1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
6

When a cellular telephone user places a call, the carrier transmits the caller’s voice as well as the voice of the person who is

called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data?
I. To determine if a caller frequently uses a specific wordII. To estimate the number of phone calls places next Monday between 10:30 AM and noonIII. To generate a list of criminal suspects when given the telephone number of a known criminala. I onlyb. II onlyc. II and III onlyd. I, II, and III
Computers and Technology
2 answers:
slava [35]3 years ago
4 0
To estimate the number of phone calls that will be placed net monday between 10:30 AM and noon and to generate a list of criminal suspects when given the telephone number of a known criminal
nikdorinn [45]3 years ago
4 0

Answer:

c. II and III

Explanation:

II. To estimate the number of phone calls places next Monday between 10:30 AM and noon

III. To generate a list of criminal suspects when given the telephone number of a known criminala

You might be interested in
PLEASE HELP ASAP!!!!111 Read "Teenagers are rewriting the rules of the news" (find it somewhere and answer questions below)
Ilya [14]

Answer:

Sorry, we picked up your question late. There are a lot of questions, and every now and then some misses out. And I am sure you will understand. However, the cool thing is your answers are correct. I read the complete article on young adults or teenagers and found the same. And I am sure you will agree with the facts, and use its best meaning in your own life. I am, however, listing below all the answers for your complete satisfaction. And I congratulate you, you are up with the correct list of answers.

The answer to the First question is:

B. the description of how influencers follow young social media users"

Second question answer is

C. Andrew Yang

And the third question answer is:

C. Teens and young adults consume and spread news information through social media.

And I am sure you must have liked this article. Article reading is a good habit. You should always start a day by reading one article online or in newspaper.

Explanation:

Please check the answer section.+

4 0
3 years ago
A Turing machine with doubly infinite tape (TMDIT) is similar to an ordinary Turing machine except that its tape is infinite to
umka2103 [35]

Answer and Explanation:

A TM with doubly infinite tape can simulate an ordinary TM. It marks the left-hand end of the input to detect and prevent the head from moving off of that end. To simulate the doubly infinite tape TM by an ordinary TM, we show how to simulate it with a 2-tape TM, which was already shown to be equivalent in power to an ordinary

TM. The first tape of the 2-tape TM is written with the input string, and the second tape is blank. We cut the tape of the doubly infinite tape TM into two parts, at the starting cell of the input string. The portion with the input string and all the blank spaces to its right appears on the first tape of the 2-tape TM. The portion to the left of the input string appears on the second tape, in reverse order.

3 0
3 years ago
E lvl:
Alexxandr [17]
I’m cool here here here pizza
5 0
4 years ago
A group of researchers is designing an experiment to test whether meditation helps people fall asleep faster. The researchers se
storchak [24]

Answer:

Option 4 is the correct answer.

Explanation:

<h2>Randomization eliminates lurking variables from the experiment.</h2><h2 />

Randomization is adopted due to the fact that it removes lurking variables. By lurking variables we mean the extraneous variables which are unknown but can effect the other variables that are of interest.

Randomization is necessary in experiments to ensure that the generated result may not be biased or misleading.

<h3>I hope it will help you!</h3>
3 0
4 years ago
Check the devices that are external peripheral devices:
irina [24]

Answer:

Mouse, and keyboard

Explanation:

Common Sense

6 0
3 years ago
Other questions:
  • The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected by stress.
    10·1 answer
  • Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were se
    7·1 answer
  • Understanding the context of information allows you to apply it to everyday situations as opposed to just___facts like names,dat
    12·1 answer
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • Which two pieces of information must be provided when saving a file for the first time in Wordpad?____.
    8·1 answer
  • What are the buisness debts called?
    7·1 answer
  • Match the elements of a web page with their description
    15·2 answers
  • Short Questions: a) What is website? How can we browse internet using website?​
    9·1 answer
  • Why does it say error on that last line of code
    15·2 answers
  • Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!