1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
15

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, i

ncluding favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?
Group of answer choices

Bit-Torrent

Grid Computing

Software as a Service

Crowdsourcing
Computers and Technology
1 answer:
likoan [24]3 years ago
7 0

Answer:

D. Crowdsourcing

Explanation:

Crowdsourcing can be defined as a collaborative process which typically involves completing a project (task) and solving a problem through a group of people (crowd) that are geographically dispersed over the internet.

Basically, crowdsourcing refers to an outsourcing technique which allows a project or task to be jointly completed by a group of people (crowd) such as volunteers or freelancers who are made to work remotely over the internet.

<em>In this scenario, an online music provider such as Pandora or Jango uses crowdsourcing for collaborative filtering, which helps define the list of songs available to listeners. </em>

You might be interested in
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
3 years ago
Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
fomenos
Plan to purchase
Deploy
Support/ upgrade
Retire
Support/ upgrade
Deploy
6 0
3 years ago
Your friend sends you a computer game. after installing the game on your computer, you realize that it plays very slowly. you kn
dsp73
Memory possibly. Or another pricessor.
8 0
3 years ago
What should the timing of transition slides be per minute?
PolarNik [594]

How Many Slides to Use in a Presentation and for how long?

In the past if you asked a presentation skills “pundit” you were likely to hear “one slide per minute,” but times are changing and I don’t think the answer is as simple as a certain number of slides per minute. A presentation slide is supposed to be on for 15 seconds and stop to ask if anyone has any questions, if you are explaining something or reading alond with the slide it could be as long as you want it to be.

5 0
3 years ago
Read 2 more answers
The gene form of a trait is called a(n) ​
Rom4ik [11]

Answer:

alleles

Explanation:

7 0
3 years ago
Other questions:
  • A firewall is either software or dedicated hardware that exists between the __________ being protected.
    13·1 answer
  • What is needed to create a good problem statement?
    10·1 answer
  • A ________ restricts the number of a certain type of product that can be imported into a country.
    5·1 answer
  • On which of the following pointing devices can you control the pointer by sliding your fingertip?
    11·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • Because people can easily upload information and share online, they tend to:
    15·1 answer
  • Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
    6·1 answer
  • When evaluating platforms, what is the key factor in ensuring a platform addresses an organization's needs?
    8·1 answer
  • Which is an advantage of using a flat file instead of a relational database?
    9·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!