Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Dears,, I need answers unique comlete and correct to these questions; Q1: Name a

ID: 3825413 • Letter: D

Question

Dears,,

I need answers unique comlete and correct to these questions;

Q1: Name and briefly describe four of the most popular commercial software tools used for text mining.

Q2:What are the search engines? What are the Search Engine Optimization methods? Support your answer with examples.

Q3: The choice phase of problem solving involves a search for an appropriate courseof action (among those identified during the design phase) that can solve the problem.Several major search approaches are possible, depending on the criteria (or criterion) of choice and the type of modeling approach used. Describe those search approaches in detail.

Q4:The development of expert systems is often described as a tedious process. What activities does it typically include?

Explanation / Answer

Q1: Name and briefly describe four of the most popular commercial software tools used for text mining.

Text Mining Tools

Ranks.nl - Ranks.nl offers a variety of really handy tools that help people gain a closer perspective on the content of their site. Ranks NL Webmaster Tools Build search engine friendly websites with the best page analyzer on the web.

Eaagle Text Mining software - enables you to rapidly analyze large volumes of unstructured text, create reports and easily communicate your findings.

Vivisimo/Clusty -  Vivisimo is a capable metasearch engine, serving results from multiple engines simultaneously.

Wordle - Wordle is a toy for generating “word clouds” from text that you provide. The clouds give greater prominence to words that appear more frequently in the source text.

Q2:What are the search engines? What are the Search Engine Optimization methods? Support your answer with examples.

Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found. However, the term is often used to specifically describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World Wide Web.

SEO methods are classified into two broad categories:

White Hat SEO - Techniques that search engines recommend as part of a good design.

Black Hat SEO - Techniques that search engines do not approve and attempt to minimize the effect of. These techniques are also known as spamdexing.

White Hat SEO

An SEO tactic is considered as White Hat if it has the following features:

It conforms to the search engine's guidelines.

It does not involve in any deception.

It ensures that the content a search engine indexes, and subsequently ranks, is the same content a user will see.

It ensures that a web page content should have been created for the users and not just for the search engines.

It ensures good quality of the web pages.

It ensures availability of useful content on the web pages.

Always follow a White Hat SEO tactic and do not try to fool your site visitors. Be honest and you will definitely get something more.

Black Hat or Spamdexing

An SEO tactic, is considered as Black Hat or Spamdexing if it has the following features:

Attempting ranking improvements that are disapproved by the search engines and/or involve deception.

Redirecting users from a page that is built for search engines to one that is more human friendly.

Redirecting users to a page that was different from the page the search engine ranked.

Serving one version of a page to search engine spiders/bots and another version to human visitors. This is called Cloaking SEO tactic.

Using hidden or invisible text or with the page background color, using a tiny font size or hiding them within the HTML code such as "no frame" sections.

Repeating keywords in the metatags, and using keywords that are unrelated to the website content. This is called metatag stuffing.

Calculated placement of keywords within a page to raise the keyword count, variety, and density of the page. This is called keyword stuffing.

Creating low-quality web pages that contain very little content but are instead stuffed with very similar keywords and phrases. These pages are called Doorway or Gateway Pages.

Mirror websites by hosting multiple websites - all with conceptually similar content but using different URLs.

Creating a rogue copy of a popular website which shows contents similar to the original to a web crawler, but redirects web surfers to unrelated or malicious websites. This is called page hijacking.

Q3: The choice phase of problem solving involves a search for an appropriate course of action (among those identified during the design phase) that can solve the problem.Several major search approaches are possible, depending on the criteria (or criterion) of choice and the type of modeling approach used. Describe those search approaches in detail.

Search approaches :

1) Blind approach -

2) Heuristic approach -

Q4:The development of expert systems is often described as a tedious process. What activities does it typically include?

The development of expert systems is often described as a tedious process.The activities does it typically include are the following:-

IDENTIFYING PROPER EXPERTS after the nature and scope of the problem have been already defined,

• Knowledge gained from the experts;
• Mapping method in the knowledge database;
• Methods of using the knowledge databases for logic conclusion.

are three typical pillars in building expert systems.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote