Using WEKA software, answer the following questions based on the Phishing dataset provided.
a) Draw a simple confusion matrix (general one, not from WEKA) of the possible data scenarios for this
Phishing dataset. (0.5 Mark)
b) Draw a table that will outline the Accuracy, Precision, Recall, F-Measure, ROC Area of the following
Rules based algorithms; RIPPER (JRip), PART, and Decision Table (2 Marks)
c) Use Decision Trees algorithms (Random Forest, Random Tree) and Artificial Neural Network
(Multilayer Perceptrol) to compare with the results in part b) above. Do you have better prediction
accuracy with these in this dataset? (2 Marks)
d) What is your conclusion in these experiments pertaining to ML algorithms used? (0.5 Mark)

Answers

Answer 1

Answer:

This isn’t a difficult question, its a task

Explanation:

Using WEKA Software, Answer The Following Questions Based On The Phishing Dataset Provided.a) Draw A

Related Questions

ARAT ML MGA LODS
ID:426667817 ​

Answers

What? If this is an online video ch at thing, then count me out lol sorry I just think that this is dangerous I dk
Nooo stop posting these they aren’t safe

True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.

Answers

Answer:

The answer is False.

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views

Answers

Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.

What is DML Command in MySql?

DML is an acronym for Data Manipulation Language.

DML commands are typically applied to make all changes in the SQL database.

Different types of DML Commands

InsertDeleteUpdate

Hence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."

Learn more about SQL commands here: https://brainly.com/question/25694408

Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC. What differences would you expect to see between a dedicated 3D animation workstation and a typical PC

Answers

I'm no expert here, as I don't own a workstation but rather a gaming pc. But hey, I did tons of research on pc components and I think I can answer your question.

A dedicated workstation would be FAR more capable of running 3d applications, given how demanding they can get than a personal PC. You'd instantly regret using a typical pc for 3d rendering, even a top of the line gaming pc. Point is, gpus created by nvidia are far more capable of running graphic intensive programs specifically made for work than any other gpu. If you want to be satisfied, i'd advise you go for a workstation (Plus they're so much easier to get your hands on than a gaming rig).

What is the grooming process as it relates to online predators

Answers

the process by which online predators lure in minors to get close enough to hurt them.

Name a type of malware designed to provide unauthorized, remote access to a user's computer​

Answers

Answer:

spyware

Explanation:

your welcome;)

Answer:

trojan horse

Explanation:

or just trojan

what don't you like about creating a new document using Microsoft office button​

Answers

It takes too long to load sometimes.

explain how you activate window explore​

Answers

Answer:

Win+R -> Type "explorer.exe" -> Press enter

What are two drawbacks of using netbook ?

Answers

Answer: They are becoming obsolete and they are usually low-performance. Also a 32-bit system.

Would appreciate brainly <3

Answer:

Laptop computers are difficult to repair, upgrade or modify due to their closed and integrated design. While storage drives and RAM are usually accessible because these are the things you will most likely upgrade, it is often difficult to modify or replace your CPU, graphics chip or motherboard. These jobs will usually require professional equipment and tools–or a hired professional technician. Additionally, while in a desktop computer the possible configurations are almost unlimited, laptop configurations are limited to those provided by laptop manufacturers. Some software may also be incompatible with laptop hardware, and installations of different operating systems than those bundled with the laptop may result in hardware failures.

A good algorithm should have which three components?
O A. Commands, inputs, and outputs
B. Clarity, readability, and sequencing
C. Steps, order, and outcomes
O D. Clarity, simplicity, and brevity

Answers

Answer:

a good algorithm must be able to accept a set of defined input. Output: a good algorithm should be able to produce results as output, preferably solutions. Finiteness: the algorithm should have a stop after a certain number of instructions. Generality: the algorithm must apply to a set of defined inputs.Explanation:

A good algorithm should have Steps, order, and outcomes. The correct option is C.

What is algorithm?

An algorithm is a set of instructions that solves a particular problem or performs a specific task.

An algorithm must be well-defined and organised in order to be effective, with clear steps or procedures, a logical order of operations, and a clear understanding of the expected outcomes or results.

As a result, the steps, the order in which those steps are executed, and the expected outcomes or results of following those steps are three essential components of a good algorithm.

Option A describes the fundamental components of a programme, but it is not always a good algorithm.

Option B emphasises some important characteristics of good code, but not specifically related to algorithm design.

Option D addresses important aspects of any type of technical writing, but is not specifically related to algorithm design.

Thus, the correct option is C.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ7

Leon wants an output from his tablet. What should he look at? A. the memory chip B. the processor C. the screen D. the power button

Answers

Answer:

he should look at the screen

Answer:

C. The screen

Explanation:

got it on edge

Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of distance traveled by that point in time. The function should return a new list giving the average velocity between consecutive time measurements. The new list should have a length of one less than the original lists.

