1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
4 years ago
10

Collaborative filtering is

Computers and Technology
1 answer:
vazorg [7]4 years ago
4 0

Answer:

A: used by ISP's to filter out email SPAM

C: a way to help an individual focus on best choices when deciding what to watch or buy.

Explanation:

Collaborative filtering uses a community-based approach to filter spam. It works by collecting numerous email users from around the world. By doing this, it becomes possible for users to flag emails that are spam and those that are legitimate.

Also Collaborative Filtering is one of the most efficient techniques for building a system that can help a user when it comes to recommending best choices based on information from a large number of users.

You might be interested in
Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
yaroslaw [1]
Report the person through proper channels
7 0
3 years ago
There is one clear definition of IT. True False
Elenna [48]

Answer:

That is False. it has more definitions not only one.

8 0
3 years ago
Write a program to create an interface Shape containing the method declarations of area and perimeter. Then, create a class Rect
irakobra [83]

Answer:

Explanation:

An interface is similar to a class, to create an interface we use interface keyword, in an interface there can be abstract methods and constants only,we can not instantiate an interface.All the variables declared inside an interface are public,static and final  by default.

While using interface child class must use implements keyword

We can define an  interface by using below syntax-

<interface> <interface-name>{

}

For example lets create Shpae interface

interface Shape{

public int area(int length, int width);

public int perimeter(int length, int width);

}

Now lets create Rectangle class-

class Rectangle implements Shape{

public int area(int length, int width){

int area = 0;

area = length * width;

return area;

}

public int perimeter(int length, int width);

int perimeter = 0;

perimeter = 2*(length+width);

return perimeter ;

}

6 0
3 years ago
Directions: Identify the measuring devices and write its functions.
FrozenT [24]

Answer:

1.weigher - to weigh meat

2.

3. scissor - to cut things

4. tongs

5.measuring cups - to measure dry ingredients like flour

6 temperature - measures temperature

7 measuring spoons

5 0
3 years ago
The second row of letters on the keyboard is called the______ row
Mkey [24]
The 2nd row of ur keyboard its called home row !

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of a federal tax? A. Social Security tax B. Sales tax C. Property tax D. Transaction tax
    8·1 answer
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • Which of the following is considered a period cost in absorption​ costing? A. variable manufacturing overhead costs B. fixed man
    7·1 answer
  • Which of the following inputs help robotic vacuum cleaners maneuver around obstacles?
    13·2 answers
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • A vital step in maintaining an operating system is to regularly do what? Replace the hard drive. Organize the computer’s data. R
    11·2 answers
  • Create a cell reference in a format by typing in the cell name or
    12·1 answer
  • What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary se
    13·1 answer
  • When creating envelopes, how will you adjust the layout?
    10·2 answers
  • 8. Explain strategies employed by the operating system to ensure safety of programs and data in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!