format is simply an open format that is used to support the storing and porting of predictive models spanning across libraries and languages.

PFA which is also known as Portable format for Analytics is used to provide a platform for analytic applications to explain and exchange predictive models that are produced by analytics and also machine learning algorithms.

From the definitions of PMML, PFA, and ONNX above, we can see that they are all used for predictive model arrangement and exchange.

Thus, the correct answer is option A.

Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this

Answers

Answer:

Phishing

Explanation:

A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.

In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.

How can you save without name folder in desktop ?​

Answers

Answer:

Right click on the folder and click on rename or just press F2 function button. Then just press the ALT key and type in 0160 numerically, and then let go of the ALT key. Make sure you use the numeric keys on the right side of the keyboard to type the digits. After doing this, the folder will exist without a name.

Answer:

we can save without name folder in desktop by pressing space in naming box and press enter

rebecca smith was the top scorer in a women’s professional basketball league

Answers

Answer:

awesome

Explanation:

in Kakegurui at the end of the what happens

Answers

Answer:

ok

Explanation:

မင်းငါ့ကိုငိုနေတာကိုမလိုချင်တဲ့လူငယ်များရဲ့ဆူနာမီကိုမကြည့်ချင်ဘူး

Answer:

me tiamo kisses me ddeee

Explanation:

Which feature in Access 2016 will ensure that every foreign key in a table has a link to a primary key in another
table?

O References
O Referential Integrity
O Autocorrect
O Data Source Binding

Answers

Answer:

B

Explanation:

edge :p

Which one of these is not an area of AI? Computer vision/image, recognition Voice recognition, Robotics, Web design

Answers

Answer:

Computer vision/image

computer vision/images

Your company decided to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against fiber optic cable. What is your solution for this problem?

Answers

Answer:

10G Ethernet

Explanation:

These are the options for the question;

A) 10BASE Ethernet

B) Gigabit Ethernet

C) Fast Ethernet

D) 10G Ethernet

From the question, we are informed about instance of my company deciding to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against fiber optic cable. In this case my solution for this problem is getting

10G Ethernet. Ethernet can be regarded as traditional technology that connects devices in LAN(wired local area network) as well as WAN(wide area network) which allows them to have communication with each other through a protocol, this protocol is reffered to as common network language, it also be regarded as rules. 10 Gigabit Ethernet which is a technology ofgroup of computer networking that enables transmission of Ethernet frames at high rate of 10 gigabits per second. Therefore, 10G Ethernet is the solution since we need

the fastest possible speed.

Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly complex and has many independent components (e.g., creating mail merge documents is very different from formatting a letterhead), she should:

Answers

Answer:

teach the assistant bits and pieces of the program.

Explanation:

Given that the program is fairly complex and has many independent components, the most ideal way Nilsu should train a new administrative assistant on using a word processing program is by "teaching the assistant bits and pieces of the program."

This will make the administrative assistant understand and operate the program at a gradual pace without anhthing looking confusing.

HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
Which of the following is an example of a Boolean Operator?
A. HTML
B. SEO
C.
D. BUT

c is
TITLE

Answers

Answer:

HTML?

Explanation:

That looks like the best answer, correct me if I'm wrong ^^U

Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHING!!!HELP PLZ!!

Answers

Explanation:

You may try opening the Brainly website using your browser's incognito mode. In other words,

Go to the Brainly website on Incognito mode > click Join and then follow the process to create an account.

However, if the issue persists you may then click the Contact Us button on the Homepage of the website and fill the accompanying form to send in your complaints.

how are you going to preserve cultural heritage you social practices even when using ICT ?

Answers

Answer:

Cultural heritage is central to protecting our sense of who we are.

It gives us an irrefutable connection to the past – to certain social values, beliefs, customs and traditions, that allows us to identify ourselves with others and deepen our sense of unity, belonging and national pride.

Answer:

In Slovenia, an interactive geographic information system shows information about important natural areas. Since 2008, the system is available online also via an interactive map. The Slovenian Register is one of the most comprehensive and advanced tools in the EU, and can serve as an inspiration for other countries and regions aiming to improve digitisation of natural and cultural heritage.

Source: CD-ETA E-bulletin

Cheers! :)

Josh is searching for information online about the conservation status of blue jays. He enters the phrase blue jays and most of the results are about the baseball team. What can he do to get the specific results he wants?

Answers

Answer: specify the bluejay bird

Explanation:

by specifically mentioning it is birds he wants that Is the results he will get

If Josh wants to get the specific information in the context of the  conservation status of blue jays, then  in that case can add birds in the search bar along with the name of  blue jays.

What are blue jays?

