Assume you have 100 values that are all different, and use equal width discretization with 10 bins.
a) What is the largest number of records that could appear in one bin?
b) What is the smallest number of records that could appear in one bin?
c) If you use equal height discretization with 10 bins, what is largest number of records that can appear in one bin?
d) smallest?
e) Now assume that the maximum value frequency is 20. What is the largest number of records that could appear in one bin with equal width discretization (10 bins)?
f) . What about with equal height discretization (10 bins)?

Answers

Answer 1

Answer:

a) 10

b) 1

C) 10

D) 1

E) 20

F)  10

Explanation:

a) The largest number of records that could appear in one bin

 = 10

B) The smallest number of records that could appear in one bin

= 1

C) The largest number of records that cab appear in one bin

= 10

d) smallest number

= 1

e) With frequency = 20. the largest number of records that could appear in one bin with equal width discretization (10 bins)

= 20

f ) with equal height discretization

= 10


Related Questions

briefly describe what a variable is

Answers

Answer:

In mathematics, a variable is a symbol or letter, such as "x" or "y," that represents a value. In algebraic equations, the value of one variable is often dependent on the value of another. Variables are also used in computer programming to store specific values within a program

Explanation:

Write a method that accepts two string arrays and print common values between the two arrays (Perform case sensitive search while finding common values).

Answers

Answer:

public class Main

{

public static void main(String[] args) {

 String[] s1 = {"Hi", "there", ",", "this", "is", "Java!"};

 String[] s2 = {".", "hi", "Java!", "this", "it"};

 findCommonValues(s1, s2);

}

public static void findCommonValues(String[] s1, String[] s2){

    for (String x : s1){

        for (String y : s2){

            if(x.equals(y))

                System.out.println(x);

        }

    }

}

}

Explanation:

*The code is in Java.

Create a method named findCommonValues that takes two parameters, s1 and s2

Inside the method:

Create a nested for-each loop. The outer loop iterates through the s1 and inner loop iterates through the s2. Check if a value in s1, x, equals to value in s2, y, using equals() method. If such a value is found, print that value

Inside the main method:

Initialize two string arrays

Call the findCommonValues() method passing those arrays as parameters

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.a. Intrusion prevention system b. intrusion detection system c. defense-in-depth strategy d. quantitative risk assessment

Answers

Answer:b. intrusion detection system

Explanation:

An intrusion detection system (IDS)  helps to  alert  service administrators   to detect suspicious or malicious activity  by monitoring and analyzing  specific patterns to network traffic. Most times, the IDS may be configured  to  respond to suspicious malicious traffic by  blocking the cyber attacker making  such IP address unable to access that particular  network.

An intrusion detection system (IDS)  can be either a Host Based Intrusion Detection Systems (HIDS) or a Network Based Intrusion Detection Systems (NIDS) depending on preference by the user.

It is therefore necessary for  businesses who require high level of security   to adopt good and effective  intrusion detection systems so  that the communication of information from businesses to businesses  can be safeguarded and secure from cyber attacks.

The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe what the router does with a packet addressed to each of the following destinations:

a. 128.96.39.10
b. 128.96.40.12
c. 128.96.40.151
d. 192.4.153.17
e. 192.4.153.90

Answers

Answer:

Following are the solution to this question:

Explanation:

In point A:

It applies the AND operation with the subnet-mask that is  

[tex]=128.96.39.00001010 \ \ AND \ \ 255.255.255.10000000 \\\\= 128.96.39.0000000 \\\\= 128.96.39.0 \\\[/tex]

This corresponds to a 128.96.39.0 subnet. This is why the router sent the packet to 0.

In point B:  

It applies the AND operation with the subnet-mask that is [tex]255.255.255.128[/tex]

[tex]= 128.96.40.00001100\ AND \ 255.255.255.10000000 \\\\ = 128.96.40.0000000\\\\= 128.96.40.0[/tex]

This suits the 128.96.40.0 subnet. The router then sent R2 to the packet. The packet.

