1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
5

Load the we8there data set from the textir package. List the first 5 restaurants’ ratings from we8thereRatings. Based on we8ther

eCounts, what’s the maximum number of times a certain bigram was mentioned in a certain review? [Ref. Page 262].
Computers and Technology
1 answer:
Readme [11.4K]3 years ago
3 0

Answer:

> we8thereRatings[1:5,]

  Food Service Value Atmosphere Overall

1     5       5     5          5       5

2     5       5     5          5       5

5     5       5     4          4       5

11    5       5     5          5       5

12    5       5     5          4       5

You might be interested in
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Security is essential to keep in mind when doing business online. Select three tips for keeping customers' private
zlopas [31]
Make sure credit card processing uses a digital certificate to verify the processing site
5 0
2 years ago
_____ is an example of a Google filetype operator.​
shtirl [24]

Answer:

d. all of the above

Explanation:

Google filetype operator enables restricting the search results to the specified file type. For example if you are searching for Eiffel Tower and you want to restrict the results to pdf files then the query will be of the form Eiffel Tower filetype:pdf . Similarly for text file results you need to specify the search query as Eiffel Tower filetype:text. The Google filetype operator supports several different file types.

3 0
3 years ago
Use the _____ and _____ features to prevent field columns from showing or to view two nonadjacent field columns for comparison.
vichka [17]

Answer:

1. hide

2. freeze

Explanation:

A database such as SQL is considered as a well-structured group of information that is managed in a computer or server for easy access when needed to call upon.

Therefore, in any given database management, a lot of tasks can be done, among other several other features available is the HIDE and FREEZE functions.

Hence, a user can use the HIDE and FREEZE functions to prevent field columns from showing or to view two nonadjacent field columns for comparison in database management.

Hence, in this case, the correct answer to the statement presented is to HIDE and FREEZE

3 0
3 years ago
Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them
ad-work [718]
Windows uses a memory-management technique known as SuperFetch to monitor which applications you frequently use and preloads them into your system memory.
This technique is designed to speed up app launching by preloading certain apps based on the usage patterns of the user.

4 0
3 years ago
Other questions:
  • Learning about public speaking can help improve your ________________.
    15·1 answer
  • Which type of transmission do modems use ?
    15·2 answers
  • While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
    7·1 answer
  • The "A" in the CIA triad stands for "authenticity". True False
    5·1 answer
  • why might a portrait be both a portrait of the subject and the photographer? how is a photographer present in a portrait?
    10·2 answers
  • Summarize why understanding the differences between surface culture and deep culture may inform your knowledge, skills, and prof
    14·1 answer
  • You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
    9·1 answer
  • I came here for a answer so why did i get a pep talk
    7·2 answers
  • Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y =
    15·1 answer
  • Which of the following is NOT a long-term storage device?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!