1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
6

What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz

es every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
Blacklist filtering
Whitelist filtering
Bayesian filtering
Extension filtering
Computers and Technology
1 answer:
Burka [1]3 years ago
5 0
Answer:
Bayesian filtering

The type of filtering software that divides email messages that have been received into two piles, spam and non-spam, and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the non-spam pile is known as Bayesian filtering.

Hope this helps you!
- Lex
You might be interested in
If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
Nikolay [14]

If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill.

<h3>What is telnet used for?</h3>

Telnet is known to be a kind of a network protocol that is said to be used to virtually look into a computer and to give a two-way, working hand in hand and text-based communication channel that exist between two machines.

Note that, If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill because it does not apply in any way.

Learn more about telnet from

brainly.com/question/23640188

#SPJ1

4 0
2 years ago
Which of the following is true of tape? Group of answer choices It is no longer used as a primary method of storage but is used
seraphim [82]

Answer:

It is no longer used for long-term storage and backup but is used most often as a primary method of storage.

7 0
3 years ago
What is the root of the tree?
Alexus [3.1K]

Answer:

root is an ancestor of all other nodes in a tree.

Explanation:

Root is a special node in the tree which is an ancestor of all other nodes.For example, consider a binary tree with root R. Let C1,C2 be the children of R at level 1. Similarly, C11,C12 are the children of C1 at level 2 and C21,C22 are the children of C2 at level 2. Now the parent of C22 is C2 and the parent of C2 is root R. Similar is the case for all other child nodes. Hence, Each node in the tree will have the root node R as its ancestor.

3 0
4 years ago
Which one of the following types of statements is an instruction to replace the existing value of a variable with another value?
Greeley [361]

Answer:

The answer is "Option c"

Explanation:

The assignment is the statement used to determine the value of the programming variable. It is also regarded as the same sign indicating the function (=) in the operator. This operand works by allocating the operand's value to the right-hand side, and other choices are not correct that can be described as follows:

  • In option a, It is a keyword that is used to update table details.
  • In option b, It is part of programming, which is used to the declared variable.
  • In option d, It is used to assign value in variable.  
8 0
4 years ago
In pre-shared key mode, a passphrase should be at least ________ characters long.
alexandr402 [8]
10.......................................

8 0
3 years ago
Other questions:
  • A device that produces a permanent human-readable text of graphic document.
    15·1 answer
  • What is intergrated circuit ic​
    10·1 answer
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • A bank system mainframe is struck by a DDoS attack and goes offline. Customer’s cannot log on to their accounts. Which element o
    11·1 answer
  • Why would you group data in a report? SQL
    9·1 answer
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • Create a presentation on “Pets” and customize your presentation in the following ways:
    10·1 answer
  • Which is the smallest form of data <br>a)bit <br>b)byte<br>c)nibble<br>d)8 binary digits<br>​
    10·1 answer
  • Many companies ban or restrict the use of flash drives
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!