Using WEKA software, answer the following questions based on the Phishing dataset provided.
a) Draw a simple confusion matrix (general one, not from WEKA) of the possible data scenarios for this
Phishing dataset. (0.5 Mark)
b) Draw a table that will outline the Accuracy, Precision, Recall, F-Measure, ROC Area of the following
Rules based algorithms; RIPPER (JRip), PART, and Decision Table (2 Marks)
c) Use Decision Trees algorithms (Random Forest, Random Tree) and Artificial Neural Network
(Multilayer Perceptrol) to compare with the results in part b) above. Do you have better prediction
accuracy with these in this dataset? (2 Marks)
d) What is your conclusion in these experiments pertaining to ML algorithms used? (0.5 Mark)

Answers

Answer 1

Answer:

This isn’t a difficult question, its a task

Explanation:

Using WEKA Software, Answer The Following Questions Based On The Phishing Dataset Provided.a) Draw A

Related Questions

Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or darken it. Give an example.

Answers

turn the brightness up

Partially-filled Arrays
Write the function rindby() which stands for remove mark>if not divisiby by. The function removes all elements from the array that are not evenly divisible by the argument n. You can find out if a number is evenly divisible by n using the remainder operator: % (there will be nothing left over).
The function returns the number of items removed or -1 if the array was originally empty.
The function takes 3 arguments:
the array of int that may be modified.
the size of the array (use size_t as the type)
the int n used to check for divisibility
Here are two short examples:
int a[] = {2, 3, 4, 5, 6};
size_t size = 5;
int removed = rindby(a, size, 2);
// removed->2, a = [2, 4, 6], size = 3
size = 0;
removed = rindby(a, size, 3);
// removed-> -1, no change otherwise
In the first case, the numbers 3 and 5 are removed because they are not divisible by 2. Only the numbers that are divisible by 2 are left in the array.
In the second, size has been set to , so the input array is empty and the function returns - 1.
Exam C++ Quick Reference
p1.cpp
1 #include // size_t for sizes and indexes
2 using namespace std;
3
4 ////////////////WRITE YOUR FUNCTION BELOW THIS LINE ///////////////
5 int rindby(int all, size_t& size, int number)
6 {
7 int result;
8 // Add your code here
9 return result;
10 }
11

Answers

Answer:

um

Explanation:

What was the goal of the COMPETES Act of 2007?

Answers

Simply put, the goal was, "To invest in innovation through research and development, and to improve the competitiveness of the United States."

Answer:

Increasing federal investment in scientific research to improve U.S. economic competitiveness.

Explanation:

Hope this helps!

1. Where did the Industrial Revolution start and why did it begin there?​

Answers

Answer:

The first Industrial Revolution began in Great Britain in the mid-to-late 1700s, when innovation led to goods being produced in large quantities due to machine manufacturing.

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain's economic development from 1760 to 1840.

Answer:

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain’s economic development from 1760 to 1840  

Historians have identified several reasons for why the Industrial Revolution began first in Britain, including: the effects of the Agricultural Revolution, large supplies of coal, geography of the country, a positive political climate, and a vast colonial empire.

Explanation:

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.

Answers

The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.

There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.

The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.

It uses the client–server model architecture via different control and data connections between the client and the server.

Learn more from

https://brainly.com/question/20602197

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views

Answers

Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.

What is DML Command in MySql?

DML is an acronym for Data Manipulation Language.

DML commands are typically applied to make all changes in the SQL database.

Different types of DML Commands

InsertDeleteUpdate

Hence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."

Learn more about SQL commands here: https://brainly.com/question/25694408

Queries are questions true or false?

Answers

Answer:

true

Explanation:

in the dictionary they mean the same thing

In a _____, there is no skipping or repeating instructions. A. iteration B. sequence C. selection D. conditional

Answers

Answer:

B: Sequence.

Explanation:

Write a function predict_wait that takes a duration and returns the predicted wait time using the appropriate regression line, depending on whether the duration is below 3 or greater than (or equal to) 3.

Answers

The appropriate function which could be used to model the scenario can be written thus ; The program is written in python 3 ;

y = 3x + 3.5

#since no data is given ; using an hypothetical regression equation expressed in slope - intercept format ; where, x = duration and y = Predicted wait time.

def predict_wait(x) :

#initialize a function named predict_wait and takes in a certain duration value, x

y = 3*x + 3.5

#input the x - value into the regression equation to calculate y

return y

#return y

Learn more : https://brainly.com/question/25556810

please help!!!! what is the meaning of M,I,C,R,O,S,O,F,T word?
M-
I-
C-
R-
O-
S-
O-
F-
T-​

Answers

Answer:

Microsoft (the word being a portmanteau of "microcomputer software") was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows

Explanation:

if you need full answer this is it

Create a program that uses an array of Shape references to objects of each concrete class in the hierarchy (see program-2). The program should print a text description of the object to which each array element refers. Also, in the loop that processes all the shapes in the array, determine the size of each shape If it‟s a TwoDimensionalShape, display its area. If it‟s a ThreeDimensionalShape, display its area and volum ​

Answers

You got any social media would send you the rest. If you want it.

