1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
3 years ago
15

What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as

close together as possible to one another and the different groups are as far apart as possible?A. Association detection.B. Market based analysis.C. Cluster analysis.D. Intelligent agent.
Computers and Technology
1 answer:
mars1129 [50]3 years ago
5 0

Answer:

C. Cluster analysis

Explanation:

<em>Cluster analysis </em>or clustering is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

This statistical method is used to group similar objects into respective categories by <em>identifying trends and patterns</em>.

Cluster analysis is typically used in the <em>exploratory phase of research </em>when the researcher does not have any per-conceived hypotheses. It is commonly not the only statistical method used, but rather is done in the early stages of a project to help guide the rest of the analysis.

You might be interested in
[20 pts] Assume that Bob wants to send a secret message to Alice using RSA encryption. (a) [5pts] (Key generation step) Assume A
Kitty [74]

Answer:

a)Yes Alice can pick 11 has value for her public exponent e

b) The value of d when the public exponent e = 3 is 37

c) The cipher c of the Bob’s message m =2 is 8

d) The cipher c of the Bob’s message m =3 is 18

e) The value of m if c = 3  and the public exponent e = 7 is 16

Explanation:

Find attached the explanation

3 0
3 years ago
Let f and g be two one-argument functions. The composition f after g is defined to be the function x 7→ f (g (x)). Define a proc
Ghella [55]

Answer and Explanation:

(define (compose f g)

(lambda (x) (f (g x))))

6 0
3 years ago
Which keyboard shortcut opens the find and replace dialog box to the replace tab?
Vsevolod [243]

Answer:

CTRL + F

Explanation:

usually CTRL + F but it would depend on the program  

3 0
2 years ago
Which two men developed the steam engine?
Whitepunk [10]

Answer:

Thomas Savery and Edward Somerset.

Explanation:

6 0
4 years ago
Where should a "deny all catch all" rule be positioned and why?<br> pleaseeee help!
insens350 [35]

Answer: For best performance and lowest latency, the MMU and CPU should support hardware ... broadcast, and subnet broadcast traffic with the deny-all catch-all filter rule for ... Please refer to the NetSight Wireless Manager User Guide (v5.1 or higher ) for a ... The rule must also be positioned above the 'Deny All' Default action.

Explanation:

6 0
4 years ago
Read 2 more answers
Other questions:
  • Artists who draw images on a computer often use a stylus in conjunction with special _________ tablets, which offer extra-sensit
    15·1 answer
  • It is safe to use your bright headlights if there is a car ahead of you within 300 feet
    9·2 answers
  • Write a function M-file that takes as input two matrices A and B, and as output produces
    8·1 answer
  • Which situation is an example of? "relational context" in the transactional model of? communication?
    12·1 answer
  • HURRY UP NEED HELP!!! What are examples of curricular education? Check all that apply.
    9·2 answers
  • The_provides access to the internet may also be internal​
    9·1 answer
  • The smallest unit of storage is​
    15·1 answer
  • Complete the statement using the correct term.
    10·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Give three examples of NON-TRADITIONAL web authoring tools<br> 3 pour
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!