1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
9

What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?

Computers and Technology
1 answer:
Nastasia [14]3 years ago
5 0

Answer:

"Classification" is the correct answer to this question.

Explanation:

Classification is primarily a method of data processing, it makes easy for information to be separated and divided into a different business or personal goals by the data set demands.  

  • It's also known as a mechanism of sorting or identifying information in different types of aspects or groups in the categorization of data.
  • It is used to allocate the confidential information to the level of sensitivity.
You might be interested in
Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
egoroff_w [7]

Answer:

Option A is correct.

Explanation:

He attaches the second 1 Gigabyte 240 pins DIMM for his system the overall RAM will be up around 2 Gigabytes. System is fitted with Intel Core 2 Dual 3-GHz cpu as well as three 240 pins DIMM ports on the motherboard. Transforms on a system, just 1 Gigabytes of RAM is seen through that RAM count.

Thus, the following issue is much more probably to be the failure to correctly grab that RAM.

5 0
4 years ago
In a swap you need a variable so that one of the values is not lost ? Need help
emmasim [6.3K]

Answer:

In a swap, the variable is cuttly.x

Explanation:

7 0
3 years ago
Read 2 more answers
If you receive an email message you suspect is spam, what should you do?
Alla [95]

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

6 0
4 years ago
JavaScript
Mekhanik [1.2K]

Answer:

C. 40

Explanation:

The code uses IF and ELSE statements to carry execute a block of code if any of the statements hold true

OrderTotal here is greater than 100, and this allows the second IF ELSE block to be executed.

The code to be executed is discountAmount = OrderTotal * 0.2

This will be discountAmount = 200 *0.2

therefore, discountAmount = 40.

3 0
3 years ago
The network backbone
NNADVOKAT [17]

Answer:

it would be b

Explanation:

think about it

5 0
3 years ago
Other questions:
  • Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
    10·2 answers
  • Lee finishes entering all the data. Next, he wants to format the header row so it is easier to read and stands out from the rest
    11·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • What does the action tool allow you to do in Microsoft Powerpoint?
    15·1 answer
  • Juan created new video game for his coding course. What is one way he can explain his code in everyday language?
    7·1 answer
  • A ________ is an input device that responds to finger touch.
    8·2 answers
  • FREE BRAINLIEST!!!
    14·2 answers
  • What is a font tag? And full form of HTML?
    14·1 answer
  • If a student ate 3/4 (three-fourths) of their meals away from home, what % of the total day is spent eating other than at home?
    11·1 answer
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!