Eastern North America is home to the beautiful  blue jay, a bird of prey that belongs to  the Corvidae family. It inhabits the majority of eastern and central America; some eastern populations might be migratory.

Breeding populations can be found all over southern Canada; resident populations can also be found in Newfoundland, Canada. Blue Jays are renowned for their brilliance, intricate social structures, and strong familial ties.

It is believed that their love of acorns contributed to the proliferation of oak trees following the last glacial period.

Learn more about blue jays from here:

https://brainly.com/question/3034695

#SPJ2

What is output? x = 10 if (x > 10): print(1) elif (x = 10): print(3) else: print(4)

Answers

Answer:

There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.

n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.

Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.

Explanation:

The following image is the basic syntax for a python function definition

def fuctionname( arguments ) :

statement1

statement2

statement3


A. True
b.False

LMK ASAP PLEASE

Answers

Answer:

A. True

Explanation:

You didn't post the image, but if the statements on your image are indented, the answer to this problem is A.

Answer:

This is true, the python language follows these syntax orders.

What is Identity Theft?
A criminal accessing your personal info to pretend to be you.
Someone stealing your drivers license.
Leaking personal information online.
Stealing your username for log on.

Answers

A is correct! We did this in Law!

Have a merry Christmas!

Who finds the exact web server that hosted the website by looking in a huge database of internet addresses

Answers

Answer:

The ISP - Internet service provider

Explanation:

The internet service provider ISP finds the exact web server that hosted the website by looking in a huge database of internet addresses.

An internet service provider (ISP) is a company that provides internet connection and services to individuals and organizations.

SOMEONE PLEASE HELP ME PLEASE!!!!!!!!

Answers

Answer:

Brainstorm and begin sketching new oven designs

Formula for adding values of cells A9 to A15 is
Please answer fast

Answers

Answer:

This is my opinion. ^_^

You need to sum a column or row of numbers, let Excel do the math for you. Select a cell next to the numbers you want to sum, click AutoSum on the Home tab, press Enter, and you're done. When you click AutoSum, Excel automatically enters a formula (that uses the SUM function) to sum the numbers.

The formula to add the values of the cell A9 to A15 is =SUM(A9:A15)

What is a cell in excel?

Cells are the boxes that appear in the grid of an Excel worksheet such as this one. On a worksheet, each cell is identified by its reference, the column letter and row number that intersect at the cell's location.

This cell is in column D and row 5, so it is designated as cell D5. In a cell reference, the column always comes first.

The formula combines values from 9 to 15 columns or rows.

The Sum keyword is used to add any number of values together and calculate their total.

The ":" symbol indicates the range that must be added together. Another method of adding is to simply select the values to be added and then select auto sum- then sum.

Thus, =SUM(A9:A15) is the formula for adding values of cells A9 to A15.

For more details regarding excel, visit:

https://brainly.com/question/3441128

#SPJ6

SOMEONE PLEASE HELP ME FAST PLEASE!!!

Answers

Answer:

I think it the first one

Explanation:

Ziad tells his son Marc: " This year my age is triple yours, but in 10 years, it will be the double". Find their ages.​

Answers

Answer:

Ziad age would be like 30

Explanation:

10x3=30

The material (text, pictures) to be put into a document is called________________

Please help me

ME ARMY HALPPP!

Answers

Answer:

Inline (my guess)

Hope this may help u

what is the size of 4th generation of computer and what language does they use?​

Answers

Answer:

Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.

Fourth-generation language (4GL), Fourth-generation computer programming language

(brainliest please)

Explanation:

The period of fourth generation was from 1971-1980. Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.

Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC) revolution. In this generation, time sharing, real time networks, distributed operating system were used. All the high-level languages like C, C++, DBASE etc., were used in this generation.

Fourth Generation

The main features of fourth generation are −

VLSI technology used

Very cheap

Portable and reliable

Use of PCs

Very small size

Pipeline processing

No AC required

Concept of internet was introduced

Great developments in the fields of networks

Computers became easily available

Some computers of this generation were −

DEC 10

STAR 1000

PDP 11

CRAY-1(Super Computer)

CRAY-X-MP(Super Computer)

The internet and intranet have many different uses.
Explain what is meant by the intranet.

Answers

Answer:

Intranet is a local or restricted communications network, especially a private network created using World Wide Web software.

Answer:

internet-The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Intranet- A system of computers inside an organization that makes it possible for people who work there to look at the same information and to send information to each other.

what is low level language​

Answers

Answer:

The language which is spoken by low aged people is called as low level language

Answer:

A low level language is a language with few layers between itself and actual machine code.

Assembly is an example of a very low level language, where you're giving direct instructions to the processor.  C is often called a fairly low level language as it gets compiled very directly into machine code.