Answers

The program calculates the velocity between points in a list is written below. The program is written in python 3 thus ;

t = input("Enter time values : ")

#Enter the time values of the data

p = input("Enter distance values : ")

#Enter the distance values

dist = [float(x) for x in p.split()]

time = [float(x) for x in t.split()]

#pyt then values in a list

def partfthat(dist, time):

#initialize function that takes in two parameters

vel = []

#empty list to hold the calculated velocity values

i = 0

#indexer

while i <= len(dist)-2:

#while loop to iterate

v = (dist[i+1] - dist[i]) / (time[i+1] -time[i])

#Use the velocity formula

vel.append(v)

#append values to the empty list created

i+=1

return vel

print(avg_vel(dist, time))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25681441

Write a function predict_wait that takes a duration and returns the predicted wait time using the appropriate regression line, depending on whether the duration is below 3 or greater than (or equal to) 3.

Answers

The appropriate function which could be used to model the scenario can be written thus ; The program is written in python 3 ;

y = 3x + 3.5

#since no data is given ; using an hypothetical regression equation expressed in slope - intercept format ; where, x = duration and y = Predicted wait time.

def predict_wait(x) :

#initialize a function named predict_wait and takes in a certain duration value, x

y = 3*x + 3.5

#input the x - value into the regression equation to calculate y

return y

#return y

Learn more : https://brainly.com/question/25556810

In your own words, explain the process undertaken while testing the significance of a multiple linear regression model parameter Indicating clearly the hypothesis considered, test statistics used rejection criteria and conclusion.​

Answers

Multiple Linear Regression Analysis consists of more than just fitting a linear line through a cloud of data points. It consists of three stages: 1) analyzing the correlation and directionality of the data, 2) estimating the model, i.e., fitting the line, and 3) evaluating the validity and usefulness of the model.

Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g

Answers

The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.

We can arrive at this answer because:

Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.

In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.

More information:

https://brainly.com/question/7227504

Fill in the blank: _____ data are statistical and numerical facts about a project.
Subjective



Quantitative



Mathematical



Qualitative

Answers

Quantitative data are statistical and numerical facts about a project that can be counted, measured or expressed using numbers.

Quantitative data is statistical and its nature is usually structured, it uses numbers and values that are most suitable for the analysis of a project.

The collection of quantitative data offers the possibility of statistical analysis.

This type of data allows you to easily measure and quantify facts in an organized and accessible way within relational databases.

Therefore, we can conclude that quantitative data is data that comes from numerical information, quantities, percentages, proportions and statistics.

Learn more about quantitative data here: https://brainly.com/question/96076

Queries are questions true or false?

Answers

Answer:

true

Explanation:

in the dictionary they mean the same thing

Assume that the speed of new computers costing a certain amount of money grows exponentially over time, with the speed doubling every 18 months. Suppose you need to run a very time consuming program and are allowed to buy a new computer costing a fixed amount on which to run the program. If you start now, the program will take 7 years to finish. How long should you delay buying the computer and starting the program so that it will finish in the shortest amount of time from now

Answers

Therefore, in order to run the program in the shortest time, you should delay for 3 years

Given that the speed of new computers costing a certain amount of money grows exponentially over time, with the speed doubling every 18 months.

Exponential equation as a function of time can be expressed as

P(t) = [tex]P_{0}[/tex][tex]R^{t/T}[/tex]

Quantity P will be increasing exponentially when R > 1. And it will decrease exponentially when R < 1.

Suppose you need to run a very time consuming program and are allowed to buy a new computer costing a fixed amount on which to run the program. If you start now, the program will take 7 years to finish.

Let the time required to run and complete a program for time t years be P(t).

If the speed doubling every 18 months, which is 3/2 years. This will eventually cause the running time to decrease by half (0.5)

P(t) = 7[tex](1/2)^{3t/2}[/tex] = 7[tex](2)^{-3t/2}[/tex]

The total time T will be sum of the delay time t and the time of running the program. That is

T(t) = t + P(t)

T(t) = t + 7[tex](2)^{-3t/2}[/tex]   .......... (2)

We can calculate the minimum time t by differentiating the above equation and make it equal to zero.

dT/dt = 1 + 14/3[tex](2)^{-3t/2}[/tex](ln0.5) = 0

14/3[tex](2)^{-3t/2}[/tex](ln0.5) = -1

[tex](2)^{-3t/2}[/tex](ln0.5) = -3/14

[tex](2)^{-3t/2}[/tex] = -3/14ln0.5

Log (natural logarithm) both sides

-3t/2ln2 = ln(3/14ln2)

make t the subject of formula

t = - 3ln(3/14ln2) ÷ 2ln2

t = 2.5 approximately

To know how long you should delay buying the computer and starting the program so that it will finish in the shortest amount of time from now, substitute t into equation 2

T(2.5) = 2.5 + (7)[tex]2^{-3(2.5)/2}[/tex]

T(2.5) = 2.5 + 0.5202

T(2.5) = 3.02 years

T (2.5) = 3 years approximately

Therefore, in order to run the program in the shortest time, you should delay for 3 years

Learn more here: https://brainly.com/question/6497099

1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​

Answers

Answer:

e

Explanation:

e

computer Graphics:
B. Arbitrary reference point:
1) Apply a rotation by 60° on the Pivot Point (-10, 10) and display it.
2) Apply a rotation by 270° on the Pivot Point (10, 0) and then translate it by tx
= -20 and ty = 5. Display the final result.

Answers

Thanks hope it helps

The ______ Works on a single variable or constant. *​

Answers

Answer:

man

Explanation:

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.

Answers

The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.

There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.

The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.

It uses the client–server model architecture via different control and data connections between the client and the server.

Learn more from

https://brainly.com/question/20602197

Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or darken it. Give an example.

Answers

turn the brightness up

What's computer hardware ​

Answers

the physical components that a computer system requires to function

hope it helps

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

. Question 2 Fill in the blank: R Markdown notebooks can be converted into HTML, PDF, and Word documents, slide presentations, and _____.

Answers

R markdown notebook describes a notebook format in R programming which supports R programmers to run codes while also writing documents or explanation alongside. Hence, the missing option is Dashboard.

R markdown may be compared to jupyter notebooks which also supports writing in markdown language.

The R markdown notebooks can be created using the R studio, which allows the conversion notebooks of these notebooks into several different formats including the creation of dashboards.

Hence, R markdown notebooks can be converted to HTML PDF, word document, slide presentation and dashboards.

Learn more :https://brainly.com/question/25575402

A notebook for R Markdown is required to document, discuss, and justify each stage of your investigation.

R markdown notebook presents a R programming notebook style that enables R programmers to run codes while simultaneously producing papers or explanations. A R Notebook, which is a document written in R Markdown, allows the software components to be run separately and in real-time. Additionally, it does away with the necessity of weaving all of your R Markdown text in order to test the results as you build your website.

Every R Notebook has the ability to be converted into any other R Markdown document type, and every R Markdown document has the ability to be used as a notebook. R Notebooks are thus a special operating option.

learn more about R Markdown here:

brainly.com/question/25575402

#SPJ4

discuss the communicatin process giving detailed explanation on each process​

Answers

Communications is fundamental to the existence and survival of humans as well as to an organization. It is a process of creating and sharing ideas, information, views, facts, feelings, etc. among the people to reach a common understanding. Communication is the key to the Directing function of management.

A manager may be highly qualified and skilled but if he does not possess good communication skills, all his ability becomes irrelevant. A manager must communicate his directions effectively to the subordinates to get the work done from them properly.

Communications Process

Communications is a continuous process which mainly involves three elements viz. sender, message, and receiver. The elements involved in the communication process are explained below in detail:

1. Sender

The sender or the communicator generates the message and conveys it to the receiver. He is the source and the one who starts the communication

2. Message

It is the idea, information, view, fact, feeling, etc. that is generated by the sender and is then intended to be communicated further.

Browse more Topics under Directing

Introduction, Meaning, Importance & Principles of DirectingElements of DirectionIncentivesLeadership

3. Encoding

The message generated by the sender is encoded symbolically such as in the form of words, pictures, gestures, etc. before it is being conveyed.

4. Media

It is the manner in which the encoded message is transmitted. The message may be transmitted orally or in writing. The medium of communication includes telephone, internet, post, fax, e-mail, etc. The choice of medium is decided by the sender.

5. Decoding

It is the process of converting the symbols encoded by the sender. After decoding the message is received by the receiver.

6. Receiver

He is the person who is last in the chain and for whom the message was sent by the sender. Once the receiver receives the message and understands it in proper perspective and acts according to the message, only then the purpose of communication is successful.

7. Feedback

Once the receiver confirms to the sender that he has received the message and understood it, the process of communication is complete.

8. Noise

It refers to any obstruction that is caused by the sender, message or receiver during the process of communication. For example, bad telephone connection, faulty encoding, faulty decoding, inattentive receiver, poor understanding of message due to prejudice or inappropriate gestures, etc.

1. Where did the Industrial Revolution start and why did it begin there?​

Answers

Answer:

The first Industrial Revolution began in Great Britain in the mid-to-late 1700s, when innovation led to goods being produced in large quantities due to machine manufacturing.

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain's economic development from 1760 to 1840.

