Specialized search engines indexes content specialized by topic or location and are used to deliver more relevant results to the user. It indexes pages for particular topics. Examples of specialized search engines and their applications include;
1. Uquery.com – This new search engine focuses more on the emergence of iPhone and iPod touch applications
2. Taptu.com – A downloadable search engine that helps the user find items specific to fit on a mobile screen
3. Yahooligans – A sub-domain of yahoo that focuses on kid friendly games.
4. Pubmed.com – This is specifically meant for students in medical schools
5. Zillow.com – Online real estate service that provides information regarding home purchase.
Mainly .com
educational institutes .edu
Answer:
40
Explanation:
Given that:
A neural network with 11 input variables possess;
one hidden layer with three hidden units; &
one output variable
For every input, a variable must go to every node.
Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:
= ( inputs + bias) × numbers of nodes
= (11 + 1 ) × 3
= 12 × 3
= 36 weights
Also, For one hidden layer (with 3 nodes) and one output
The entry result for every hidden node will go directly to the output
These results will have weights associated with them before computed in the output node.
Thus; using the formula
= (numbers of nodes + bais) output, we get;
= ( 3+ 1 ) × 1
= 4 weights
weights with respect to input and hidden layer total = 36
weights with respect to hidden and output layer total = 4
Finally, the sum of both weights is = 36 + 4
= 40
Answer:
TIGER TEAM
Explanation:
Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.
There are different types of penetration testing teams which are: red team, blue team and purple team.
Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.
In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.
Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.