The program uses an array for shape reference to objects of each concrete class given. The program is in text description in java language.

What is a program array?

Array programming in computer science refers to methods that allow operations to be applied to a whole set of values at once. This kind of solution is frequently used in scientific and engineering settings.

Shape.java

public abstract class Shape { private int sides;

public Shape() {

this.sides=0;

}

public Shape(int sides) { super(); this.sides = sides;

}

public int getSides() { return sides;

}

public void setSides (int sides) { this.sides = sides;

}

public abstract double calcArea();

Override

public String toString() {

return "This Shape has [sides=" + sides + "]";

Therefore, the program array is given above.

To learn more about program array, refer to the link:

https://brainly.com/question/13104121

#SPJ2

a leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate headquarters is located in Redmond Washington and it has offices in more then 60 countries

Which One Is It

A) Apple
B) Microsoft
C) IBM
D) Global Impact​

Answers

Answer:

B

Explanation:

They have offices in Redmond Washington

Without proper synchronization, which is possible, a deadlock, corrupted data, neither or both? Give reasons for your answer.
need answer pls​

Answers

Without proper synchronization, corrupted data is possible due to the fact that a shared datum can be accessible by multiple processes.

Data synchronization simply means the idea of keeping multiple copies of dataset in coherence with one another in order to maintain data integrity. It's the process of having the same data in two or more locations.

Without proper synchronization, corrupted data is possible because a shared datum could be accessed by multiple processes without mutual exclusive access.

Read related link on:

https://brainly.com/question/25640052

What is the full form of MPEG? The full form of MPEG is blank.

Answers

Answer:

Moving Picture Experts Group

Explanation:

Answer:

The full form of MPEG is Moving Picture Experts Group.

Explanation:

MPEG is a group of working experts to determine video or audio encoding and transmitting specifications/standards.

identify another natural cyclic event, other than phases and eclipses, that is caused by the moon's gravitational pull on earth

Answers

Answer:

TEKS Navigation

Earth Rotation.

Moon Phases.

Tides.

Cyclical events happen in a particular order, one following the other, and are often repeated: Changes in the economy have followed a cyclical pattern. an example would be pamdemic and vircus it is belived that a new pamdemic starts every 100 years.

Explanation:

The rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth

The gravitational pull of the moon's causes the two bulges of water on the Earth's oceans:

where ocean waters face the moon and the pull is strongestwhere ocean waters face away from the moon and the pull is weakest

In conclusion, the rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth

Read more about gravitational pull

brainly.com/question/856541

Edhesive 4.3 code practice question 2

Answers

Sos shacahacwhaveusbsusvs js

In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
1)802.11b
2)Mesh network
3)Ad-hoc
4)2.4Ghz

Answers

Ad-hoc

Explanation:

In which wireless configuration type do nodes communicate directly with each other, rather than with an access point? In an AD-HOC network, all nodes communicate and transmit directly to each other.

The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use of
metaphor.
Danny is creating a website for senior citizens that uses large fonts to improve accessibility. Keenan is working on a website for school children
learning chemistry that is designed to look like a chemistry lab. Justin has created a website for a flower bouquet manufacturer that shows all
the available types of bouquets. Adam has designed a website for viewing movie trailers for the local cinema that display the video on a screen
made to look like a drive-in theater. Paul has created a website for pre-school children to learn English using very simple language and small
words.

Answers

Answer:

C

Explanation:

I KNOW ITS RIHGHT

Answer:

1. Keenan is working on a website for school children learning chemistry that is designed to look like a chemistry lab. 2. Adam has designed a website for viewing movie trailers for the local cinema that display the video on a screen made to look like a drive-in theater

Explanation: 5/5 on the test

6-Write a BNF description of the precedence and associativity rules defined for the expressions in Problem 9 - chapter 7 of the textbook . Assume the only operands are the names a,b,c,d, and e.

