1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
13

Is y0utube an example of unsupervised learning or supervised learning?

Computers and Technology
1 answer:
Alexxandr [17]3 years ago
3 0

Answer:

It depends on what you are watching if you are watching gaming then no but if you are watching stuff like learning stuff like nat geo or something like that then it is.

You might be interested in
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
ivanzaharov [21]

Answer:

Port number

Explanation:

Port numbers are used in the identification of a particular process for forwarding some form of network message such as the internet when it reaches a server. It is usually a 16-bit integer that is unsigned and found in header that is appended to a message unit.  At the OSI transport layer, port numbers are used in searching and communicating with a specific application that is running on a host server.

4 0
3 years ago
business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ w
Tcecarenko [31]
Business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ when employees are not sitting at a desk in the office

Lack of control, supervision (I.e. micro-management lol).
5 0
3 years ago
Which of the following is Tynker an example of?
dangina [55]

Answer:

binary code

Explanation:

correct me if i’m wrong :)

6 0
3 years ago
Read 2 more answers
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Other questions:
  • Bryan knows that it takes him fifteen minutes to drive to work, or twenty minutes if every traffic light is red on the way there
    14·2 answers
  • Technology that is attached to a tag and used to identify postal packages is a(n) _____.
    12·2 answers
  • Why is the Vigenere cipher hard to crack? (select 2)
    6·1 answer
  • The following if statement uses an overloaded &gt; operator to determine whether the price of a Car object is more than $5000. C
    15·1 answer
  • How to change default search engine in internet explorer 11?
    13·1 answer
  • 6.6 Write a function named timesTen. The function should have an integer parameter named number. When timesTen is called, it sho
    7·1 answer
  • What does a GPA show
    14·2 answers
  • 0 % 3? Is it 0 or undefined? (% is mod)
    9·1 answer
  • True or false with reason :- carriage inword is carriage on purchases​
    6·1 answer
  • The format that you will use on your works cited page when the entry is longer than one line is__________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!