1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
3 years ago
11

K means clustering can be used to perform hiearchal clustering as it requires k (number of clusters) as an input parameter

Computers and Technology
1 answer:
Marina86 [1]3 years ago
7 0
True because i guessed and it’s most likely the newer
You might be interested in
Add comma(s) where needed, if needed.
guajiro [1.7K]

Answer:

My birthday, October 31, 2005, is on Halloween.

Explanation:

4 0
2 years ago
1. Do our shared social experiences lead us to think<br><br> communication is a cure-all?
egoroff_w [7]

Answer:

Yes

Explanation:

Shared social illustrations have always shown that any problem of any kind can be sorted by communication.

Eg : Whenever societies face any problem - eg recession, the competent people related to that area of problem (representing different interests of various groups also) sit & discuss (ie communicate in detail) about it.  

These communications have seen to be solution to all problems world has faced.

3 0
3 years ago
____ are systems in which queues of objects are waiting to be served by various servers
Ksju [112]

Answer: Queuing systems

Explanation:

We have  the queuing theory which gives us the in depth knowledge of queuing systems which helps us to predict the queue length and the waiting time at the respective nodes in an network. A group of queuing systems together constitute the queuing network. The queuing theory helps to cope with the demand of various services in an queuing network composed of queuing systems.

4 0
3 years ago
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
Mille gets a text from her friend asking if she wants to come over. It seems like a bit of a hassle to go to her friend's house,
Licemer1 [7]

Answer:

OC. It will be a more positive experience if she spends time with her friend in person.

Explanation:

You should always spend time with people in person rather than online whenever you get the chance.

8 0
2 years ago
Other questions:
  • #TODO: Define a data structure to keep track of which links are part of / not part of the spanning tree.
    14·1 answer
  • What is a benifit of having a client/server network?
    6·1 answer
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • In C please:
    5·1 answer
  • Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
    13·1 answer
  • There are....... section in<br>cpu<br>​
    15·1 answer
  • You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the serve
    7·1 answer
  • True or false, USBs are slower than RAM.
    15·1 answer
  • An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity o
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!