From Google:
"<span>a built-in C++ function that returns the current time(according to your computer system's clock) as seconds elapsed since midnight on January 1, 1970; often used as the seed argument in the srand function; a program that uses the time function must contain the #include <ctime> directive"
I hope this helps you with your question</span>
K-means can be used for hierarchical clustering by creating a hierarchical tree structure. This is done by setting the number of clusters to be created, and then running the k-means clustering algorithm for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree. This process is repeated until the desired number of clusters has been created.
<h3>The Use of K-Means Clustering for Hierarchical Clustering</h3>
K-means clustering is a popular technique used in machine learning and data mining for partitioning data into clusters. It is a flat clustering algorithm, in which data points are grouped according to their similarity. While k-means clustering is suitable for partitioning data into a fixed number of clusters, it can also be used for hierarchical clustering. Hierarchical clustering is a clustering technique that creates a hierarchical tree structure, where each level of the tree is made up of clusters created by the k-means clustering algorithm.
The process of creating a hierarchical tree structure using k-means clustering is fairly straightforward. First, the number of clusters to be created is set, and then the k-means clustering algorithm is run for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree until the desired number of clusters has been created. This process ensures that the clusters created are meaningful and have similar characteristics.
Learn more about k-means :
brainly.com/question/17241662
#SPJ4
Answer:
Explanation:
In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).
However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.
A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.
An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.
A type of virus that influences this circumstance in the network bandwidth is a worm.
<h3>What is Virus in technology?</h3>
In computers and technology, viruses may be characterized as a sort of malicious software, or malware, that extends between computers and provokes a deterioration of data and software either partially or completely.
The complete question is as follows:
- A micro virus
- a multipartite virus
- A worm
- a program virus.
Worms are memory-resident viruses that duplicate over the network resources. The primary consequence of this type of virus is to rapidly eradicate network bandwidth with its duplication.
This virus may also be competent to accomplish a Denial of services invasion by slamming O.S and servers.
Therefore, the correct option for this question is C, i.e. a worm.
To learn more about Computer viruses, refer to the link:
brainly.com/question/26128220
#SPJ1