___________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to find pages that might not have the exact words they searched for.

Answers

Answer 1

Answer:

RankBrain

Explanation:

RankBrain is a machine learning-based search engine algorithm, the use of which was confirmed by Google on 26 October 2015. It helps Google to process search results and provide more relevant search results for users.

Answer 2

Final answer:

RankBrain is Goog.le's AI system that helps interpret user searches for more effective results, considering factors like paid ads, popularity, and web connectivity. Search engine rankings are not based solely on content accuracy, so users should use approaches like SIFT to evaluate the credibility of information found online.

Explanation:

RankBrain is Goog.le’s machine-learning artificial intelligence system that interprets people’s searches to find pages that might not have the exact words they searched for. When using search engines like Goog.le, it's important to understand that results are not solely ranked based on authority, accuracy, or relevance. Instead, factors such as paid advertisements, popularity, and web interconnectivity can influence the visibility of web pages in search results.

As a result, it is possible for websites disseminating misinformation to manipulate search engine optimization (SEO) tools to boost their ranking in the search results. Therefore, users should exercise critical judgment and employ the SIFT method, which stands for the four moves of student fact-checkers, to assess the credibility of the sources they find online.


Related Questions

Why are models based on​ assumptions? A. Because models are not intended to analyze​ real-world events. B. Because models are only concerned about questions of​ equity, not question of efficiency. C. Because models have to be simplified to be useful. D. Because models are very different from theories.

Answers

Models are based on​ assumptions because models have to be simplified to be useful.

Answer: Option C.

Explanation:

Model is a computer program which helps to predict the situation as to what might have happened. Models are used almost in every aspect, be it economics or science or biology.

Assumptions are necessary because there are many complexity in every system and it is thus essential to have an understanding of the working of those system. It is necessary to remove the complexities for models to be useful. Models which aren’t based on assumptions are massive which is turn creates a problem. Thus it is necessary that models are simplified to be useful.

write a program to read in three nonnegative integers from the keyboard. Display the integers in increasing order.

Answers

Final answer:

To display nonnegative integers in increasing order, you can use a sorting algorithm like selection sort.

Explanation:

To write a program that reads in three nonnegative integers from the keyboard and displays them in increasing order, you can use a sorting algorithm such as selection sort. Here's an example in Python:

# Read in three integers from the keyboard

num1 = int(input('Enter the first integer: '))

num2 = int(input('Enter the second integer: '))

num3 = int(input('Enter the third integer: '))

# Create a list with the three integers

numbers = [num1, num2, num3]

# Sort the list in increasing order

numbers.sort()

# Display the integers in increasing order

print('Integers in increasing order:', numbers)

This program prompts the user to enter three integers, creates a list with those integers, sorts the list in increasing order, and finally displays the integers in increasing order.

n a​ poll, 6767​% of Internet users are more careful about personal information when using a public​ Wi-Fi hotspot. What is the probability that among threethree randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot? How is the result affected by the additional information that the survey subjects volunteered to​ respond?

Answers

Answer:

The probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot is 0.964

If the survey subjects volunteered to​ respond , then those with the strongest opinions are most likely respond. The survey sample is then not randomly selected, the survey may have a response bias.

Explanation:

Let P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) denote the probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot, then we have the equation

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) = 1 - P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot)

If 67​% of Internet users are more careful about personal information when using a public​ Wi-Fi, then 33% of them are not.

P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot) = [tex]0.33^{3}[/tex] ≈ 0.036

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot)  = 1 - 0.036 = 0.964

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet and want to assign the lowest numbered IP address possible to this system. What should you do?

Answers

Answer:

Assign the system an IP address of 172.17.0.1

Explanation:

Based on the information provided within the question it can be said that in this scenario you need to assign the system an IP address of 172.17.0.1 . This is because since you want the lowest possible IP address and since there is a subnet with an IP of 172.17.0.0 then the next lowest address would be by adding 1 to the last digit making it 172.17.0.1

Final answer:

The first usable IP address for the server on the subnet 172.17.0.0 with a subnet mask of 255.255.192.0 is 172.17.0.1.

Explanation:

To assign the lowest numbered IP address possible to the first host on the subnet with a network ID of 172.17.0.0 and a subnet mask of 255.255.192.0, you should use the first usable IP address in that range. The subnet mask of 255.255.192.0 indicates that the first two octets (172.17) are fixed for network identification, and the third octet will bring additional subnets.

The subnet mask divides the address space into four subnets, each incrementing by 64 in the third octet (since 192 in binary is 11000000). Thus, the possible subnets are 0, 64, 128, and 192. For subnet 172.17.0.0, the first usable address is the one immediately following the subnet address. You would therefore assign the IP address of 172.17.0.1 to the server, with the last octet as '1' since this is the first usable host address.

Consider the following code segment. int count = 1; int value = 31; while (value >= 10) { value = value - count; count = count + 3; } System.out.println(value); What is printed as a result of executing the code segment?

Answers

Answer:

30

26

19

9

Explanation:

Initially, the value of count is 1 and the value of the variable “value” is 31. Since value is greater than 10, the while loop condition holds true and the program enters the while loop and will continue to execute the code inside the loop until the value changes to less than 10. “value” is reduced in the statement “value = value – count;”. Since we know value is initially 31, and count is 1, the value after this statement is executed will become value=31-1 = 30. “count” variable is now incremented by 3, so it now becomes 1+3 = 4. The next line will print this value onto the screen. The loop run again since value is >= 10. In the second run, the value will decrement by 4 as count was incremented by 3 in the previous run. Therefore, the value would become 26, while the count is again incremented by 3 to its new value 7. In the next run, the value of the value variable is therefore decremented by 7 to its new value 19 (26-7=9), and count is again incremented by 3 to make it 10 (7+3=10). The value is decremented by 10 to its new value 9 in the next run. Since 9 is less than 10 the while condition is no longer true and the program exits the while loop.

The scheme where you can find the greatest common divisor of two integers by repetitive application of the division algorithm is known as the Brady algorithm.

Answers

Answer:

False

Explanation:

The scheme where you can find the greatest common divisor (GCD) of two integers by repetitive application of the division algorithm is known as Euclidean Algorithm.

The Euclidean Algorithm for calculating GCD of two numbers X and Y can be given as follows:

If X=0 then GCD(X, Y)=Y since the Greatest Common Divisor of 0 and Y is Y.If Y=0 then GCD(X, Y)=X since the Greates Common Divisor of 0 and X is X.Let R be the remainder of dividing X by Y assuming X > Y. (R = X % Y)Find GCD( Y, R ) because GCD( X, Y ) = GCD(Y, R ). Repeat the above steps again till R = 0.

The work day has just started and you receive reports that the inventory management server is not accessible on your company's network. You recall that the new network administration assistant was working on that server last night. Which tool can you use to determine if the network administration assistant left that server's NIC disabled?

Answers

Answer:

Server Manager is the correct answer.

Explanation:

The user uses the Server Manager to determine if the admin of the network helper left the following server because that user received the reports related to the inventory management that is unable to access on their organizations' network. That's why he recall the new admin of the network. So, the following answer is correct.

What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b. it manages the execution of .NET applications c. it specifies the format of compiled .NET applications d. it specifies the data types that can be used by .NET applications

Answers

Answer:

d. it specifies the data types that can be used by .NET applications.

Explanation:

The .NET Framework Class Library (FCL) makes the system functionality of the .NET Framework available because it contains interfaces, data types, various classes and so on.

It is also important to note that the FCL is integrated to the CLR or Common Language Runtime of .NET Framework which is responsible for code execution.

The Framework Class Library or FCL can be categorized broadly into three:

1.  Frameworks

2. Utility features in .NET, and

3. Wrappers around the Operating System (OS) functionality.

1. Frameworks: The FCL contains many frameworks aimed at the development of some applications. For instance, WPF or Windows Presentation Foundation is used to carry out a number of functions but majorly to render user interfaces.

2. Utility features in .NET: This contains a number of classes for use in the .NET framework, examples of these classes include: dictionary, queue, stack, list and so on. Additionally, it contains classes for different manipulations, for example, for handling regular expressions the Regex class is available for use.

3. Wrappers around the Operating System (OS) functionality: Contained in the Framework Class Library are wrappers that are present at the root functionality of the Windows OS. For instance, classes to handle I/O, network features, file system as so on.

A network using multiple cell towers falls under which type of network?
CAN
MAN
WAN
WMN

Answers

Answer:

man

Explanation:

multiple area network

Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?A.phishingB.spamC.spywareD.spit

Answers

Answer:

a.phishing

Explanation:

Answer:

B. Spam

Explanation:

Spam emails are mails that are written and send to people in other to advertise a product, get sensitive informations from people and also gain access to people informations.

