1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
12

Assessment

Computers and Technology
1 answer:
muminat3 years ago
6 0

Answer:

A. With content-based filtering, users

receive recommendations for items

liked by similar users.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Content-based filtering uses an algorithm to recommend to users what they like.

The statement about content-based filtering which is false is that, with content-based filtering, users

receive recommendations for items

liked by similar users.

You might be interested in
1. Why was the Internet created?
lana [24]

Answer:

1. The internet is any set of computer network that communicates using standardized protocols.The Internet was first invented for military purposes, and then expanded to the purpose of communication among scientists

2.ARPANET was the network that became the basis for the Internet. Based on a concept first published in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four university computers.

3.The first permanent ARPANET link was established on 21 November 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute.

4. Vinton Grey Cerf born june 23rd 1943 in New Haven Connecticut is considered to be the father of internet.

5.Mosaic is a converged platform, which offers data engineering, advanced analytics, knowledge-led automation, IoT connectivity and improved solution experience to its users. Mosaic enables organizations to undertake quantum leaps in business transformation, and brings an insights-driven approach to decision-making. It helps deliver pioneering Analytics solutions at the intersection of physical and digital worlds.

6. client/server network. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server

7.An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

8.A Vlog is is a video blog post. You can think of it as an online journal or diary, while A blog is purely text based.

9. The main difference between podcast and webcast is live streaming. Webcasting is essentially broadcasting over the Internet, using online streaming to deliver content. Podcasts are delivered via the Internet but are not streamed.

10.Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people. Email should be used because it safe and secure.

11. Some of the email etiquette are: Do have a clear subject line. Don't forget your signature.Do use a professional salutation. Don't use humor. Do proofread your message. Don't assume the recipient knows what you are talking about..Do reply to all emails.

12.Text messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging isusually a computer session with a longermessage size. ... Both text messaging andinstant messaging are often called just plain "messaging."

13.Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimediasessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone servicespecifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN), also known as plain old telephone service (POTS).

14.Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

15.The B2B, B2C,C2C are types of ecommerce business models.

The B2B business model is one which facilitates business transaction from one company to another example an engineering manufacturing company sells equipment to a construction company

B2C:It is a business model in which a retailer sells directly to a consumer

C2C: It is a business model in which a consumer sells to another consumer through a platform or in-person.

16. Social ecommerce and mcommerce have different meanings, though both aim at making customers' lives easier. Simply put,ecommerce is an umbrella term for selling and buying online, while mobile commerce, or mcommerce, is a subcategory of ecommerce that focus on purchasing viamobile devices.

3 0
3 years ago
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
2 years ago
1. What is memory mapped I/O?
anzhelika [568]

Answer:

Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.

5 0
2 years ago
Which selection below lists two operating systems that include BitLocker? A. Windows XP Professional and Windows 7 Professional
Leona [35]
It will be the windows 8 professional
3 0
3 years ago
A device that modulates digital data onto an analog signal and then demodulates the analog signal back to digital data is a ____
LenKa [72]
A modem. (From modulator-demodulator)
5 0
2 years ago
Other questions:
  • Integrated circuits are made up of _____ that carry the electrical current.
    14·1 answer
  • Wich of these is an example of magnetic storage
    11·1 answer
  • In 125 words describe the steps to active listening.
    6·1 answer
  • ____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
    11·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Beneficios del reciclaje electrónico
    6·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • Out-of-order instruction execution can cause problems because a later instruction may depend on the results from an earlier inst
    6·1 answer
  • Besides your computer, where else can you find and use an operating system?
    11·1 answer
  • If given program is executed, what will be output?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!