1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
12

How would this requirement be implemented?

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0

Answer:

B. Using a Rate Rule in the Community Manager

Explanation:

Rate rules are techniques to protect your community from spammers and web bots that attack or spam your community by posting the similar message several times in a row. You can build rate rules to alert your community moderators of suspicious spammer-like activities in your community or freeze a member on the spot.

Take for example, when the universal shipping introduces a rate rule to their comunity, Community Moderators will now be alerted when a member post more than one file to the community within a 15-minute window thereby making them frooze the account accordingly.

You might be interested in
A program that is used to view websites is called a​
Nookie1986 [14]

Answer:

A web browser

examples of this would be

Bing

6 0
3 years ago
Read 2 more answers
Which three items might appear on the project plan when discussing an upcoming website with a design team? (Choose three)
stepladder [879]
Planning and analysis, due dates and payment details .
5 0
3 years ago
What is the name of database of viruses that an antivirus software scan for?
Andrew [12]

Answer:

Anti virus scanner. i hope :)

Explanation:

7 0
3 years ago
The K-Means algorithm terminates when:_______
gavmur [86]

Answer:

b. the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.

Explanation:

K-mean algorithm is one of the mot widely used algorithm for partitioning into groups of k clusters. This is done by partitioning observations into clusters which are similar to each other. When using k-mean algorithm, each of the different clusters are represented by their centroid and each point are placed only in clusters in which the point is close to cluster centroid.

The K-Means algorithm terminates when the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.

7 0
4 years ago
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
3 years ago
Other questions:
  • The network layer, or osi layer 3, provides services to allow end devices to exchange data across the network. to accomplish thi
    15·1 answer
  • "Common knowledge" must always be credited or else it is considered plagiarism?<br> True<br> Fales
    5·1 answer
  • A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device.
    5·1 answer
  • Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
    9·1 answer
  • What is the full form of PDP​
    7·1 answer
  • Which piston stroke of the four-stroke cycle prepares the fuel mixture for combustion??
    8·1 answer
  • Who tryna play among us
    8·2 answers
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    11·1 answer
  • Layers allow you to work with one element of an image without disturbing the others true or false​
    15·1 answer
  • A data mart is the operational database for the company. group of answer choices true false
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!