Which of the following are valid declarations for an assignment operator for a class named myClass?
a. void friend operator = (myClass& left, const myClass& source);
b. void operator = (myClass& left, const myClass& source);
c. void friend operator = (const myClass& source);
d. void operator = (const myClass& source);

Answers

Answer:

Option D is correct

Explanation:

Because there are too many parameters in option B.

and option A and C are just declaring friend functions.

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.A. TrueB. False

Answers

Answer:

True

Explanation:

Firmware are software programs embedded in hardware devices such as hard drives and BIOS, that allow these hardware devices to run properly. With the help of firmware, user programs can run on devices. Firmware programs hardly change throughout their lifetime except and upgrade is performed on them. Firmware are usually upgraded to fix bugs and maybe to add new features to them.

Examples of firmware are;

(i) programs written for a printer

(ii) software controlling the time in a washing machine.

Micorosoft's new power-saving mode that allows specially designed apps to perform small tasks in the background while the device is sleeping.

Answers

Answer:

Connected Standby

Explanation:

Connected Standby is a feature implement in windows 8 and windows 8.1, this mode replaced the standard Sleep and Hibernate, with this option we can receive notifications even with the screen off, but these notifications only work with the windows store, and your battery was spent faster, but in windows 10 only we can find the option sleep in the power button.

One of the Visual Studio 2015 languages that can be used for rapid application development is C#. Another language that supports rapid applicaton development is ____________

Answers

Answer:

Visual Basic is the appropriate answer for the following blank.

Explanation:

Visual Basic is a language based on real events of a third generation for the Module Object model coding model that was originally published and declared legacy in 2008.

In an easy to use graphical environment programmers can create a visual basic programming language for software interfaces and codes. VB is the collection of different components used with the help of the forms with specific characteristics and actions.

One of the managers in your organization has seen older servers crash because of one malfunctioning program. What feature in Windows Server 2016 can help prevent this from happening?

Answers

Answer:

Privileged mode for the kernel is the correct answer.

Explanation:

In the following statement, It is the feature of the Ms Windows Server 2016 that helps the manager of the company to see the following earlier servers that crash when program is malfunctioning. The following privileged mode feature helps the manager to prevent this from occurrence. That's why the following answer is correct.

rite two scnr.nextInt statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and the year. End with newline.

Answers

Answer:

The Java code is given below with appropriate comments

Explanation:

//TestCode.java

import java.util.Scanner;

public class TestCode{

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       //initialising the birth month and birth year

       int birthMonth, birthYear;

       //getting the inputs for the birth month and birth year

       birthMonth = scnr.nextInt();

       birthYear = scnr.nextInt();

     //printing out the birth month and birth year, separated by a slash (/)

       System.out.println(birthMonth+"/"+birthYear);

   }

}

Having demonstrated its versatility as a high-tech newswire, Twitter drew the attention of those who would prefer to see certain information suppressed.A. TrueB. False

Answers

Answer:

A. True.

Explanation:

Twitter social media platform is an online messaging application, that provides a medium for users to communicate with friends, advertise events or products and broadcast news at a large scale.

Its contents are summarized and detailed with pictures, videos, audios and text information. Developers of this web application utilized the concept of user interface and user experience design for easy access to information on the platform.

Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and features? A- Static IP addresses have been configuredB- Administrator has a strong passwordC- Security updates are current

Answers

Answer:

A. Static IP address have been configured.

Explanation:

A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.

End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).

A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

Answers

The answer is : He must consult with a lawyer.

Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.

Define a character variable letterStart. Read the character from the user, print that letter and the next letter in the alphabet. Sample output assuming the user enters 'a':

ab

Sample program:

#include

int main(void) {


return 0;
}

Answers

Answer:

declare variable get input display variable and also increment ASCII of variable and th en display it

Explanation:

In above code first we declare a character variable by (var). Then we get a character input from user in (var). Then display character input and at the same time we also display next character by incrementing the ASCII of character input by 1.

When using social​ media, make sure to provide access to all the information needed to accurately process messages by following the concept of​ __________. A. decoding B. encoding C. etiquette D. selective perception E. transparency

Answers

Answer:

Option E i.e., transparency is the correct option.

