True. Domain-Specific Data Mining Applications integrate domain-specific knowledge with data analysis techniques to provide mission specific data mining solutions
Domain-Specific Data Mining Applications
Many customized data mining tools have been developed for domain-specific applications, including finance, the retail industry, telecommunications, bioinformatics, intrusion detection, and other science, engineering, and government data analysis. Such Scheme integrates domain-specific knowledge with data analysis methods and provides mission-specific data mining solutions. This framework can be used to aware the students in the domain of Data Mining and Knowledge Discovery. The future work will include the more detailed study of the related areas with a clear definition based on new analytical techniques that must be employed when it comes to analyzing data from inter disciplinary areas.
To know more about data mining application, check out: https://brainly.com/question/17145579
#SPJ4
compare and discuss between electromechanical and electronic era of computer
Answer:
The difference between electromechanical and electronic era of computer is that electomaechanical era was between the date of 1840 and 1940.These are the beginnings of telecommunication.While electronic era of computer was The electronic age is wha we currently live in. It can be defined as the time between 1940 and right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed to solve a full range of computing problems.
Write a Person class with the following attributes:
·Name
·Age
The class person should have constructors, get and set methods.
Define two unchecked exceptions with constructors that take a message of String. It should pass the message to the super class.
·InvalidNameException
·InvalidAgeException
Update the Person class so that set methods will check the values of the parameters. For example, the name must not be an empty string and the age must be a number between 0 and 130. If the name is empty, it should throw InvalidNameException. If the age is invalid, it should throw InvalidAgeException. The constructor should use these two set methods when initialize the instance variables with values of the parameters.
Write a main class that prompts the user to create three person objects. It should handle any exceptions so that the user must enter only valid input. If an exception occurs, it should prompts for the information for that person again.
Information for person 1
Enter name:
Enter age: 5
Error: Name must not be empty.
Information for person 1
Enter name: joe
Enter age: abc
Error: Age must be a number
Information for person 1
Enter name: joe
Enter age: 15
Information for person 2
Enter name: bill
Enter age: -15
Error: Age must be between 0 and 130
Information for person 2
Enter name: bill
Enter age: 200
Error: Age must be between 0 and 130
Information for person 2
Enter name: bill
Enter age: 20
Information for person 3
Enter name: william
Enter age: 20
Person[name=joe, age=15]
Person[name=bill, age=20]
Person[name=william, age=20]
The requirements include defining the Person class with attributes, constructors, and getter/setter methods, as well as creating two unchecked exceptions.
What are the requirements and steps involved in implementing the Person class?The given problem requires the implementation of a Person class with attributes name and age, along with constructors and getter/setter methods.
Two unchecked exceptions, InvalidNameException and InvalidAgeException, need to be defined, and the Person class should handle invalid inputs using these exceptions.
The set methods should validate the parameters, throwing exceptions if the name is empty or the age is not within the range of 0 to 130.
The main class should prompt the user to create three person objects, handling any exceptions and requesting valid input. Finally, the main class should print the information of each person object.
Learn more about Person class
brainly.com/question/30695303
#SPJ11
WILL MARK BRAINLIEST ONLY ANSWER LAST PART
Create a concept for a new social media service based on new technologies. The service must include functions or features that require using rich media and geolocation or some other location-sharing technology that you have researched.
Submit your plan using both text and visual elements (graphics or drawings).
These are some key points you need to cover in your concept document:
What type of social media service is it?
What is the purpose of the service?
List the functions that the service provides.
List the features that the service provides
What makes the service unique?
Who is the target audience?
What type of layout did you use for the service?
The concept for a new social media service based on new technologies that i would love to introduce the act of celebrating our social media followers on their birthdays by sending them emails or text offline.
How is the changing technology important for media?The use of technology by mass media users is one that has changed a lot in course of the years and it is still changing.
The use of changing technology or tools can help the media to reach a lot of people and one can get more customers.
Conclusively The use of Email automatic services or messages to target audience such as people between the ages of 18- 50 to celebrate our social media followers can help us to have more customer base as customers often value when they are been celebrated.
Learn more about social media service from
https://brainly.com/question/3653791
Create a flowchart that will accept 10 whole numbers one at a time and print the highest and the lowest. Use Switch.
