Answer:
Collaborative filtering
Explanation:
This is one out of five on the Recommender system apart from most popular items, Association and Market Basket based Analysis, Content-based analysis, self and hybrid analysis where we use both content-based and collaborative based approach together. And the Recommender system is a very important topic in Data science. For this question, remember that Collaborative filtering focuses on user and various other user's choices which are mathematically alike to concerned users, and which we find with the study of a large data set. Thus, we can predict from our above study that what are going to be likes of concerned users, and at the item level, whether that item will be liked by the concerned user or not. And this is prediction, and we use this approach in Machine learning these days. For this question, and as mentioned in question the requirements, answer is Collaborative filtering.
Answer:
a) Its address is incremented by four.
Explanation:
In cases of pointer when we pass them to a function the copy that is created in the function points to the same memory address to which the original pointer pointed.So on increasing it's value in the function will tell the pointer to move to the next integer location that is 4 bytes ahead hence the answer is option a.
Answer:
The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.
Explanation:
Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.
This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.
Answer: Information security
Explanation:
The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.
This system is basically refers as the CIA triad in the information security system and the data risk management.
The main aim of the information security is that keeps the data protected from the unauthorized accessing and also controlling the access in the system.
Therefore, Information security is the correct answer.
<u>Explanation:</u>
Well, one may wonder: <em>what is an input device? </em>In simple words, an input device a computer piece of hardware that<u> sends data into the computer</u>; such as a keyboard, mouse, etc.
<u>The typical hardware I would select as the primary input device for senior citizens is the</u><u> keyboard.</u> Because it involves less technical requirement to use a keyboard; they simply just plug in the keyboard (in the case of a desktop computer) and can begin to type.
Advantages:
- require little technical know-how.
- keys are large to visible to the eyes.
Disadvantages:
- may require a lot of practice to perform tasks faster.
- can be physically draining since it involves the use of the fingers to type.
How could the disadvantages be minimized? By encouraging typing classes/training for seniors, and switching to voice recognition supported keyboard systems.