Explanation:

When any person using social media networks the he always ensure that he gives all the information related accurately about himself because in the social media network there is the transparency of everything except his chat with other but any person get details of the other person only if he is using social media network.

Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules?a. Snifferb. Auditorc. Hackerd. Firewall

Answers

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules. An auditor can be defined as a program that is used to analyze the network. The hacker can be a person who hacks the system to gain access or gather information.

Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specifications and software quality standards.

Answers

Answer:

Quality assurance team

Explanation:

Software development life cycle (SDLC) is a process or stages of processes a software application must go through to be materialized. The stages of SDLC are planning, design, implementation or development, testing or verification, deployment and maintenance.

An implemented software design must be tested. It is tested based on the pre-dertermined design and the quality standard of the company. A group of test expect are approached for this purpose, they are called the quality assurance team

They are equipped with skills to use third party applications to analyze and verify the quality of the developed software.

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? A. Try an external device before replacing the motherboard.B. Make sure you have the correct processor for the motherboard.C. Verify that the laptop is not under warranty.D. Determine whether a teardown procedure is available.

Answers

Answer:

Option b, Option c, and Option d  are the correct options.

Explanation:

While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.

Describe the form in which a program is passed from the scanner to the parser; from the parser to the semantic analyzer; from the semantic analyzer to the intermediate code generator.

Answers

Answer:

Token stream, Parse tree, Abstract syntax tree or other intermediate form.

Procter & Gamble uses an intranet called InnovationNet to help people working on similar problems share ideas and expertise. InnovationNet connects those working in many different departments around the world. It uses a browser-based portal to access data and includes a directory of subject matter experts who can be tapped to give advice or collaborate on problem solving or product development.

Answers

The answer is Core Competencies.

Core competency is a management theory which focuses on team works by different divisions or department in an organization. It focuses on activities, programs, software and anything that would make people in the company working together to achieve company's missions more effectively.

A device on a power drill that enables a user to back out a drill bit that is stuck in the work material is called a(n) __________.

Answers

Answer:Reversing switchExplanation:A device on a power drill that enables a user to back out a drill bit that is stuck in the work material is called a(n) Reversing switch.

A power drill is a electrical component that is used to drill or fast screw tightening and it maybe cordless or with cord. So, when the power drill is used to make hole then by using reverse switch it can be back out by rotating in opposite direction.

It is a simple switch operated electrically.It used to reverse the direction in which current is flowing.Reversing switch has four terminals.These terminals can be connected in such a way that when the switch is triggered then the direction or current is reversed and so the rotation of the motor of the power drill is also reversed.

I hope it will help you!

________________program specification, design, and implementation inter-leavedsystem developed as series of versions or increments w/ stakeholders involved w/ version specification and evaluationfrequent delivery of new versions for evaluationextensive tool support used to support developmentminimal documentation

Answers

Answer:

primary attributes of agile development

Explanation:

Based on the information provided within the question it can be said that this information are all main and primary attributes of agile development. Such as is mentioned in the question they are that the

- Program specification, design and implementation are inter-leaved.

- The system is developed as a series of versions or increments with stakeholders involved in version specification and evaluation.

- Frequent delivery of new versions for evaluation.

- Extensive tool support (e.g. automated testing tools) used to support development.

- and even needs Minimal documentation (focus on working code)

This are all parts of what describe an agile and efficient development culture.

A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.

Answers

Answer:

incident

Explanation:

An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.

What is the asset?

A business asset is something that has present or future economic worth to the company. In essence, assets for companies encompass anything managed and held by the firm that is today valuable or has the potential to give monetary advantage in the future.

Patents, machines, and investments are some examples of the assets. Assets are crucial because they may help you create money, raise the value of your firm, and help it function smoothly.

Therefore, an incident is an attack on an information asset that puts the confidentiality, integrity, or availability of information resources at risk.

Learn more about the asset, refer to:

https://brainly.com/question/13848560

#SPJ2

Explain the difference between general-purpose and specialized applications. Also discuss the common features of application programs, including those with traditional and ribbon graphical user interfaces.

Answers

Answer:

General purpose programs are software that are designed for the general public, e.g. Word processor, music player, maps application. These softwares don't require you to be have some specific need or skill to use them.

Specialized programs are software that are designed for a specific group of users and/or profession, like CAD, Adobe premier, Visual Studio. These softwares require you to be associated with some profession to be able to use them. Also, specialized programs are usually not free and may require a licensing fee.