Answers

The BNF description, or BNF Grammar, of the precedence and associativity rules are

[tex]<identifier>\text{ }::=a|b|c|d|e[/tex]

[tex]<operand>\text{ }::=\text{ }NUMBER\text{ }|\text{ }<Identifier>[/tex]

[tex]<factor>\text{ }::=\text{ }<operand>|\text{ }-<operand>|\text{ }(<expression>)[/tex]

[tex]<power>\text{ }:=\text{ }<factor>\text{ }|\text{ }<factor>\text{**} <power>[/tex]

[tex]<term>\text{ }::=\text{ }<power>\text{ }\\|\text{ }<term>*<power>\text{ }\\|\text{ }<term>/<power>\\\\<expression>\text{ }::=\text{ }<term>\text{ }\\|\text{ }<expression>+<term>\text{ }\\|\text{ }<expression>-<term>[/tex]

BNF, or Backus-Naur Form, is a notation for expressing the syntax of languages. It is made up of a set of derivation rules. For each rule, the Left-Hand-Side specifies a nonterminal symbol, while the Right-Hand-side consists of a sequence of either terminal, or nonterminal symbols.

To define precedence in BNF, note that the rules have to be defined so that:

A negation or bracket matches first, as seen in the nonterminal rule for factorA power matches next, as seen in the rule defining a factorA multiplication, or division expression matches next, as seen in the rule defining a termFinally, addition, or subtraction match, as seen in the rule defining an expression.

To make sure that the expression is properly grouped, or associativity is taken into account,

Since powers associate to the right (that is, [tex]x \text{**} y\text{**}z=x \text{**} (y\text{**}z)\text{ and not }(x \text{**} y)\text{**}z[/tex]), the rule defining power does this

        [tex]<power>\text{ }:=\text{ }<factor>\text{ }|\text{ }<factor>\text{**} <power>[/tex]

        and not

        [tex]<power>\text{ }:=\text{ }<factor>\text{ }|\text{ }<power>\text{**}<factor>[/tex]

Since multiplication/division are left associative (that is, [tex]x \text{*} y\text{*}z=(x \text{*} y)\text{*}z[/tex]), the rule defining a term takes this into account by specifying its recursion on the right of the operators like so;  

        [tex]<term>\text{ }::=\text{ }<power>\text{ }\\|\text{ }<term>*<power>\text{ }\\|\text{ }<term>/<power>[/tex]

Also, addition and subtraction are left associative (that is, [tex]x \text{+} y\text{+}z=(x \text{+} y)\text{+}z[/tex]), the rule defining an expression takes this into account as seen below

        [tex]<expression>\text{ }::=\text{ }<term>\text{ }\\|\text{ }<expression>+<term>\text{ }\\|\text{ }<expression>-<term>[/tex]

Learn more about BNF grammars here: https://brainly.com/question/13668912

Write a function named parts that will take in as parameters the dimensions of the box (length, width, and height) and the radius of the hole, and returns the volume of material remaining. Assume the hole has been drilled along the height direction. Note: first write the function assuming the hole has radius less than min(length/2, width/2). For full credit, you will need to account for larger radii (bigger than half the length or width of the box).

Answers

The function in Python where comments are used to explain each line is as follows:

#This defines the parts() function

def parts(length, width, height, radius):

   #This calculates the volume of the box

   VBox = length * width * height

   #This calculates the volume of the hole

   VHole = 3.142 * radius ** 2 * height

   #This calculates the remaining volume

   Volume =  VBox - VHole

   #This returns the volume of the remaining material

   return Volume

The above program is a sequential program, and it does not require loops, iterations and conditions.

Read more about similar programs at:

https://brainly.com/question/13971394

HOW TO DISCONNECT A MONITOR FROM A SYSTEM UNIT

Answers

Answer: 1. Use the Windows key + P keyboard shortcut.

2. Using the “Project” flyout, select the PC screen only option.

3. Open Settings.

Click on Display.

Under the “Select and rearrange displays” section, select the monitor that you want to disconnect.

Select monitor on Windows 10

Under the “Multiple displays” section, use the drop-down menu and select the Disconnect this display option.

If ClassC is derived from ClassB which is derived from ClassA, this would be an example of ________.

Answers

Answer:

Inheritance

Explanation:

You are a knowledge engineer and have been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications. What are some sample questions you would ask the loan manager at a bank?​

Answers

As a knowledge engineer, it should be noted that some of the questions that should be asked include:

What do you expect in the loan application process?How is the loan going to be processed?What do you expect from the applicant to fund the loan?

A knowledge engineer simply means an engineer that's engaged in the science of building advanced logic into the computer systems.

Since the knowledge engineer has been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications, he should asks questions that will be vital for the loan process.

Learn more about engineers on:

https://brainly.com/question/4231170

what is the different sheets in excel

Answers

Answer:

By clicking the sheet tabs at the bottom of the Excel window, you can quickly select one or more sheets. To enter or edit data on several worksheets at the same time, you can group worksheets by selecting multiple sheets. You can also format or print a selection of sheets at the same time.

