1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
3 years ago
10

Td udutdiydiyfyfigciydutdutdtt

Computers and Technology
2 answers:
luda_lava [24]3 years ago
5 0

hghsFHSkuhsdggewyewGUKweutgqeYFGYhgsukGFwufYHFUKyfukyfeukfrgkufwrGwukfrgtuskgtweYRtueoytewiuWYI7W

Vlada [557]3 years ago
5 0

Alaisijakqko, akkakakaoskaksk. Aikaidodowkakskajjaja! Akkakakakakakkakakajajdiwowopwjdxn.

You might be interested in
Jim, the IT director, is able to complete IT management task very well but is usually two weeks late in submitting results compa
oee [108]

Answer:Effective but not efficient

Explanation:

Jim is effective because he was able to complete the IT tasks well but he is not efficient because he didn't submit the result on time because being efficient includes management of time.

5 0
4 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
The appropriate use of social media includes _____. having arguments with people with whom you disagree having arguments with pe
lesantik [10]

An appropriate use of social media includes: C. having thought-provoking debates.

<h3>What is social media?</h3>

Social media refers to a collection of Internet software applications which are designed and developed so as to avail end users an ability to add, share and discuss different information, as well as enhance collaboration and debates between community members over the Internet.

In this context, we can logically deduce that having thought-provoking debates and making constructive posts are appropriate use of social media.

Read more on social media here: brainly.com/question/25546524

#SPJ1

3 0
2 years ago
You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation
kompoz [17]

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

4 0
3 years ago
Which of these is NOT a benefit of being connected 24/7?
Serjik [45]

Answer:

c

Explanation:

answering messages is a more of a choice than a benifit.

3 0
3 years ago
Other questions:
  • The command for creating a PivotTable is found in the <br> tab.
    7·1 answer
  • Lewis is using a stylus with his touch screen computer in order to draw a
    8·1 answer
  • Steps to log out of an email account ​
    5·2 answers
  • Application software definition word excel powerpoint microsoft
    13·1 answer
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • How do you change the order of the slides in your presentation in the slide pane 
    15·2 answers
  • Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. N
    11·1 answer
  • A company is looking for an employee to assign passwords to all of its
    5·1 answer
  • What is the purpose of heading tags?
    15·1 answer
  • The _________________ can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstall
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!