1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
12

What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as

close together as possible to one another and the different groups are as far apart as possible?
1. Statical detection
2. Cluster analysis
3. Association detection
4. None of these.
Computers and Technology
1 answer:
Sphinxa [80]3 years ago
0 0

Answer:

The correct answer to the following question will be Option 2 (Cluster analysis).

Explanation:

  • The process of sorting a collection of items in such a manner that objects within the same category are much more identical than objects in many other clusters, known as Cluster analysis.
  • The goal of this analysis would be to create similar groups of topics where "commonality" means a global metric across the entire set of characteristics between each pair of subjects.

The other options, Option 1 and Option 3 would not be able to create common motifs, such groups. Therefore, the correct answer is Option 2.

You might be interested in
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
Which type of operation writes the file system structure to the disk?
n200080 [17]
Formatting<span> writes the file system structure to the disk.</span>
8 0
2 years ago
You suspect that the Web Server, which is located on your network and hosts multiple Internet facing Websites. The Web Server ru
makkiz [27]

Answer:

Block all incoming ICMP requests.

Explanation:

Since  the  web  server  is  hosts  a  lot  of  internet  facing  websites .On investigation it was find out that the web server  is getting  flooded  with  a  lot of  ping  requests  hence  it  becomes unavailable  occasionally. So  to  tackle  this  problem  we  should  block  all  of  the  incoming  ICMP  requests.

5 0
3 years ago
Qué es una magnitud eléctrica
IRISSAK [1]
I only speak English
5 0
3 years ago
To guarantee that the member variables of a class are initialized, you use ____.
Leya [2.2K]
A constructor, member initialization lists and also the default member initializer. Here you see all three (in reality you choose one construct per variable).

class A
{
  public:
    int x = 0;

   A() : x(1)
   {
      x = 2;
   }
};
8 0
3 years ago
Other questions:
  • Declare a structure with a type name: Car containing:
    14·1 answer
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • You can use the results from a search on a database in all of these ways except to ____.
    11·2 answers
  • Creative Commons Question -- At home, you created a really great digital song, audio jingle, or music track using some software
    12·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • what is hyperlink a)the text contained in hypertext documents b)a service provided by the internet c) the location of web pge on
    12·1 answer
  • To show the navigation pane if it is hidden, click the ____ button
    12·2 answers
  • Pig Latin is ______ and fits very naturally in the pipeline paradigm while SQL is instead declarative.
    7·1 answer
  • Place the steps in order for creating a Custom Search Folder in Outlook 2016.
    9·2 answers
  • Identify 5 internal and external hardware components of a server
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!