In point C:  

It  applies the AND operation with the subnet-mask that is [tex]255.255.255.128[/tex]

[tex]=128.96.40.10010111 \ AND \ 255.255.255.10000000 \\\\= 128.96.40.1000000\\\\= 128.96.40.128[/tex]

It  applies the AND operation with the subnet-mask  that is [tex]255.255.255.192[/tex]

[tex]= 128.96.40.10010111 \ AND \ 255.255.255.11000000 \\\\= 128.96.40.1000000 \\\\= 128.96.40.128\\[/tex]

All of the matches of its sublinks above.  

Its default R4 router was therefore sent to the router by router.

In point D:

It  applies the AND operation with the subnet-mask  that is [tex]255.255.255.192[/tex]

[tex]= 192.4.153.00010001 \ AND \ 255.255.255.11000000\\\\ = 192.4.153.0000000 \\\\= 192.4.153.0 \\\\[/tex]

It matches the 192.4.153.0 subnet. It router has sent packet to R3 then.

In point E:

It  applies the AND operation with the subnet-mask  that is [tex]255.255.255.128[/tex]

[tex]= 192.4.153.01011010\ AND \ 255.255.255.10000000 \\\\= 192.4.153.0000000 \\\\= 192.4.153.0[/tex]

There, neither of the subnet inputs correlate with the ip address with the same subnet mask.

It  applies the AND operation with the subnet-mask  that is [tex]255.255.255.192[/tex]

[tex]=192.4.153.01011010\ AND \ 255.255.255.11000000 \\\\ = 192.4.153.0100000 \\\\= 192.4.153.64[/tex]

It does not correlate to the subnet entries for same subnet mask, and therefore neither of the entries matches their corresponding ip address entries.  

Mask of the subnet.  That packet would therefore be sent to the default R4 router by the router.

I need help plz it’s python

Answers

Answer:

The output of the first question would be 9. And the answer the second question is 10.

Which class members should be declared as public?

a
Data attributes and constructor methods
b
Data attributes only
c
Methods and occasionally final attributes
d
Predominantly data attributes and some helper methods

Answers

Answer:

B. Methods and occasionally final attributes

Explanation:

In Computer programming, class members can be defined as the members of a class that typically represents or indicates the behavior and data contained in a class.

Basically, the members of a class are declared in a class, as well as all classes in its inheritance hierarchy except for destructors and constructors.

In a class, member variables are mainly known as its attributes while its member function are seldomly referred to as its methods or behaviors.

One of the main benefits and importance of using classes is that classes helps to protect and safely guard their member variables and methods by controlling access from other objects.

Therefore, the class members which should be declared as public are methods and occasionally final attributes because a public access modifier can be accessed from anywhere such as within the current or external assembly, as there are no restrictions on its access.

If you want a language that is relatively easy to write and which can be tested easily as it's being developed, you would choose an interpreter program.
a) True
b) False

True
False

Answers

Answer:

true

Explanation:

because it needs a interpreter so that it could be more developed

The concept of the value chain focus on

Answers

Answer:

The overarching goal of a value chain is to deliver the most value for the least cost in order to create a competitive advantage.

Your Welcome:)

how can i fix my code so that a teepee is properly formed? here is what i currently have (my output is uploaded as an image):

public static void teepee(int a){
for(int i=a; i>0; i--){
for(int j=a; j>0; j--){
System.out.print(" ");
}
System.out.print("/");
for(int k=i; k System.out.print(" ");
}
System.out.println("\\");
}
}

Answers

We are not sending them any other one tryin was there to a point that they had been doing the work for the first

what is the art of prolonging the life of the food items that are available​

Answers

Answer:

Food preservation.

Explanation:

Food preservation can be defined as an art that typically deals with the process of preventing food spoilage by reducing or mitigating the growth of microorganisms and other external factors while maintaining the nutritional value, flavor and texture of the food.

Some of the factors that causes food spoilage include microorganisms (bacteria, yeast and molds), temperature, moisture content, oxidation etc.

Hence, food preservation is the art of prolonging the life of the food items that are available.

