1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
4 years ago
13

What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz

es every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
Computers and Technology
1 answer:
Hunter-Best [27]4 years ago
6 0

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

You might be interested in
Check ALL of the correct answers.
Lelu [443]

Answer:

2,3,4

Explanation:

Starts at two, goes to four. Thus it prints 2,3,4

8 0
3 years ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
4 years ago
Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities. Which
Flauer [41]

The subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

<h3>What is SRS document?</h3>

SRS document of the software requirement specification document is the document which describes the function of a software and its procedure to perform a particular function.

Different types of requirement-

  • A. External Interface Requirements- This includes the interface of used, such as layout of screen, button etc.
  • B. Design Constraints- This includes the subcomponent of the system, such as performance requirement.
  • C. Inverse Requirements- It defines that what a system can not do.
  • D. Logical Database Requirements- Data of the user are saved in this such as profile, massage,data formats, data integrity, and storage capabilities etc.
  • E. Non-Functional Requirements-This includes attributes of system, performance, security etc.

Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities.

Thus, the subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

Learn more about the SRS document here:

brainly.com/question/26161636

#SPJ1

4 0
3 years ago
Does anyone else realize how the only tutor is for math never any other subjects?​
Slav-nsk [51]

Answer:

yes I do and I wonder why ??

7 0
3 years ago
What did you predict will happen? Check all that apply. The lioness will attack Thisbe. Thisbe will stay hidden in the cave to a
sesenic [268]

Hi,


Everything applies. It is impossible to predict based on the current data. All scenarios are possible with equal possibility.


Hope this helps.

r3t40

5 0
4 years ago
Read 2 more answers
Other questions:
  • numbers that the user inputs. You must use JoptionPane to input the three numbers. A first method must be called and used to dev
    13·1 answer
  • When computer manufacturers overcame the enormous 13,000 Chinese character barrier by creating a workable keyboard through voice
    15·1 answer
  • Clifford visits a website that has a lot of multimedia content. He watches a few videos. However, some videos do not play. The b
    14·1 answer
  • Cover page styles in the cover page gallery match the preformatted styles in word, making it easier to create a coherent style b
    5·1 answer
  • When you create an internal hyperlink, you create the link that points to the bookmark using the anchor tag with which attribute
    15·1 answer
  • Write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be follo
    15·1 answer
  • All web traffic is based on the ____________________ protocol.
    14·1 answer
  • Where is the best place to self learn c++ or c# that is free?
    6·2 answers
  • The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions:
    10·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!