By contrast, high level languages have many more layers between themselves and the processor.  Java would be an excellent example, as you have a full object oriented language that gets parsed, linked and assembled to run on a virtual machine which itself runs on the hosting system.  Javascript is another, as it in precompiled and executed by the browser, which itself is running on the platform.

Which of the following best describes the purpose of an IP address?

Answers

To locate somebody. Mabey to send mail to.

Answer: C

Explanation:

Each connected device has its IP address. However, all the connected devices are included under your main public IP address for your network.

Your ISP (Internet Service Provider) provides a public IP address via your router. The ISP will have a sizeable pool of IP addresses they have bought. They distribute these to their various customers.

which member of the Jackson family was the spokesperson for the Psychic Friends Network.​

Answers

Answer:

La Toya Jackson

Explanation:

true false.
(c) In Animate, only one layer
can be activated at a time. ( )
PLZ HELP ME IN MY STUDY​

Answers

Answer: true

Explanation:

Ans: Answer is true...

Primary functions of lighting are sufficient light to...

make things sound good
power the cameras
feed the crew
create 3 dimensional on 2 dimensional tv screens

Answers

Answer:

I would say, a guide to use for studying.

Write a program that takes a single integer input from the user and stores it in a variable. Your program should increase the value of this variable by one three times, printing "number is now " followed by its value each time, then decrease it by one three times, again printing "number is now " and the value each time

Answers

Answer:

Question is answered using python:

num = int(input("User Input: "))

for i in range(3):

    num = num+1

    print("Number is now "+str(num))

for i in range(3):

    num = num-1

    print("Number is now "+str(num))

Explanation:

This line prompts user for input

num = int(input("User Input: "))

The following iterates from 1 to 3

for i in range(3):

This increments user input each time

    num = num+1

This prints the value of num after increment

    print("Number is now "+str(num))

The following iterates from 1 to 3

for i in range(3):

This decrements the value of num

    num = num-1

This prints the value of num after decrement

    print("Number is now "+str(num))

Other Questions
HELP THIS IS DUE IN 30 MINUTES ): why is carbohydrate necessary for our body The Iroquois perform rituals to honor the twins in "The World on Turtle's Back," illustrating the Iroquoian belief thatthey must perform certain rituals in order to sustain the Earth.the twins are gods and it is important to show them devotion.singing and dancing will ensure the safety of the twins.the twins enjoy watching ritualistic singing and dancing. Two linear functions are represented in different formats. Function 1: x y 0 5 2 11 5 20 8 29 Function 2: Graph of a line passing through the point begin ordered pair 0 comma negative 1 end ordered pair and the point begin ordered pair 2 comma 0 end ordered pair. Which statements are true? Select each correct answer. Function 1 has a greater rate of change than function 2. Function 2 has a greater rate of change than function 1. Function 1 has a greater y-intercept than function 2. Function 2 has a greater y-intercept than function 1. Im an idiot can someone please help? Why didn't the helicopter see the boys in the lord of the flies Help! last question for the night! please Thanks Which of the following was NOT a major factor in the growth of cities in the United States?O Factory jobsO Plentiful farm landO Transportation systemsO Proximity to ocean, rivers and lakes(pick one) . Which statement best describes health promotion? answer is A raise this issue at your monthly town council meeting and follow up on the progress Why doesn't Peter Pan want to be adopted? please help im struggling with geometry WILL GIVE BRAINLIEST BUT YOU HAVE TO EXPLAIN Cassie bought 2 apples for $4. Olivia bought 5 apples for $15. How much more money did Oliva spend per apple? Use the dollar sign! "Fast as aspeeding bullet" is an example of:.simileOB. personificationo C.alliteration Four cars are driving down the road, each at a constant speed. Car A drives 6 miles in 8 minutes Car B drives 7 miles in 10 minutes Car C drives 10 miles in 12 minutes Car D drives 12 miles in 15 minutesWhich car is driving the fastest?A. Car AB. Car BC. Car CD. Car D what is responsible for the blue sky As you approach an intersection you notice the traffic light is not working what do you do Okay, so I'm kinda stuck right now. "Last week Amy ran 18 miles more than Anjali. Amy ran 45 miles. Write and solve an equation to find out how many miles Anjali ran."This is a two-step equation so you know the drill. What I got is x+8=45Is this right? Or wrong? Which of these describes a method in studying plate movements?Group of answer choicesCorrelate the rotation of Earth to plate movementMatch the grooves along the coastlines of continentsCollect common fossil evidence within the Eurasian plateMatch relief elements on the same side of the Atlantic Ocean Which is a reactant in the Calvin cycle?A. GlucoseB. OxygenC. Carbon dioxideD. Water Why are there only 10 amendments?