1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
4 years ago
14

What does the W in WAN represent

Computers and Technology
2 answers:
Ilya [14]4 years ago
7 0
WAN stands for Wide Area Network.
jeka944 years ago
6 0

Answer:

WAN stands for Wide Area Network.

Explanation:

You might be interested in
With,user receive recommendations for items that are similar in type to items they already like.
Dennis_Churaev [7]

Answer:

Collaborative filtering

Explanation:

This is one out of five on the Recommender system apart from most popular items, Association and Market Basket based Analysis, Content-based analysis, self and hybrid analysis where we use both content-based and collaborative based approach together. And the Recommender system is a very important topic in Data science. For this question, remember that Collaborative filtering focuses on user and various other user's choices which are mathematically alike to concerned users, and which we find with the study of a large data set. Thus, we can predict from our above study that what are going to be likes of concerned users, and at the item level, whether that item will be liked by the concerned user or not. And this is prediction, and we use this approach in Machine learning these days. For this question, and as mentioned in question the requirements, answer is Collaborative filtering.

6 0
3 years ago
Pete Jones, a bait shop owner, incorporates ______ within a webpage to entice customers to buy a new lure.
padilas [110]

Answer: CTA

Explanation:

Call to action (CTA) is a piece of content, or an aspect of webpage, advertisement which encourages the audience to do something.

CTAs help an organization or company to convert a reader or visitor to a lead which will be sent to the sales team. Pete Jones, a bait shop owner, incorporates CTA within a webpage to entice customers to buy a new lure.

3 0
4 years ago
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
Svet_ta [14]

Answer:

C. SQL injection.

Explanation:

SQL is a relational database that is used by websites and web applications to hold data needed in the application. websites or applications with relational database like SQL are prone to SQL injection attacks.

SQL injection attacks are used to run malicious SQL statement to take control of the databases run by a website or application. With the vulnerability, an attacker can modify the content of a website's SQL database or can retrieve all data from it, after bypassing the security.

The data transmitted to the website or application from the fields in the datasheet can be manipulated or modified.

3 0
4 years ago
To "chunk” an assignment means
Flauer [41]
Chunking is breaking skills or information into smaller, more manageable segments in order to help students.
3 0
4 years ago
Read 2 more answers
Data is information, information is Data, comparison of both​
adelina 88 [10]

Answer:

"Data is raw, unorganized facts that need to be processed. Data can be something simple and seemingly random and useless until it is organized. When data is processed, organized, structured or presented in a given context so as to make it useful, it is called information. Each student's test score is one piece of data. "

Data is defined as facts or figures, or information that's stored in or used by a computer. An example of data is information collected for a research paper. An example of data is an email.

Hope this Helps

Mark Brainiest

3 0
3 years ago
Other questions:
  • Which magazine can help public determine best technology to buy
    12·1 answer
  • Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri
    15·1 answer
  • How can I use the word technology in a sentence
    6·2 answers
  • What is obtained after processing data?​
    8·1 answer
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D.
    7·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • 1.
    9·1 answer
  • What should be entered to make the loop print
    6·1 answer
  • Explain with examples what is software​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!