1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
3 years ago
15

Crisp-DM is an open standard process model that contains stages

Computers and Technology
2 answers:
Feliz [49]3 years ago
3 0

Answer:

Yes, Cross Industry Standard Process for Data Mining has six stages. Business understanding, data understanding, data preparation, modeling, evaluation, and deployment.

Explanation:

sp2606 [1]3 years ago
3 0

Answer:

six stages:

Explanation:

(i) business understanding,

(ii) data understanding,

(iii) data preparation,

(iv) modeling,

(v) evaluation, and

(vi) deployment.

You might be interested in
What is computer???<br>A. Electornic device<br>B. Storage<br>C. Accuarcy.<br>D. Communciation​
Gemiola [76]

Answer:

A

Explanation:

It's explanable the other ones dont make sense

8 0
3 years ago
Create a simple program of your own using a Loop that counts and displays numbers 1-10.
avanturin [10]

Answer:

I think

Explanation:

you....

8 0
3 years ago
You have a primary zone stored in the myzone.local.dns file. Some devices that aren't domain members are creating dynamic DNS re
Elodia [21]

Answer:

Correct answer is (C) Configure the Store the zone in Active Directory option.

Explanation:

To create dynamic DNS records in the zone, the first thing is to add an Active Directory data store by configuring the data store name, connections, credentials, and search attributes.

5 0
3 years ago
What makes up data encryption standard ?
galben [10]

Answer:

Data Encryption Standard Use Cases. The DES was a data security standard used to encrypt and decrypt non-classified computer data generated by the United States government and any commercial organization. The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). ... Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation. The DES is a product block cipher in which 16 iterations, or rounds, of substitution and transposition (permutation) process are cascaded.

Explanation:

If this helps can i have brainliest

8 0
3 years ago
Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash
Ksju [112]

Answer:

The program written in python is as follows:

def begins_with_line(userinut):

     while userinut[0] == '-' or userinut[0] == '_':

           print(bool(True))

           break;

     else:

           print(bool(not True))

userinput = input("Enter a string: ")

begins_with_line(userinput)

Explanation:

The program makes use of no comments; However, the line by line explanation is as follows

This line defines the function begins_with_line with parameter userinut

def begins_with_line(userinut):

The following italicized lines checks if the first character of user input is dash (-) or underscore ( _)

<em>      while userinut[0] == '-' or userinut[0] == '_': </em>

<em>            print(bool(True))  </em><em>->The function returns True</em>

<em>            break; </em>

<em>However, the following italicized lines is executed if the first character of user input is neither dash (-) nor underscore ( _)</em>

<em>      else: </em>

<em>            print(bool(not True))  </em><em>-> This returns false</em>

The main starts here

The first line prompts user for input

userinput = input("Enter a string: ")

The next line calls the defined function

begins_with_line(userinput)

<u><em>NB: The program does not make use of if statement</em></u>

8 0
3 years ago
Other questions:
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • In one to two sentences, explain how to save a new document.
    15·2 answers
  • To provide both encryption and integrity protection, wpa2 uses aes encryption with:
    12·1 answer
  • What is the biggest difference between single system recording and double system recording?
    8·1 answer
  • The unique constraint differs from the primary key constraint in what way?â
    15·1 answer
  • Consider a Rational class designed to represent rational numbers as a pair of int's, along with methods reduce (to reduce the ra
    15·1 answer
  • Write a script that will calculate a person’s weight on each planet of the solar system, the sun, and the moon. You should creat
    11·1 answer
  • In this program we are going to practice using the Math class by computing some important values on the unit circle. Using the a
    5·1 answer
  • My Macbook computer charger is burned from the side od the cord. -_- Great way to start school. Anything i should do?
    15·2 answers
  • When delivering 2023 murano, demonstrate how to turn the driver assistance technologies on or off using ________.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!