1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
12

Write a police description a person who know you well​

Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
3 0

Answer:

I will be describing Jude. He is a neighbor.

Explanation:

A police description refers to the method of describing a person using high-level detailing. An example is given below:

  1. He is a Five feet-three male caucasian
  2. With brown eyes and
  3. an Australian accent
  4. He has a military haircut
  5. About 38 years
  6. Weighs about 95Kg
  7. and dresses casually
  8. he walks with a slant to the left
  9. a dove tattoed at the back of his neck
  10. and a birthmark on his left ear lobe

Cheers

You might be interested in
Mrs. Schlair has an annual salary of $96,402.<br> a. What would her semimonthly salary be?
amid [387]

Answer:$4016.75

Explanation:64333/24

3 0
3 years ago
Sam's manager would like him to share what he learned at a conference. He needs to share the information with twenty coworkers a
murzikaleks [220]

C or D 70% i am sure of it

3 0
3 years ago
Read 2 more answers
In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
madam [21]

Answer:

Application Server

Explanation:

The Application Server is a component in computer engineering that presents the application logic layer in a three-tier architecture.

This functionality allows client components to connect with data resources and legacy applications.

In this process of interaction, the Application Server runs the program code from Tier 1 - Presentation, through Tier 2 - Business Logic to Tier 3 - Resources, by forcing through the business processes.

8 0
3 years ago
k-means is a flat, partitioning clustering technique. how can k-means be used for hierarchical clustering?
Black_prince [1.1K]

K-means can be used for hierarchical clustering by creating a hierarchical tree structure. This is done by setting the number of clusters to be created, and then running the k-means clustering algorithm for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree. This process is repeated until the desired number of clusters has been created.

<h3>The Use of K-Means Clustering for Hierarchical Clustering</h3>

K-means clustering is a popular technique used in machine learning and data mining for partitioning data into clusters. It is a flat clustering algorithm, in which data points are grouped according to their similarity. While k-means clustering is suitable for partitioning data into a fixed number of clusters, it can also be used for hierarchical clustering. Hierarchical clustering is a clustering technique that creates a hierarchical tree structure, where each level of the tree is made up of clusters created by the k-means clustering algorithm.

The process of creating a hierarchical tree structure using k-means clustering is fairly straightforward. First, the number of clusters to be created is set, and then the k-means clustering algorithm is run for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree until the desired number of clusters has been created. This process ensures that the clusters created are meaningful and have similar characteristics.

Learn more about k-means :

brainly.com/question/17241662

#SPJ4

3 0
2 years ago
Which file format results in the smallest file size
Agata [3.3K]
Kilobytes. That the smallest type of file you have on a computer.
6 0
4 years ago
Other questions:
  • Which algorithm is the oldest of the tcp/ip symmetric-key algorithms?
    10·1 answer
  • Modify the definition of the throttle class on page 35, to create a new throttle ADT, which allows the user of the ADT to specif
    6·1 answer
  • In Java the ______________are not objects. All of the rest areobjects, or any ___________ is called as object.
    10·1 answer
  • Shortly after its introduction, the unix software was rewritten in the popular c programming language.?
    10·1 answer
  • What does artifishal inteligence mean
    5·2 answers
  • Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
    6·1 answer
  • The amount of RAM storage is measured in A: GB The rule of thumb that predicts that CPU capacity will double every 2 years is ca
    11·1 answer
  • Why are some geo satellites not usually used for transmitting tcp/ip information?
    5·1 answer
  • Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of
    6·1 answer
  • Simple question: what is bandwidth?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!