1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
12

Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​

Computers and Technology
1 answer:
4vir4ik [10]3 years ago
5 0

Answer:

A.

Explanation:

Mark Brainliest if correct!

You might be interested in
With,user receive recommendations for items that are similar in type to items they already like.
Dennis_Churaev [7]

Answer:

Collaborative filtering

Explanation:

This is one out of five on the Recommender system apart from most popular items, Association and Market Basket based Analysis, Content-based analysis, self and hybrid analysis where we use both content-based and collaborative based approach together. And the Recommender system is a very important topic in Data science. For this question, remember that Collaborative filtering focuses on user and various other user's choices which are mathematically alike to concerned users, and which we find with the study of a large data set. Thus, we can predict from our above study that what are going to be likes of concerned users, and at the item level, whether that item will be liked by the concerned user or not. And this is prediction, and we use this approach in Machine learning these days. For this question, and as mentioned in question the requirements, answer is Collaborative filtering.

6 0
3 years ago
This time, if xyzfunc executes myint++, what happens to the copy of myint in the calling program?
Ivenika [448]

Answer:

a) Its address is incremented by four.

Explanation:

In cases of pointer when we pass them to a function the copy that is created in the function points to the same memory address to which the original pointer pointed.So on increasing it's value in the function will tell the pointer to move to the next integer location that is 4 bytes ahead hence the answer is option a.

4 0
4 years ago
If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
HACTEHA [7]

Answer:

The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.

Explanation:

Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.

This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.

6 0
4 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
4 years ago
The choice of an appropriate input device for a product is often based on both the type of device being used and the target mark
maxonik [38]

<u>Explanation:</u>

Well, one may wonder: <em>what is an input device? </em>In simple words, an input device a computer piece of hardware that<u> sends data into the computer</u>; such as a keyboard, mouse, etc.

<u>The typical hardware I would select as the primary input device for senior citizens is the</u><u> keyboard.</u> Because it involves less technical requirement to use a keyboard; they simply just plug in the keyboard (in the case of a desktop computer) and can begin to type.

Advantages:

  • require little technical know-how.
  • keys are large to visible to the eyes.

Disadvantages:

  • may require a lot of practice to perform tasks faster.
  • can be physically draining since it involves the use of the fingers to type.

How could the disadvantages be minimized? By encouraging typing classes/training for seniors, and switching to voice recognition supported keyboard systems.

3 0
3 years ago
Other questions:
  • Can someone can help me am dont know how much RAM do i need. I use my pc for work and to watch yt vid. Thanks​
    10·1 answer
  • Material science focuses on<br><br> A) Heat<br> B) Solids<br> C) Liquids<br> D) Gasses
    7·2 answers
  • What binary number is the output of adding 1001011 and 100000?
    13·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    14·2 answers
  • What is employee Internet management (EIM) software?
    5·2 answers
  • When you reference a cell or range in a different worksheet, the ____ separates the sheet reference from the cell reference.
    10·1 answer
  • If you created a variable called name, what data type would that value be?
    7·2 answers
  • Create the HTML code for this
    14·1 answer
  • Which of the following will you do in step X in the following series of clicks to change the bounds of
    10·1 answer
  • Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!