Basically, there are physical, chemical and biological methods which can be used to prolong the life of food items and thus sustaining the edibility and nutritional value of foods. These methods are;

1. Freezing.

2. Pasteurization.

3. Drying.

4. Retorting.

5. Thermal sterilization.

6. Fermentation.

7. Irradiation.

A wireless network administrator is using 3 access points (APs) to cover an area. At some locations, all 3 APs may be in range of a single wireless device. What wireless channels should be assigned to the APs?

(Hint: Pick 3 different channels.)

a. 6
b. 7
c. 1
d. 3
e. 2
f. 4
g. 5
h. 8
i. 10
j. 9
k. 11

Answers

Answer:

A, C, and K

Explanation:

Wireless networks use access points ( APs) for wireless communication. The APs provide a collision avoidance channel for the connected devices. Devices communicating at a channel of a given frequency would experience signal interference, so all the connected APs in a wireless network is configured to operate in different channels with considerable differences in their frequencies.    

If a small cheap computer can do the same thing as a large expensive computer,
why do people need to have a large one?

Answers

Answer:

Large ones are for more important thing. Such as gaming and special software.

Explanation:

Hope that helps

Large systems are the ones that are for more important thing. Such as gaming and special software.

Why is the size of a computer Important?

Computer scientists and users value the classification of computers based on their size. It enables us to classify the computer system according to its size and processing capacity.

For gamers who desire the greatest possible gaming experience, expensive PCs are also wonderful.

You can play the most recent games smoothly and at high settings if you have a powerful computer. A costly PC also has the benefit of lasting longer than a less expensive model.

Most computer monitors have a diagonal measurement from corner to corner that falls between 19 and 34 inches. 22 to 24" screens will be sufficient for the majority of users.

Thus, it can be beneficial to use larger computers also.

For more details regarding computers, visit:

https://brainly.com/question/21080395

#SPJ2

what do we use HTTP and HTML for?

Answers

HTTP is protocol while HTML is a language

HTML is a Language while HTTP is a Protocol.

HTML tags are used to help render web pages. The Hypertext Mark-up Language (or HTML) is the language used to create documents for the World Wide Web.

HTTP (Hypertext Transfer Protocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of its request methods, error codes, and headers. Basically, HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image files, query results, etc.) on the World Wide Web.

Describe an algorithm that takes as input a list of n integers in nondecreasing order and produces the list of all values that occur more than once. (

Answers

Answer:

Input a series of integer numbers and split the string from the input to get a list. Then check and convert each string to integer with a list comprehension. Create a new variable with a value equal to the set of the list ( to get unique values) then check for the occurrence of each value in the original list.

Explanation:

This algorithm is used to check for the occurrence of values in a list that has been sorted in ascending order. This is faster if the items in the list is not converted to integer yet (still strings) before writing a for loop to check the value count in the list.

Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find calculate the cost of one pen calculate the print of cost of 10 pen computer answer​

Answers

give the function of cpu

HELP !!!
Which of the following statements best represents the difference in printing text and images in the era of moveable type?


Text was harder to print than images because it involved moving letters around for each line of print.

Text was created by arranging letter blocks, while images were created through an engraving process.

Text was created by engraving letter blocks on metal, while images were created by burning imprints onto wood.

Text was easier to print than images because it involved the same 26 letters used over and over.

Answers

Answer:

I think the answer is: Text was created by arranging letter blocks, while images were created through an engraving process.

Explanation:

in the article it explains these were the ways text and images were printed

Answer:

e

Explanation:

server.
10. The Domain Name refers to the
a) Mail
b) Google
c) Internet
d) Local

Answers

Answer:

C.

Explanation:

what is the CPU's role?

Answers

Answer:

The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program. The computer industry used the term "central processing unit" as early as 1955.

Answer:

The Cpu is like the brain of the computer it's responsible for everything from running a program to solving a complex math equation.

I need help with my homework:
Greetings, secret agent 00111! Your mission, should you choose to accept it, is to help Agent M plan a pizza party. Unfortunately, M has no idea how much pizza to order for his 83 guests. Luck for him, party planning is your specialty! Estimate the number of pizzas he’ll need on scratch paper, and then convert that number to binary and write it here.