I will create a sequence of steps that would accept 10 whole numbers one at a time and print the highest and the lowest in Java:
Import javax.swing.JOptionPane;
public class loop_exer2 {
public static void main(String agrs[])
{ String input; int trial=10, sc=0, h=0, l=0, test=0;
System.out.print("Scores: ");
for (int ctr=1;ctr<=10;ctr ) {
input=JOptionPane.showInputDialog("Enter the Scores [" trial "] trials "); sc=Integer.valueOf(input); System.out.print(sc ", ");
if(test==0){h=sc;l=sc;test=1;}
if(sc>h){h=sc;}
else if(sc>h){
h=sc; {
else if(sc<1) {
l=sc;
}
JOptionPane.showMessageDialog (null, "Highest score is:" h "Lowest score is:" l);
System.out.println();
System.out.println ("Highest score is: " h);
System.out.println ( "Lowest score is: "l);
}
}
What is a Flowchart?This refers to a diagram which is used to represent the various steps which a system uses to create a step by step solution.
From the above code, there is the command to accept whole numbers in String and then request for them one at a time and after the computation, display the highest and lowest numbers.
Read more about flowcharts here:
https://brainly.com/question/6532130
A ___ error means the web page you are trying to view isn't available, perhaps because the page has been deleted from the server.
601
404
500
Answer:
A 404
Explanation:
I've seen it many times.
Answer:
404
Explanation:
What is normally disabled by default on most Linux servers?
O TUI
O laas
O GUI
O Embedded Linux
The Option that is normally disabled by default on most Linux servers is GUI.
Is Linux an embedded OS?Embedded Linux is known to be a kind of Linux operating system as well as a kernel that is set up to be place or installed and known to be used inside embedded devices as well as other appliances.
It is seen as a kind of compact type of Linux that gives features and services in line with the operating system.
Therefore, The one that is normally disabled by default on most Linux servers is GUI.
Learn more about GUI from
https://brainly.com/question/3692609
#SPJ1
Here are my grades if needed helpon anything
I am not good at writing so srry can't help you there
Answer:
Nice grades ~~~~~~ Gud job!!!!!
Abby is creating a design for studying what causes the change from day to night. She is going to glue a golf ball to a golf tee that she can use to turn the ball. Then, she is going to place a sticker on the ball to show the location of the United States.
Finally, Abby is going to turn the ball in front of a flashlight. Abby will know her design is successful if it shows
A.
the United States always stays on the lighted side of the ball.
B.
how the Moon orbits the Earth.
C.
none of the ball is ever in shadow as she turns it in front of the light source.
D.
the United States moving from light into shadow as she turns the ball.
Abby will know her design is successful if it shows: A. The United States always stays on the lighted side of the ball.
How will Abby know her design is successful?To determine the success of her design, Abby has to first note that the United States sticker should be on the illuminated side because the country is on earth and earth is always exposed to the sun.
Given this knowledge, Abby will know that when she turns the ball, the side that will be well illuminated will be the sticker side with the United States printed boldly.
Learn more about illumination here:
https://brainly.com/question/28914020
#SPJ1
Surrendering to digital distractions will likely result in learning more material. O False True
Answer:True
Explanation:
a ________ is also called the brain of the computer.
Answer:
central processing unit
Explanation:
Take one action in the next two days to build your network. You can join a club, talk to new people, or serve someone. Write about this action and submit this as your work for the lesson. icon Assignment
Making connections is crucial since it increases your versatility.You have a support system of people you can turn to when things get tough so they can help you find solutions or in any other way.
What are the advantages of joining a new club?
Support Network - Joining a club or organization can help you develop a support network in addition to helping you make new acquaintances and meet people.Your teammates and friends will be there for you not only during practice but also amid personal difficulties. Working collaboratively inside a group, between groups, between communities, or between villages is known as network building.One method of creating a network is by forming a group. Attending events and conferences and developing connections with other attendees and industry speakers is one of the finest methods to build a strong network.In fact, the framework of many networking events and conferences encourages networking and connection opportunities. Personal networking is the process of establishing connections with organizations or individuals that share our interests.Relationship growth often takes place at one of the three levels listed below:Networks for professionals.Neighborhood networks.Personal networks. Reaching out is part of an active communication process that will help you learn more about the other person's interests, needs, viewpoints, and contacts.It is a life skill that needs to be actively handled in order to preserve or, more importantly, to advance a prosperous profession. various network types.PAN (personal area network), LAN (local area network), MAN (metropolitan area network), and WAN (wide area network) are the different types of networks.To learn more about network refer
https://brainly.com/question/28041042
#SPJ1
What is the output?