Answer:

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain’s economic development from 1760 to 1840  

Historians have identified several reasons for why the Industrial Revolution began first in Britain, including: the effects of the Agricultural Revolution, large supplies of coal, geography of the country, a positive political climate, and a vast colonial empire.

Explanation:

Which of the following is NOT a function of a Web Browser?
O Provide a platform that users can use to access web pages and sites
O Access a Web server and request a page on the Internet so the right information shows up
O Crawl through the World Wide Web searching for words and terms to index in Web Databases
O Interpret Web page's HTML tags and display the Web page's information in a way that is intended/easily readable for you

Answers

A web browser is used to gain access to the contents of a website, displaying the information in a readable and easily understandable format. Hence, an option which isn't a function of a web browser is Crawl through the World Wide Web searching for words and terms to index in Web Databases

A web browsers allows users to access web pages and sites, by accessing web servers and requesting access to display the contents.

Web pages are written in Hypertext Markup Language (HTML). Browsers interpret these document format and tags so that it is displayed in an understandable format.

Learn more : https://brainly.com/question/17130932

The system tray contains _____.
A. the battery life
B. the computer's hard drive
C. the operating system
D. Quick Launch

Answers

[tex]⇒[/tex]

the operating system

The notification area (also called the "system tray") is located in the Windows Taskbar, usually at the bottom right corner. It contains miniature icons for easy access to system functions such as antivirus settings, printer, modem, sound volume, battery status, and more.

Answer:

A BATTERY LIFEExplanation: The person said it and it was right I believed them, and they made me get a 100% thank you sir/madam and as you can see, I have proof so your welcome and thank you.

I Wouldn't just say the letter like A or C because everyone's quiz is different, and it changes but either way whatever your welcome and again thank you.

What is the difference between a computer’s RAM and its hard disk?
A. RAM is not volatile, which means that it is more reliable than a hard disk. A hard disk is volatile, which means that it is vulnerable to electronic interference.

B. RAM is volatile, which means that it does not retain information in memory after powering down. A hard is not volatile, which means that it retains information in memory after powering down.

C. RAM is not volatile, which means that it retains information in memory after powering down. A hard disk is also not volatile, which means that it retains information in memory after powering down.

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Answers

Answer:

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Explanation:

Most RAM (random access memory) used for primary storage in personal computers is volatile memory. Volatile memory contrasts with non-volatile memory, which does not lose content when power is lost. Non-volatile memory has a continuous source of power and does not need to have its memory content periodically refreshed.

Answer:

Explanation:

RAM can be accessed faster than hard drive. – Any changes made to the file will be present in RAM while once the changes are saved it is copied to the hard drive permanently. – RAM needs power to store data, hard drives do not.

Other Questions
CAN SOMEONE HELP ME PLEASE ASAP! Describe the political situation in Europe when the Enlightenment began and the influence of religion on government. When a governor calls up the states National Guard, he or she is acting as _________________. What is the sale price of a $825 tablet that has a 1/4 discount Why was it important that a squire attach a knight's armor carefully? what is the biblical allusion that the author used in "the souls dark cottage"?eternal home-threshold of new life- What is the thesis statement (the main message or moral of the Story)that the author is trying to convey Help me please with this question What is the overall direction of global air currents at the equator?. What is a trend line in math. What is the slope of the line between the points ( 2 , 7 ) and ( 7 , 1 )? Ivan put 500 000ISK (Icelandic Krona) and Blake put 700 000ISK into savings accountsat different banks.After 8 years, Ivan and Blake have the same amount of money in their accounts.They both receive interest compounded quarterly and Blake has an annual interest ratethat is half of Ivan's annual interest rate.Work out the annual interest rate that Blake receives. According to "So What Is a Primate?" why is the collarbone important for primates?O A. Its shape makes primates unusually strong.OB. Its shape is similar to that of other mammals.O C. Its structure varies across different species of primate.OD. Its structure allows primates to hang by their arms and swing. Does this graph represent a function? Why or why not?A. No, because it fails the vertical line test.B. Yes, because it passes the vertical line testC. Yes becquse it has two straight lines D. No because it is not a straight line Which equations represent circles that have a diameter of 12 units and a center that lies on the y-axis? Select two options.x2 + (y 3)2 = 36x2 + (y 5)2 = 6(x 4) + y = 36(x + 6) + y = 144x2 + (y + 8)2 = 36 PLEASE HELP WILL MARK BRAINLIEST Identify three good historical questions about European colonies in the Americas.A. Why did European countries want to colonize the Americas?B. Who was living in the Americas before European countries began formingcolonies?C. Who were the first European explorers?D. What were the effects of colonies?E. Which European countries colonized North America? Hebbenennennemnejnbnnsnjsjjdjd A group of 15 people are ordering pizza each person wants 2 slices and each pizza has 3 slices how many pizzas should they order -2-(3(x+6)-9-(7-x)-3x