1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
2 years ago
7

One of the features of using web mining is that it improves website usability. This usability refers to how easily website users

can ________ with the site.
Computers and Technology
1 answer:
svetoff [14.1K]2 years ago
3 0

This usability above refers to how easily website users can query with the site.

<h3>What is Web content mining?</h3>

Web content mining is known as the act of looking into the unstructured content of Web pages thoroughly

Web structure mining  is one that is done to analyze or handle the universal resource locators found or seen in Web pages. Web mining is known as the application of data mining methods to known the various patterns from the World Wide Web.

Learn more about web mining from

brainly.com/question/2889076

You might be interested in
A web application that is designed as a single piece of software with multiple features that are fully integrated into the main
Nookie1986 [14]

Answer:

c. Service oriented architecture (SOA)

Explanation:

In a service oriented architecture (SOA), a component of an application provides services to other components of the application or other applications majorly via a communications protocol over a network. In other words, SOA is a programming or software development technique in which services communicate with each other across different platforms.  

One key principle of SOA is to design an application (which in itself is a piece of software with multiple features) that is independent of any product, service, vendor or technology but can be integrated into other applications. SOA makes use of loose coupling -  a technique in which a client service remains independent of another service that requires it.

In contrast, a monolithic architecture aims at developing a software that is self-contained, independent and not to be integrated into other applications.

On another hand, Software as a service (SaaS), though a bit similar to SOA, is a model in which an application is made available to customers basically through a network. Users basically access the application via a browser.

Therefore, the best option is

C. Service oriented architecture.

3 0
3 years ago
A field value is currently not in any group. what happens when you try adding it to an existing group?
ivann1987 [24]

When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

<h3>What is a  field value?</h3>

The value of a field  can be described as the  string of bytes,  which do contains  all bytes in the field after the first colon.

The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.

It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.

It also gives the enablement in the extraction of the exact values from the cell linked to data types.

It should be noted that this field value is  concatenation of all the lines  found in the the field, outside the  starting name and colon, hence When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

Find out more on field value at brainly.com/question/843074

#SPJ1

6 0
1 year ago
What is the typical relationship between time and interest rate?
Hatshy [7]
The answer is A! Longer time period usually equals higher interest rate!
5 0
3 years ago
Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
Bezzdna [24]
<span>Random access memory. This problem requires you to know what the different types of memory are and their relative advantages and disadvantages. Let's look at them and see why 3 are wrong and one is correct. read-only memory: Otherwise known as ROM, this type of memory stores code that can't be over written. Used frequently for constant lookup values and boot code. Since it can't be written to by normal programs, it can't hold temporary values for Samantha. So this is the wrong choice. random-access memory: Otherwise known as RAM, this type of memory is used to store temporary values and program code. It is quite fast to access and most the immediately required variables and program code is stored here. It can both be written to and read from. This is the correct answer. hard disk: This is permanent long term readable and writable memory. It will retain its contents even while powered off. But accessing it is slow. Where the contents of RAM can be accessed in nanoseconds, hard disk takes milliseconds to seconds to access (millions to billions of times slower than RAM). Because it's slow, this is not the correct answer. But it's likely that Samantha will save her spreadsheet to hard disk when she's finished working with it so she can retrieve the spreadsheet later to work on again. compact disk: This is sort of the ROM equivalent to the hard disk. The data stored on a compact disk can not be over written. One way of describing the storage on a compact disk is "Write Once, Read many times". In most cases it's even slower than the hard disk. But can be useful for archiving information or making backups of the data on your computer.</span>
5 0
4 years ago
Read 2 more answers
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
4 years ago
Other questions:
  • What is the main benefit of seeing your document in Page Break Preview?
    9·2 answers
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • How can you say that a computer is a versatile machine?​
    7·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • Using positive self talk is a great way to
    12·2 answers
  • The rhythmic note that three beats is called a____half note.
    15·2 answers
  • What triggers a LinkedIn account ban?
    6·1 answer
  • write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!