1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
6

What is the right thing to do when you spot fake news​

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
6 0

Answer:

to tell the truth

Explanation:

l mean there is no reason to keep it secret

You might be interested in
Which year was the Apple 2 released? <br>A) 1979 <br>B). 1973 <br>C). 1980 <br>D). 1977​
sesenic [268]

Answer:

1977

Explanation:

Apple 2 was released in April 19th 1977

6 0
3 years ago
Read 2 more answers
How did early games in generation 1 or 2 influence zelda botw
Novay_Z [31]

Answer:

Open world exploration and inventory management

Explanation:

In the first Zelda game (NES) and Zelda ii (NES) there were very early open world mechanics along with inventory management.

5 0
3 years ago
Read 2 more answers
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
A Windows user is attempting to exit a locked up desktop application that is not responding to mouse or keyboard input. Which of
Kamila [148]

Answer:

Open Task Manager and end the process associated with the application.

Explanation:

When using a computer installed with the Windows Operating system and an application is not responding to the mouse or keyboard input, you can end such application process without exiting other open applications by opening the task manager using the key combinations "CTRL + ALT + DEL". This would open the Task Manager showing all the open application and then you can end the process associated with the application that is not responding.

3 0
3 years ago
k-means is a flat, partitioning clustering technique. how can k-means be used for hierarchical clustering?
Black_prince [1.1K]

K-means can be used for hierarchical clustering by creating a hierarchical tree structure. This is done by setting the number of clusters to be created, and then running the k-means clustering algorithm for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree. This process is repeated until the desired number of clusters has been created.

<h3>The Use of K-Means Clustering for Hierarchical Clustering</h3>

K-means clustering is a popular technique used in machine learning and data mining for partitioning data into clusters. It is a flat clustering algorithm, in which data points are grouped according to their similarity. While k-means clustering is suitable for partitioning data into a fixed number of clusters, it can also be used for hierarchical clustering. Hierarchical clustering is a clustering technique that creates a hierarchical tree structure, where each level of the tree is made up of clusters created by the k-means clustering algorithm.

The process of creating a hierarchical tree structure using k-means clustering is fairly straightforward. First, the number of clusters to be created is set, and then the k-means clustering algorithm is run for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree until the desired number of clusters has been created. This process ensures that the clusters created are meaningful and have similar characteristics.

Learn more about k-means :

brainly.com/question/17241662

#SPJ4

3 0
1 year ago
Other questions:
  • Which of the following statements is false? Speaking to your computer is a form of input. Playing a video is an example of outpu
    10·1 answer
  • A(n) ______________________________ is a camera mount that uses the concept of a lever and fulcrum and allows a camera to be rai
    9·1 answer
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solu
    8·1 answer
  • Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
    8·1 answer
  • Nancy finds it difficult to locate emails in her Inbox. What action should she take to locate a particular type of email instant
    10·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • Can someone who is good at 9th class IT (cbsce) can help me in my homework​
    14·1 answer
  • Mention five of the format tools use to edit a picture in a word document<br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!