Common features of application programs include,

1. Saving file

2. Contact for help

3. Changing preferences

4. Exiting application

5. Viewing or signing in to your account

Explanation:

General-purpose computers can be configured to run various programs while special-purpose computers are designed for specific tasks. Apps are software applications that perform specific tasks and can feature either traditional or ribbon GUIs.

A general-purpose computer, like a universal Turing machine, is capable of running various programs, effectively transforming into a special-purpose computer for the duration of each program's execution. Special-purpose computers, on the other hand, are custom-built to run specific computations or tasks and cannot be dynamically reprogrammed.

Application programs, or apps, perform tasks separate from the core functioning of the computer, such as word processing, media playing, or accounting. These apps can have different user interfaces, with two common styles being traditional interfaces with dropdown menus and toolbars, and those with ribbon interfaces, popularized by Microsoft Office products, which organize tools into a set of tabs.

Graphical User Interfaces have evolved notably since the 1980s, with the introduction of elements like GUI, DTP, and WYSIWYG. These changes have significantly influenced how applications are interacted with and have broadened the application of computers.

Other Questions
Snowflakes begin to form when water in the atmosphere freezes it causes the water molecules to bond into a hexagonal shape. Is this sentence correct? The legal description of the project, easements that run with the land, and street and traffic patterns are all under consideration when a local planning board? In analyzing the recordings, what would you define as the unit for analysis? Why? How many data units (in rough estimates) are you likely to get based on this decision? Does the estimated number of data units seem adequate? Why or why not? Solve:3 = -2v - VV= E=6c^22c1F=4c^2+7c+5E+F= Most eukaryotic cells contain mitochondria, but a few single-celled eukaryotic organisms found in oxygen-free environments do not. Which of the observations led biologists to reject the hypothesis that these mitochondria-free eukaryotes evolved before the endosymbiotic event that established mitochondria in other eukaryotes? what is y when 8=2y-10x find the rate of change between the points (5, -4) and (-10, -20) why hydrogen fluoride is a gas at room temperature? The correct functions of your lungs contribute to the normal pH level of between 7.35 and 7.45 in your blood. If your lungs do not exchange and remove carbon dioxide from your blood, the blood pH will change. A reading of pH 6.4 of your blood indicates:A. no health risk, as part of normal pH changes in your body that in this case bring it closer to neutral pH.B. a health problem due to the concentration of hydrogen ions (H+) being 10X higher than normal in your body.C. a health problem due to the concentration of hydroxide ions (OH-) being 2X higher than normal.D. a health problem due to the concentration of hydrogen ions (H+) being 2X higher than normal in your body.E. a health problem due to the concentration of hydroxide ions (OH-) being 10X higher than normal in your body. 2 Questions:1) When was WW22) When was eleanor roosevelt Born[Get it right get brainliest] What is the value of x + 3/4 when x=1/8 Write the ratios for sine C cosine C and tangent C The accounting principle that guides accountants, when faced with a recognition dilemma, to choose the alternative that produces the lowest net income is referred to as:___________________. Draw the product formed when the following diene is treated with one equivalent of HCl. Do not show stereochemistry in your answer. The judicial doctrine that places a heavy burden of proof on the government when it seeks to regulate or restrict speech is called:_____________a) judicial restraintb) habeas corpusc) prior restraintd) strict scruitiny Choose the aqueous solution below with the lowest freezing point. These are all solutions of nonvolatile solutes and you should assume ideal van't Hoff factors where applicable. Choose the aqueous solution below with the lowest freezing point. These are all solutions of nonvolatile solutes and you should assume ideal van't Hoff factors where applicable. A. 0.075 m Li I B. 0.075 m (NH4)3PO4 C. 0.075 m NaIO4 D. 0.075 m KCN E. 0.075 m KNO2 Advancements in technology that might be helpful for individuals who need accommodations to perform computer task include what things? PLEASE HELPNEED THIS SOOOOON A company's activities for year two included the following: Gross sales $3,600,000 Cost of goods sold 1,200,000 Selling and administrative expense 500,000 Adjustment for a prior-year understatement of amortization expense 59,000 Sales returns 34,000 Gain on sale of stock portfolio securities 8,000 Gain on disposal of a discontinued business segment 4,000 Unrealized gain on AFS debt portfolio securities 2,000 The company has a 30% effective income tax rate. What is the company's net income for year two? Steam Workshop Downloader