1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
12

You use a web browser to search for “winter sweaters” on your laptop. Later, you are playing a game on your phone and an ad show

ing eight sweaters appears. This might be a coincidence, but it is more likely that your web browser did which of the following?
A
input-output allocation

B
binary conversion

C
data mining
Computers and Technology
2 answers:
melomori [17]3 years ago
8 0

Answer:

C

data mining

Explanation:

they are seeing what you are interested in and creating personalized adds

Free_Kalibri [48]3 years ago
8 0

Answer:

The correct answer to the following question will be Option C (Data mining).

Explanation:

Data mining seems to be a method that businesses will be using to turn the relevant data into usable details. It's the process of scanning systematically for massive data stores to find correlations and developments that go beyond basic research.

  • This uses advanced statistical algorithms to slice the details and determine the possibility of possible happenings.
  • You get what you are involved in and interested in and you make customization adds.

You might be interested in
Universal Containers are using Salesforce for Order Management and has integrated with an in-house ERP system for order fulfilme
Crazy boy [7]

Answer:

1. The change can be performed in Production, as it is a configuration change.

2. Integration with the ERP system may not function as expected.

Explanation:

3 0
3 years ago
____________ signs, as discussed by Charles Peirce, involve an "existential" relationship between the sign and the interpretant.
astraxan [27]

Answer:

Indexical Signs

Explanation:

According to Charles Peirce, when there is "existential" relationship that exist between the sign and interpretant, then indexical signs are involved. This implies that at some point in time, they have existed at the same time or in the same place. One indexical sign of a human being is Fingerprints. However, photographs are classified as indexical signs testifying that at some moment, the camera was present.

8 0
4 years ago
When choosing a new computer to buy, you need to be aware of what operating ____a0 it uses.
Lana71 [14]

Answer:

operating system

Explanation:

There are a lot of operating systems in the market. Ubuntu, red hat, windows, apple Macintosh etc. The choice of an operating system changes all the version of software used in the system. Therefore, while choosing a computer one must be aware of the operating system used in it.

7 0
3 years ago
Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
Ivan
Most likely you would trade shares
7 0
3 years ago
Read 2 more answers
A subclass can directly access____.
Otrada [13]

Answer:

A subclass can directly access public members of a superclass.- first choice

7 0
3 years ago
Other questions:
  • Ruth knows the name of a presentation file and the folder it's in, but there are many files in that folder. How can Ruth quickly
    8·1 answer
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • In object-oriented development, why is it necessary to use drivers and stubs in testing?
    9·1 answer
  • IN YOUR OWN WORDS, create a new thread and compare and contrast paraphrasing, summarizing, and quoting and how to do each succes
    14·1 answer
  • Which of the following is not a SQL*Loader file?
    11·1 answer
  • Alan wants to buy camera support equipment that would provide mechanical support to his camera and which could also store extra
    5·1 answer
  • 100 in hexadecimal then. binary
    11·1 answer
  • Which goal of design theory can be described as the proper distribution
    7·1 answer
  • Many universities form tight-knit alumni networks, causing the alumni to continue to use each other as a resource for career pla
    6·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!