Explanation:

hope this helps

If you will choose among the multimedia mentioned, what will you use to promote this advocacy: Stop strand discrimination. We are all equal.

Answers

The media that I would choose to promote the arrest of discrimination would be television, radio, newspaper, and social media.

When we want to transmit a message to many people, the most appropriate thing is to use mass media, that is, media that have a large coverage of people, such as:

TVRadioNewspapers

 

On the other hand, in recent years people can expose their ideas or disseminate information through social networks, because their messages can become a trend among people and have an even greater reach than conventional media.

Another positive aspect of social networks is that they reach a greater diversity of people with different characteristics such as:

ReligionPolitical positionSocioeconomic positionEducational levelAgeSexBirthplace

Therefore, to spread an anti-discrimination message the best option is to spread it through mass media such as television, radio, newspapers and social networks.

Learn more in: https://brainly.com/question/23228635

Which two are computing devices? (Choose two)
A. Unix
B. Laptop
C. Server
D. Mac OS

Answers

Answer:

ANS is no.B and no. C

hope it helps

Which tab must be enabled to access the VBA Editor?
O Developer
O Insert
O Review
O View

Answers

The answer to your question is Developer.

3. Elaborate why and how you use “Output” command in Python Programming Language, write the syntax of output command?​

Answers

Answer:

Explanation:

you use print() to output something

so it would be like this:

print("What is up, gamer?")

so the syntax is print() with whatever is in the parentheses being what you want to output

g The reduced ISA consists of four instructions: What are those instructions and what does each instruction do

Answers

The ISA is run by some set of instructions. This instructions are;

1.  Arithmetic: This Instructions perform various Arithmetic functions

2. Logical:  This instruction often carryout Logical operations on one or more operands.

3. Data transfer: This handles the transfer of instructions from memory to the processor registers and then backward process again.

4. Flow control: These instructions helps in breaking the sequential flow of instructions and jumping to instructions at different locations.  

Instruction set is simply known to be a full combination /number of instructions that are understood by a CPU.

It is know as a machine code that is often written in binary, and shown by assembly language.

Learn more from

https://brainly.com/question/22740965

Think up and write down a small number of queries for a web search engine.

Make sure that the queries vary in length (i.e., they are not all one word). Try

to specify exactly what information you are looking for in some of the queries.

Run these queries on two commercial web search engines and compare the top

10 results for each query by doing relevance judgments. Write a report that answers at least the following questions: What is the precision of the results? What

is the overlap between the results for the two search engines? Is one search engine

clearly better than the other? If so, by how much? How do short queries perform

compared to long queries?​

Answers

Hope it helps. Thanks
Other Questions
What type of immune response would occur if bacteria invaded your lymph? Which of the following can be considered its own ecosystem?SELECT ALL THAT APPLYa an individual leafb all the leaves on a treec the whole treed the whole forest The mouse ran into the cottage. The dog ran into the cottage.Which of the following correctly combines the two sentences to create a new sentence with a compound subject? The mouse and the dog ran into the cottage. The mouse ran into the cottage, and so did the dog. The mouse ran into the cottage and the dog ran into the cottage. The mouse ran into the cottage, the dog ran into the cottage. I need help with this please Water leaving clouds in various forms is known as humidity- Thyme, basil, dill, marjoram, and chives harvested directly from a kitchen garden are examples of what kind of classic cold kitchen ingredients The increased demand for hair and skin care products with Argan oil illustrates how new product ideas can come from unexpected sources. bank of americas provides information such as its interest expense, or the interest the bank paid depositors, and its interest income, or the interest it earned by investing deposits over a period of time. this document also states the banks other revenues and expenses for the time period. Weight-bearing exercise helps make bone stronger, because:there is no risk of fracture with exercise.exercise causes more calcium to enter the body.bone grows stronger in response to the stresses put on it.exercise triggers the expansion of epiphyseal plates. How did planes change how we view in Earth? Did it changed our technology? How? 3. Who did the first African to land in the Americas travel with? What is the topic of the essay?What is the purpose of the essay? Three types of macromolecules are mentioned in the video that are digested and ABSORBED in the small intestine. What do they all get absorbed into first?LactealsEpithelial cells Capillaries |3x - 5| = |6x - 1| The fraction 7/12 is found between which pair of numbers on a number line? The gift with the red bow is____ To all bug experts, what is this bug? How many of the following statements are true?19)ad Any set of ordered pairs is a function.d The domain of a relation is the set containing the firstmember of its ordered pairs.d The independent variable in a relation is the variableused for the range.d A function is a relation in which each domain value ispaired with exactly one range value.A) 1B) 2C) 3D) 4 f (x)=x^2 what is g (x) Find the y-intercept and then write the linear equation for the line passingthrough (-12, 5) with m = -2/3,