1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
5

Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view

of her selection and additional information that will help her make a decision. When she adds the jeans to her cart, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Janelle and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailers units per transaction. The technology that generates this type of intelligence and personalization is called
A. social media
B. cookie mining
C. Web 2.0
D. Web 3.0
Computers and Technology
1 answer:
Kay [80]3 years ago
5 0

Answer:

B) Cookie mining

Explanation:

A cookie also called http/web/internet cookie are small pieces of information that your web browser stores on your computer while you browse the internet, they are designed to help  websites keep a record the user's browsing activity. The information stored as cookies can be minned to discover patterns and users' preferences, as it is in the question scenario, a recommendation system has been implemented using the saved cookies

You might be interested in
Match the following technologies with their applications.
Art [367]

Answer:

how do we answer that question when there is no choices to chose from

Explanation:

3 0
3 years ago
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
how to create use an array of Course objects instead of individual objects like course 1, course 2, etc
AURORKA [14]

Answer:

To save the course object instances in an array, use;

Course[] courses = new Course[7];

courses[0] = new Course("IT 145");

courses[1] = new Course("IT 200");

courses[2] = new Course("IT 201");

courses[3] = new Course("IT 270");

courses[4] = new Course("IT 315");

courses[5] = new Course("IT 328");

courses[6] = new Course("IT 330");

Explanation:

The java statement above assigns an array of size 7 with the course class constructor, then order courses are assigned to the respective indexes of the new array.

3 0
3 years ago
you just bought a new hard drive for your computer you plan to use this as a secondary hard drive to store all um a files once i
mihalych1998 [28]
Well, you need to partition your hard drive. Partitioning your hard drive designates usable space on your hdd.

And you need to format your hard drive. Formatting installs a file system on to your hard drive, it allows the operating system to read, write and overall understand the data stored on the disk. Without it, an OS cannot keep track of file locations, nor can it typically identify already used sectors (space) on a hdd. 
However, neither of these two concepts are tests.  
7 0
3 years ago
Which two statements describe benefits of a block-based coding language
gladu [14]
Answer D and B I think
8 0
2 years ago
Read 2 more answers
Other questions:
  • What internet service provider first dominated the internet in the 1990s?
    15·1 answer
  • Prompt the user ‘Enter a row vector of any numbers’ in the command window, and enter an arbitrary row vector and store it to x.
    6·1 answer
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;
    8·1 answer
  • Why are I/O (input/output operations) important in database environment?
    8·1 answer
  • I’ll mark brainliest if correct
    10·1 answer
  • 2. The Internet could best be described as: *
    12·1 answer
  • List of rules for expert systems​
    6·1 answer
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
  • mary needs to rename her report.txt file to final_report.txt. which command will allow her to do this?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!