1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
10

With,user receive recommendations for items that are similar in type to items they already like.

Computers and Technology
1 answer:
Dennis_Churaev [7]3 years ago
6 0

Answer:

Collaborative filtering

Explanation:

This is one out of five on the Recommender system apart from most popular items, Association and Market Basket based Analysis, Content-based analysis, self and hybrid analysis where we use both content-based and collaborative based approach together. And the Recommender system is a very important topic in Data science. For this question, remember that Collaborative filtering focuses on user and various other user's choices which are mathematically alike to concerned users, and which we find with the study of a large data set. Thus, we can predict from our above study that what are going to be likes of concerned users, and at the item level, whether that item will be liked by the concerned user or not. And this is prediction, and we use this approach in Machine learning these days. For this question, and as mentioned in question the requirements, answer is Collaborative filtering.

You might be interested in
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
Alja [10]

Answer:

B. Change the router's default administrative password.

Explanation:

Whenever a user purchase a router for wireless network, a default password has been set for the device, which can be easily accessible to different users on the internet or that particular network. This will  lead to unsecured that particular user in terms of hacking or stealing data or personnel information easily.

To make sure the security of customer on private network, the technician should change the router default password.  

7 0
3 years ago
Yo, how can I bypass the securely filter on a chromebook?
OLga [1]
Open your Chromebook and press the power button for 30 seconds. This should bypass the admin block.

Proxy Websites. Probably one of the oldest methods of bypassing web filters, proxy websites enable users to anonymously connect to websites through outside servers. ...
VPNs. VPNS or Virtual Private Networks, work as a tunnel between two devices. ...
Browser Extensions. ...
Stolen Passwords. ...
Firefox from USB. ...
5 0
2 years ago
There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
Lana71 [14]

Answer:

i dont know i am 13

Explanation:

3 0
3 years ago
Test if value is not less than 13.6.
svetoff [14.1K]

value = whatever you want

if not value < 13.6:

   print("Value is greater than or equal to 13.6.")

else:

   print("Value is less than 13.6.")

5 0
3 years ago
Which part holds the "brains" of the computer?
Rus_ich [418]
The (CPU) holds the “brains” of the computer
7 0
3 years ago
Other questions:
  • Investments in data networks, ip addresses, routers, and switches are ________ because of their impact on productivity, security
    14·1 answer
  • NEED HELP NOW 25 POINTS WILL MARK BRAINLIEST!!!!!!!
    8·1 answer
  • Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv
    9·2 answers
  • We have a 16 GB main memory and 256 MB fully-associative cache, with block size of 64 bytes. We wish to store a 6 x 6 matrix in
    5·1 answer
  • ____ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company,
    5·2 answers
  • Hey guys. Can u help me pls? I need to add number1 and number2 together on Python, I don't know what I'm doing wrong. Thx for yo
    7·2 answers
  • Is backing up computer files done on the hard drive?
    14·2 answers
  • According to chronology, arrange the steps that you need to take during the installation of a ram stick?
    13·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Gr
    8·1 answer
  • G i r l s o n l y j o i n <br> id= ons jcuv jke
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!