1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
3 years ago
15

Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a

nd relationships in a data set.
Computers and Technology
1 answer:
anastassius [24]3 years ago
7 0
Using Supervised Data Mining
You might be interested in
Which of the following restricts the ability for individuals to reveal information present in some part of the database?
Anni [7]

Answer:

it would have to be flow control which would be C.

Explanation:

8 0
3 years ago
The google android mobile operating system is a proprietary system, for use on only approved devices.​
balandron [24]
I would choose b. False
7 0
3 years ago
What can be defined as in information technology environment?
natka813 [3]
Here is your answer

7 0
3 years ago
Read 2 more answers
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
The practice of spamming has been growing because telephone solicitation is no longer legal. it is good advertising practice and
Ratling [72]

The given question is not a true or false question. It is a Multiple Choice question. By googling it you can find the correct question here https://www.coursehero.com/file/poq0d6/The-practice-of-spamming-has-been-growing-because-a-it-is-unregulated-b-it-is/

The practice of spamming has been growing because it is so inexpensive and can reach so many people.

Option: D.

<u>Explanation:</u>

Spamming is sending unsolicited messages which is mostly used to prank initially. Spamming has increased these days in various forms and platforms, Mainly in the marketing field, in the form of email, direct messages, etc, to advertise products.  

There are various tools that can send a message along with the sender's website or product links to multiple recipients. These tools are widely used in the spamming process. These tools require only a small amount of money either to buy a membership or to send the messages.

Moreover, most of the people around the world using smartphones have mail ids and smartphones have access to the Internet. Either 2 out of 5 people will get attracted to the message and visit the respective sender's site. That, in turn, builds traffic to the sender's site or makes the recipients buy the sender's product or services.

7 0
3 years ago
Other questions:
  • You have a website that sells widgets, and you have a category page specifically for blue widgets. After some extensive outreach
    5·1 answer
  • ​ Search engines can perform date-filtered searches because, when web servers send a webpage to a ____, they include a header th
    11·1 answer
  • Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (C
    14·1 answer
  • 30 POINTS!!!
    9·2 answers
  • What is python?????????
    11·1 answer
  • Short Questions: a) What is website? How can we browse internet using website?​
    9·1 answer
  • Select the correct answer.
    7·1 answer
  • What does the windows update feature allow you to do?
    7·2 answers
  • Question 1 (1 point)
    13·1 answer
  • I WILL GIVS BRAINLIEST IF U ANSWER THIS
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!