1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
3 years ago
15

Crisp-DM is an open standard process model that contains stages

Computers and Technology
2 answers:
Feliz [49]3 years ago
3 0

Answer:

Yes, Cross Industry Standard Process for Data Mining has six stages. Business understanding, data understanding, data preparation, modeling, evaluation, and deployment.

Explanation:

sp2606 [1]3 years ago
3 0

Answer:

six stages:

Explanation:

(i) business understanding,

(ii) data understanding,

(iii) data preparation,

(iv) modeling,

(v) evaluation, and

(vi) deployment.

You might be interested in
Write a program that calculates and displays the amount ofmoney available in a bank account that initially has $8000 deposited i
Leviafan [203]

Answer:

Written in Python

import math

principal = 8000

rate = 0.025

for i in range(1, 11):

    amount = principal + principal * rate

    principal = amount

    print("Year "+str(i)+": "+str(round(amount,2)))

Explanation:

This line imports math library

import math

This line initializes principal amount to 8000

principal = 8000

This line initializes rate to 0.025

rate = 0.025

The following is an iteration from year 1 to 10

for i in range(1, 11):

    This calculates the amount at the end of the year

    amount = principal + principal * rate

    This calculates the amount at the beginning of the next year

    principal = amount

    This prints the calculated amount

    print("Year "+str(i)+": "+str(round(amount,2)))

6 0
4 years ago
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. True False
Gelneren [198K]

Answer:

False

Explanation:

8 0
3 years ago
Your boss calls you from his home to use the VPN connection you configured for him
prisoha [69]

Its not c or b. I think it's a. Im not sure tho..

7 0
3 years ago
(Will mark brainiest) The ultimate goal of a distributed denial of service attack is to:
Mumz [18]

Answer: B

Explanation: They are trying to flood the service with so many things like messages, connection requests, that the system can't handle it and will shut down or crash.

5 0
3 years ago
Read 2 more answers
What is the meaning of google?
UkoKoshka [18]
According to the Google guys, the company's name comes from the word 'googol' which is actually a number invented by Milton Sirotta. Probably the Google name is related to the number of the results provided by the search technology which is usually huge.

"The name 'Google' is a play on the word 'googol,' coined by Milton Sirotta, nephew of American mathematician Edward Kasner. A 'googol' refers to the number represented by a 1 followed by 100 zeros. It's a very large number. In fact, there isn't a googol of anything in the universe

5 0
3 years ago
Read 2 more answers
Other questions:
  • Kim is creating a one-page presentation in Word about her parents’ home country, Vietnam. She has inserted images that are each
    7·2 answers
  • What is software piracy
    12·2 answers
  • To create a multiple-table form based on the âmanyâ table, tap or click the ____ button on the create tab to create a form in la
    9·1 answer
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • How is a cell named?
    12·1 answer
  • According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
    11·1 answer
  • I need help with this!!! Are headphones, radios, dishwashers, and remote controls considered Computers? Do any of them store dat
    13·1 answer
  • Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage r
    13·1 answer
  • Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
    15·1 answer
  • Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!