Answer: D technical skills
 
        
             
        
        
        
The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:
- Class immobility
 - Systemic racism
 
<h3>What are the 
biases in word embedding?</h3>
Word embeddings is known to be made up of a high level bias such as group stereotypes and prejudice. 
The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:
Class immobility
Learn more about biases  from
brainly.com/question/24491228
#SPJ1
 
        
             
        
        
        
Answer:
thanks you too mah dude! :) 
Explanation:
 
        
             
        
        
        
Answer:
The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.
Explanation:
Solution:
The following reasons why Proponents  of IPs used IPV6 instead of IPv5 is stated as follows:
- Due to its limited 32 bit addressing
 
- IPv6 offers almost unlimited addressing because of its 128-bit addressing
 
- IPv5 started under a different name which is internet stream(ST)
 
- ST(Internet streaming) was developed for streaming video and voice
 
- ST was developed by Apple, NeXT, and Sun Microsystems
 
- ST was effective on specific frequency to carry out communication
 
 
        
             
        
        
        
Answer:
A. Information System Security (ISS)
Explanation:
Information System security is a very important security in any organization.
The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.
Information system security, or infosec for short, is the modality involved in protecting information and in making it available. 
With Infosec,
1. an organization's ability to perform is protected
2. the data an organization uses is protected ensuring integrity
3. programs, applications and technology implemented on an organization's systems are safely used.
Hope this helps!