Answers

Answer:

You need to order 11100 pizzas.

Explanation:

A couple of assumptions here.

Each pizza has 12 slices.  Each guest will eat 4 slices (1/3 of a pizza).

83 * 1/3 = 28 pizzas

28 = 11100

Which keyboard command would you use to navigate to the left adjacent cell in a worksheet?

Answers

Answer:

Either scroll on a mouse or use the left arrow key.

I don't know if this is right.

Answer:

shift+tab

Explanation:

Write a function named power that accepts two parameters containing integer values (x and n, in that order) and recursively calculates and returns the value of x to the nth power.

Answers

Answer:

Following are the code to the given question:

int power(int x, int n)//defining a method power that accepts two integer parameters

{

if (n == 0)//defining if block to check n equal to 0

{

return 1; //return value 1

}

else//defining else block

{

x = x * power(x, --n); //use x variable to call method recursively

}

return x; //return x value

}

Explanation:

In the above-given code, a method power is defined that accepts two integer variable in its parameter, in the method a conditional statement is used which can be defined as follows:

In the if block, it checks "n" value, which is equal to 0. if the condition is true it will return value 1.In the else block, an integer variable x is defined that calls the method recursively and return x value.

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Comprehension s best described as the ability to

Answers

Answer:

The ability to understand

Explanation:

Answer:

recognize reading strategies.

Explanation:

a) Explain 3 phase Alternative Current with aid of diagram.​

Answers

Three-phase electric power is a common method of alternating current electric power generation, transmission, and distribution. It is a type of polyphase system and is the most common method used by electrical grids worldwide to transfer power. It is also used to power large motors and other heavy loads.

A three-wire three-phase circuit is usually more economical than an equivalent two-wire single-phase circuit at the same line to ground voltage because it uses less conductor material to transmit a given amount of electrical power. Polyphase power systems were independently invented by Galileo Ferraris, Mikhail Dolivo-Dobrovolsky, Jonas Wenström, John Hopkinson and Nikola Tesla in the late 1880s.

HELP URGENTLY!!!!!

Elly supervises an eye doctors office. The office recently received new equipment. To keep that equipment working accurately and dependably, she should:
(Select all that apply.)

Copy the users manual and distribute to all the employees
Identify individuals to complete the tasks
Create a log to document maintenance
Set up auto reminders
Read the manual
List the maintenance tasks
Establish the frequency of the maintenance tasks
Update the software in the office

Answers

Note that where Elly supervises an eye doctor's office, and the office recently received new equipment, to keep that equipment working accurately and dependably, she should:

Copy the users manual and distribute to all the employeesCreate a log to document maintenanceSet up auto remindersRead the manualList the maintenance tasksEstablish the frequency of the maintenance tasksUpdate the software in the office.

What is the rationale for the above response?

In order to ensure that the equipment is working properly and optimally, Elly should distribute the user manual to all employees.

In addition, she should identify individuals to complete maintenance tasks, create a log to document maintenance, set up auto reminders, read the manual, list the maintenance tasks, establish the frequency of the maintenance tasks, and update the software in the office to keep new equipment working accurately and dependably. This will ensure optimal equipment maintenance and lifetime.

Learn more about equipment maintenance:

https://brainly.com/question/21853224

#SPJ1

You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature, the model may result in.
1. Increase in R-square
2. Decrease in R-square
A) Only 1 is correct
B) Only 2 is correct
C) Either 1 or 2
D) None of these

Answers

Answer:

The answer is "Option A".

Explanation:

Add extra functionality, otherwise, it increases the R-square value, which is defined in the following points:      

To incorporate essential elements, R-square is explicitly promoted. It Increases the R-square value, which is an additional feature. It removes the features, which provide the value of the reduce R-square. After incorporating the additional features is used as the model, which is R-square, which is never reduced.

A scared kangaroo clears a fence that is 2.44 meters tall. What is the vertical component of the kangaroos velocity at take off ? If the horizontal component of the kangaroos velocity is 4.80 m per s at what angle did the kangaroo take off the ground? (hint: at its maximum height the kangaroos vertical velocity is 0)

Answers

Answer:

a) The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.

b) The angle at which the kangaroo took off the ground is approximately 46.066º.

