1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
14

are designed to locate information based on the nature and meaning of Web content, not simple keyword matches Select one: a. Cra

wler search engines b. Information retrieval engines c. Semantic search engines d. Web directories
Computers and Technology
1 answer:
san4es73 [151]3 years ago
4 0

Answer: C. Semantic Search Engines

Explanation:

Semantic search is simply search with meaning. It is designed to locate information based on the nature and meaning of Web content, not simple keyword matches (like in lexical searches)

You might be interested in
How should the administrator enable users with permissions to use einstein analytics features
wariber [46]

Answer:

Einstein analytics plus user

Explanation:

Einstein data insights is a platform that can be used by a company to analyse Salesforce report. With a subscription to this platform, an administrator can grant limited access to users in the company and monitor the logs and reports.

To grant a user access to Einstein data insights, go to setup and find permission set on the quick find box, on the "permission set", click on "einstein analytics plus user", then click on "manage assignment | add assignment". Add the users you want and then click on "assign".

4 0
3 years ago
In 4-bit two's complement representation, what is the binary encoding of the number -5?
Katena32 [7]

Answer:

a) 1011

Explanation:

In 4 bit two's complement representation, the first bit is the sign bit.

If the sign bit is 1, the number is negative.

If the sign bit is 0, the number is positive.

What is the magnitude of the sign bit?

In n-bit two's complement representation, the magnitude of the sign bit is:

2^{n-1}-1

So, in 4-bit two's complement representation, the magnitude of the sign bit is:

2^{4-1}-1 = 8

Since the number is negative, the value of this bit is -8.

The other bits are magnitude bits, positive.

We have that the sum of these bits must be -5, and we already have -8. So what should be the value of these last 3 bits?

First, i am going to solve this equation to find the decimal value of the last three bits.

-5 = -8 + x

x = 3

So, the last three bits are:

3_{10} = (011)_{2}

The binary encoding of the number -5 is:

a) 1011

5 0
3 years ago
“The software crisis is aggravated by the progress in hardware technology?” Explain with examples
exis [7]

Answer:

Basically, dealing with the "software crisis" is what we now call software engineering. We just see the field more clearly now.

What this crisis was all about is that in the early days of the modern technological era -- in the 1950s, say -- there was tremendous optimism about the effect that digital computers could have on society, on their ability to literally solve humanity's problems. We just needed to formalize important questions and let our hulking "digital brains" come up with the answers.

Artificial intelligence, for example, had some early successes in easy to formalize domains like chess and these sorts of successes led to lots of people who should have known better making extremely naive predictions about how soon perfect machine translation would transform human interaction and how soon rote and onerous work would be relegated to the dustbin of history by autonomous intelligent machines.

7 0
3 years ago
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is kn
Zina [86]
A) Social Collaboration

Social Collaboration is a way for people to combine their information and make it easier to go through and to work well as a team.
7 0
3 years ago
What is a segment
monitta
A length of uninterrupted cable connecting two devices
3 0
3 years ago
Other questions:
  • Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4
    13·1 answer
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • Recall the insertion-sort-like algorithm in Problem 4 from Homework 2, where you know that certain pairs of contiguous items in
    15·1 answer
  • Which is a feature of a search engine? stores web pages belonging to a single website displays web pages within a browser finds
    8·1 answer
  • What are the two types of computer keyboards and how are they different?
    6·2 answers
  • python An instance variable named counter of type int An instance variable named limit of type int. A constructor that takes two
    15·1 answer
  • Arrange the steps involved in natural language generation.
    9·1 answer
  • If a work is in the public domain… Group of answer choices its copyright has expired. it may not be used for commercial purposes
    9·1 answer
  • What's the difference between a robot and a machine?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!