X = 9 % 2
if (x == 1):
print ("ONE")
else:
print ("TWO")
Answer:
ONE
Explanation:
9 % 2 = 8 remainder 1
mod is asking for the remainder, so x = 1.
Since x equals 1, it will print ONE.
what are the uses of plotters
Answer:
Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materialsHope it helps :)❤
Answer:
Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....
Last question on my exam and i cant figure it out
You want to print only the string items in a mixed list and capitalize them. What should be in place of the missing code?
list = ["apple",1, "vaporization", 4.5, "republic", "hero", ["a", "b"]]
for item in list:
if item.isalpha():
item = /**missing code**/
print(item)
item.isupper()
item.upper
item.upper()
upper(item)
The thing that should be in place of the missing code is [list.upper() for name in list]
What is Debugging?This refers to the process where a problem or error in a code is identified and solved so the code can run smoothly.
We can see that the original code has:
list = ["apple",1, "vaporization", 4.5, "republic", "hero", ["a", "b"]]
for item in list:
if item.isalpha():
item = /**missing code**/
print(item)
item.isupper()
item.upper
item.upper()
upper(item)
Hence, we can see that from the given python code, you want to capitalize the items in the mixed list and the thing that should be in place of the missing code is [list.upper() for name in list]
Read more about debugging here:
https://brainly.com/question/9433559
#SPJ1
Which method of sending a packet allows every computer on the lan to hear the message?
A method of sending a packet which allows every computer on the local area network (LAN) to hear the message is referred to as: B. Broadcast.
What is a network component?A network component can be defined as a set of hardware and software resources that makes up a computer network such as:
RouterSwitchBridgeGatewayServerWhat is a broadcast?In Computer networking, a broadcast can be defined as a technique which typically involves the transmission of packets in order to enable every computer and other network components on the local area network (LAN) to hear the message.
Read more on broadcast here: https://brainly.com/question/14447945
#SPJ1
Complete Question:
Which method of sending a packet allows every computer on the LAN to hear the message? A. Omnicast B. Broadcast C. Unicast D. Multicast.
Please help This is a homework in ICT class
With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring
Answer: Answer Surface
Explanation:
a web form is going to allow uploaded files, the _____ must be included in the tag
a. file name
b. database manager name
c. upload attribute
d. enctype attribute
A web form is going to allow uploaded files, the enctype attribute must be included in the tag.
What do you mean by web form?
Users of your website can request web forms through their browsers. A combination of HTML, client script, server controls, and server code may be used to create these pages.
What is server controls mean?
The tags that the server can understand are called server controls. Basically, there are three different kinds of server controls. On the server side, ASP.NET offers a mechanism to deal with HTML Server controls; working with a collection of controls together is referred to as HTML Controls.
When form data is submitted to the server, the enctype attribute specifies how it should be encoded. Only when method="post" is used may the enctype attribute be utilised.
Hence, the enctype attribute must be included in the tag.
To learn more about the Server from the given link
https://brainly.com/question/9257742
#SPJ1
Content analysis and systematic observation are similar in that both A)require concealed participation. B)utilize a coding system of some sort. C)depend on qualitative data.
Content analysis and systematic observation share similarities in the sense that they both utilize a coding system to analyze data. Both methodologies require researchers to identify patterns, themes, or categories in the data, which are then coded and analyzed. While systematic observation involves observing behavior in a natural setting, content analysis focuses on analyzing media and communication.
Both methods also depend on qualitative data, which involves analyzing and interpreting non-numerical data. However, content analysis and systematic observation differ in terms of their data collection methods. Systematic observation involves observing behavior in a natural setting, whereas content analysis involves analyzing pre-existing data, such as media content or archives. Additionally, systematic observation often requires concealed participation, whereas content analysis can be conducted without direct participation.
To learn more about data click here: brainly.com/question/29117029
#SPJ11
Jack is shooting a scene with a horse running in an open field. Which angle or shooting technique should he use to show the horse in motion?
NO LINKS!!!!
A. Zoom shot
B. Crane shot
C. Tracking shot
D. Panning shot
Answer:
I would say a panning shot because when you "pan" the camera you're following the object that's moving.
hope this helps! ♥
PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS
↓ Scroll Down to See Answer ↓
∧-∧ But Read the Explanation to Make Sure ∧-∧
Answer/Explanation:
These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.
Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.
The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.
There seems to be an emerging requirement to specify cryptographic strength objectively rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected that U.S. Government (USG) and industry will soon require specific quantitative data to define the point at which a cryptographic technology or product will satisfy user requirements.
Knowing that these 2 Choices Don't really look Right...
Because it our job = Wrong
Because encryption algorithm are always weak = Wrong
So It leads us to these...
To Prevent all Decryption = ?
To protect online Information = ?
But Base on the Information below:
Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.
Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.
Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.
I would say the Answer is To Protect Online Information.
You could Read the Explanation Above If you want to Check.
[RevyBreeze]
Which type of programming language is used to write instructions that are directly executed by a computer’s processor?
A.
compiled language
B.
interpreted language
C.
low-level language
D.
high-level language
E.
procedural language
Answer:
D
Explanation:
This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.
Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.
Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.
At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.
Learn more about Accounting Principle on:
brainly.com/question/17095465
#SPJ4
five types of conflict in the school
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data [
Explanation:
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data
Explanation:
follow me please
a DVD looks just like a CD, but it holds less information true or false
Answer:
False
Explanation:
A DVD can hold more information because it is basically a double sided CD where it gets information on both sides whereas on a CD, you only read one side. On CDs, people can put stuff like stickers or whatever on one side while the important side is uncovered.
How does air gap networking seek to keep a system secure? by taking extra steps to ensure the DMZ server is fully patched to deal with the latest exploits by physically isolating it from all unsecured networks, such as the internet or a LAN by focusing on the security of the system through detection devices and incident reports
Air gap networking seeks to keep a system secure by physically isolating it from all unsecured networks, such as the internet or a LAN Thus, the correct option for this question is B.
What do you mean by the Air gap in networking?The air gap in network security may be defined as a type of measure that is utilized in order to ensure a computer network is physically isolated in order to prevent it from establishing an external connection, specifically to the Internet.
According to the context of this question, this process is used in order to ensure the security of the computer and computer network by physically isolating it from unsecured networks such as the internet or a LAN.
Therefore, the correct option for this question is B.
To learn more about Air gap networking, refer to the link:
https://brainly.com/question/14752856
#SPJ1
Use the drop-down menus to complete statements about options for inserting video files.
V is a point of interest in a video clip that can trigger animations or provide a location that a user
can jump to quickly.
The Embed Code command will link an online video to a presentation and requires
to work.
Recording mouse actions and audio is done by using the
command.
Answer:
1 book mark
2 internet connection
3 inset screen
Explanation:
because
Agents must submit the original documentation for enrollment within 24 hours after the application data has been entered into the agent portal.
Agents must submit the original documentation for enrollment within 24 hours after the application data has been entered into the agent portal is a true statement.
What is documentation?This is known to be a kind of knowledge management and knowledge organization, and it is one that entails or that is done on paper, online, or others.
Note that the purpose of documentation is so that one can be able to Describe the use, operation, maintenance as well as other kinds of processes.
Hence, Agents must submit the original documentation for enrollment within 24 hours after the application data has been entered into the agent portal is a true statement.
Learn more about documentation from
https://brainly.com/question/25534066
#SPJ1
Please answer quick. Arrange the code so that the numbers are swapped.
Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.
Second part
First part
Third part
To swap the numbers, you can use a temporary variable to hold one of the numbers while you assign the other number to the first variable. This is how the code is well arranged.
How is this so?Here's how you can arrange the code
First part -
temp = A
Second part -
A = B
Third part:
B = temp
By following this arrangement, the value of B will be stored in the temporary variable temp, the value of A will be assigned to B, and finally, the value of temp (which was originally B) will be assigned to A, effectively swapping the values of A and B.
Learn more about code at:
https://brainly.com/question/27639923
#SPJ1
the is a collection of classes and other code that can be used along with a programming language such as c
.Net framework is a collection of classes and other code that can be used along with a programming language such as c
Microsoft's Net Framework is a software development platform for creating and running Windows applications. The .Net framework is made up of libraries, programming languages and developer tools that can be used to create web and desktop applications. It is also used in the development of games, web services and websites.
.Net framework also supports a number of programming languages, including Visual Basic, C and C#. As a result, developers can select and choose the languages to create the required application.
To learn more about .Net Framework: brainly.com/question/14501179
#SPJ4