Explanation:

a) According to the statement, the kangaroo has an initial horizontal velocity and jumps to overcome the fence until velocity becomes zero. If effects from non-conservative forces can be neglected, then we represent the situation of the kangaroo by Principle of Energy Conservation:

[tex]K_{1}+U_{g,1} = K_{2}+U_{g,2}[/tex] (Eq. 1)

Where:

[tex]K_{1}[/tex], [tex]K_{2}[/tex] - Initial and final translational kinetic energies, measured in joules.

[tex]U_{g,1}[/tex], [tex]U_{g,2}[/tex] - Initial and final gravitational potential energies, measured in joules.

By definitions of translational kinetic and potential gravitational energies, we expand and simplify the equation above:

[tex]\frac{1}{2}\cdot m\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = m\cdot g \cdot (y_{2}-y_{1})[/tex]

[tex]\frac{1}{2}\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = g \cdot (y_{2}-y_{1})[/tex] (Eq. 2)

Where:

[tex]m[/tex] - Mass of the kangaroo, measured in kilograms.

[tex]g[/tex] - Gravitational acceleration, measured in meters per square second.

[tex]y_{1}[/tex], [tex]y_{2}[/tex] - Initial and final heights of the kangaroo above the ground, measured in meters.

[tex]v_{1,x}[/tex], [tex]v_{1,y}[/tex] - Vertical and horizontal initial velocities, measured in meters per second.

[tex]v_{2,x}[/tex], [tex]v_{2,y}[/tex] - Vertical and horizontal final velocities, measured in meters per second.

If we know that [tex]v_{1,x} = 4.80\,\frac{m}{s}[/tex], [tex]v_{2, x} = 0\,\frac{m}{s}[/tex], [tex]v_{2,y} = 0\,\frac{m}{s}[/tex], [tex]g = 9.807\,\frac{m}{s^{2}}[/tex] and [tex]y_{2}-y_{1} = 2.44\,m[/tex], then (Eq. 2) is reduced into this:

[tex]11.52+0.5\cdot v_{1,y}^{2}=23.929[/tex]

Lastly, we solve for [tex]v_{1,y}[/tex]:

[tex]0.5\cdot v_{1,y}^{2}=12.409[/tex]

[tex]v_{1,y}^{2} = 24.818[/tex]

[tex]v_{1,y} \approx 4.982\,\frac{m}{s}[/tex]

The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.

b) The angle at which the kangaroo took off the ground ([tex]\theta[/tex]), measured in sexagesimal degrees, is obtained by the following inverse trigonometric relation:

[tex]\theta =\tan^{-1}\left(\frac{v_{1,y}}{v_{1,x}} \right)[/tex] (Eq. 3)

[tex]\theta = \tan^{-1}\left(\frac{4.982\,\frac{m}{s} }{4.80\,\frac{m}{s} } \right)[/tex]

[tex]\theta \approx 46.066^{\circ}[/tex]

The angle at which the kangaroo took off the ground is approximately 46.066º.

the quality of the interpreter that shows the ability to envision future needs and demands and create products to meet these demands
A. Industries
B. innovative
C. Strategist
D. Risk Taker​

Answers

Answer: B - Innovative

Explanation:

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4. When the keyword ____________________ is followed by a parenthesis, it indicates a call to the superclass constructor.

Answers

Answer:

Super

Explanation:

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

Hence, when the keyword super is followed by a parenthesis, it indicates a call to the superclass constructor and it should be the first statement declared in the subclass constructor.

Other Questions
Read the narrative and determine the point of view:"The teen walked along the beach with his mom, though neither one spoke to the other. The son kept glancing at his mother, sometimes with a furrowed brow, other times with wide eyes. He would start to open his mouth, but then would hastily close it again. His mother continued her steady walking, considering him out of the corner of her eye. Sometimes she smiled a thin smile, but generally she kept her mouth closed." (5 points) aFirst person bSecond person cThird-person limited dThird-person objective eThird-person omniscient What is the main organizational structure the student uses in the report? Ideas are presented in order of least important to most important. Ideas are presented in order of least important to most important. Events are related in chronological order. Events are related in chronological order. Two ideas are compared and contrasted. Two ideas are compared and contrasted. Topic sentences are followed by supporting details. Topic sentences are followed by supporting details. WhaWhat was the purpose of the congress of vienna Determine if the statement is True or False:The length of the shorter segment cut by the altitude from the obtuse angle to the longer base of an isosceles trapezoid is equal to the average of the bases. HURRY PLEASE Read the excerpt from "My Lord Bag of Rice. The Dragon King and his family were all very sorry to have him leave so soon, but since he would go they begged him to accept a few small presents (so they said) in token of their gratitude to him for delivering them forever from their horrible enemy the centipede. Which characteristic of a folktale is contained in this excerpt? a lesson about human behavior. a scene from everyday life. a character playing a trick. a conflict being resolved. 1. Two forces F~1 and F~2 are acting on a block of mass m=1.5 kg. The magnitude offorce F~1 is 12N and it makes an angle of = 37 with the horizontal as shown infigure-1. The block is sliding at a constant velocity over a frictionless floor.Figure-1(a) Find the value of the normal force on the block.[3 marks](b) Find the magnitude of force F~2 that is acting on the block[4 marks](c) Find the magnitude of force F~2 if the block accelerates with a magnitude ofa = 2.5 m/s2 along the direction of F~2 . [3 mark HELO WORLD PLS HELP ME I NEED HELP SOLVE ASAP Look at the Mrode Altarpiece by Robert Campin. In what way did thispainting make art history? After the death of Kamehameha, what were some of the changes that happened when Liholiho came into power? As the frequency of a wave increases...A.)the energy carried by the wave decreasesB.)the wavelength of the wave decreasesC.)the amplitude of the wave decreasesD.)the speed of the wave increases how are images encoded? ( dont copy and paste please) Direct or indirect 1. Emery and Dinah jogged steadily around the track. 2. The Hellers met us at the restaurant. 3. Heidi is telling the editor her series of story ideas. 4. Give your brother some waffles and strawberries for breakfast. 5. The cousins gathered at the Broadmoor Hotel in Colorado Springs. 6. Their meeting gave each cousin many chances to visit with one another. 7. Mr Daleberg gave his speech another name. 8. In California, people pick calla lilies at the roadside. HELP EMERGENCY!!!!!! What is the equation of the line?Y=3x-1Y=-3xY=3x+1Y=3x Use the space below to describe the steps you used to change your desktop background a on chromebook Passage 1"Big data" is becoming a buzz word of the 21st century. Technically, big data refers to a data set that is too large toanalyze. Colloquially, big data refers to the ever-increasing amount of personal information that is collected bycomputers. Computers monitor and record our online habits, what we buy at the grocery store, our medical andeducational records, and even our location. This glut of information has many screaming about privacy concerns.However, sensible protections can be put into place that will unlock the power of big data and positively transform oureconomy, science, and society.Passage 2The casual acceptance of the collection of personal data is one of the most troubling trends of the information age.Proponents of big data argue that the benefits outweigh the potential risks, and that proper regulation of the use ofdata can adequately control the dangers. However, it is very unlikely that we will be able to identify the right ways toregulate the use of data and to persuade the global community to agree on these regulations. Even if we could, whatgroup or agency has the power to monitor the entirety of the Internet? It is far wiser to take immediate steps to limitthe collection of personal data now.The author of Passage 1 would most likely criticize the author of Passage 2 forA. ignoring the potential benefits of big dataB. considering the global implications of big dataC trying to limit the use of medical and educational recordsD. examining the way that computers record and store informationE. I don't know is y= 12 x a proportinal relationship Write T times B times 3 as an expression A is what percent of B?A = 8 oz, B = 1.5 lbPlz help fast. its ok if u cant but help plz Choose the question word that can also have a plural form.1. cul2. cmo3. qu4. por qu -413.4=-15.9n please help