Answer:
a
Explanation:
a webcast is the answer I think
The Assignment
For the purpose of this assignment, we will be asking you to do a simplified version of the algorithm using 2D Cartesian points and Euclidean distance measurement to calculate closeness. The Rules
Each point given will have a unique (x,y) coordinate. Each point will be classified as either R for Red or B for Blue. There will never be a tie as to what an object will be classified as. Input
As input you will be given on the first line n and k followed by 1 <= n <= 100 lines each containing a pre-classified point. N is the number of pre-classified points given, 1 <= k <= n is the number of nearest neighbors you will use to classify your unknown point. Each of the pre-classified points will be represented on separate lines in the form x y c where x and y are the Cartesian coordinates of the point -100. 0 <= x,y <= 100. 0 and c is its label, either R or B. Finally on the last line you will receive, in the format x y, the Cartesian coordinates of the point which should be classified. For example:
10 3
3. 57 -3. 18 R
84. 91 27. 69 B
93. 40 4. 62 B
-67. 87 9. 71 B
75. 77 82. 35 B
-74. 31 -69. 48 R
39. 22 31. 71 R
-65. 55 95. 02 B
17. 12 3. 44 B
70. 60 -43. 87 R
25. 60 -10. 15
Your Task
Once you have this information, you should find and record the point closest to point p (the unknown), then find the next closest point, etc. Until you have found k points. Count how many times labels R and B were found, point p gets classified as whichever label occurred more. Remember that the rules ensure one label will always occur more than the other. Output
Your output should be a single char either R or B which your point p has been classified as
The task for this assignment involves using a simplified version of an algorithm that utilizes 2D Cartesian points and Euclidean distance measurement to calculate closeness.
Algorithm using 2D Cartesian points and Euclidean distance measurement to calculate closeness:
1. Read input values n and k, and the n pre-classified points with their coordinates (x, y) and labels (R or B).
2. Read the unknown point's coordinates (x, y).
3. Calculate the Euclidean distance between the unknown point and each of the pre-classified points.
4. Sort the pre-classified points based on their calculated distances from the unknown point in ascending order.
5. Select the first k points from the sorted list.
6. Count the occurrences of labels R and B among the selected k points.
7. Classify the unknown point as R or B based on which label occurred more frequently among the k points.
For the given example:
Input:
10 3
3.57 -3.18 R
84.91 27.69 B
93.40 4.62 B
-67.87 9.71 B
75.77 82.35 B
-74.31 -69.48 R
39.22 31.71 R
-65.55 95.02 B
17.12 3.44 B
70.60 -43.87 R
25.60 -10.15
Output:
R
In this case, the unknown point (25.60, -10.15) is classified as R, since there are more R labels among the 3 nearest neighbors.
To know more about Euclidean distance visit:
https://brainly.com/question/31538311
#SPJ11
(25 POINTS)Which statement best reflects the importance of following safety guidelines?
Workplace injuries can result in losses to an organization’s profits.
OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.
Every year, thousands of people die as a result of workplace injuries.
Using equipment safely is faster and makes work more efficient.
Answer:
I think, Every year, thousands of people die as a result of workplace injuries.
Answer:
B
Explanation:
if i don't convert type to outlines in illustrator, does the viewer need to have the fonts installed? Yes/No
Yes, if you don't convert the type to outlines in Illustrator and the viewer does not have the fonts installed on their computer, the text will not display correctly.
This is because when you create text in Illustrator, it uses the fonts installed on your computer to display the characters. If you send the file to someone who does not have those fonts installed, their computer will substitute a different font, which may not match the original design.
However, if you convert the text to outlines, the font is no longer required and the text will be displayed as a graphic, which can be viewed correctly regardless of the viewer's installed fonts. It's important to note that converting text to outlines can make it more difficult to make edits later, so it's recommended to keep a copy of the original file with the live text intact.
Learn more about fonts here:
https://brainly.com/question/14934409
#SPJ11
What does loss with cumulative ACK mean?
In computer networking, a cumulative acknowledgment (ACK) is a signal used by the receiver to inform the sender that it has received all data up to a certain point in the data stream.
A loss with cumulative ACK occurs when the receiver sends an ACK for data that it has not actually received. This can happen if the receiver mistakenly assumes it has received a packet due to packet reordering or duplication. In such cases, the sender may retransmit the lost packet, or the receiver may send a duplicate ACK to prompt the sender to retransmit.
To learn more about data click the link below:
brainly.com/question/31063376
#SPJ11
Haan creates this table to track his income.
A
1 Month
2 Jan
3 Feb
4 Mar
5 Apr
6 May
7 Jun
8 Jul
9 Aug
10 Sep
11 Oct
12 Nov
13 Dec
14 Year Total
B
Income
$3,800
$3,300
$4,200
$4,900
$2,800
$4,100
$3,000
$4,200
$4,700
$3,600
$5,100
$4,200
Which would give him the total income for the year?
=SUM(B2 B13)
EADD(B1:B14)
SUMB1B14
(B2B13)
Answer:
Your answer is 42,800.
Explanation:
Add together all the numbers and you get a total income of 42,800.
Answer:
=SUM(B2:B13)
Explanation:
EDGE2021
Write a program
1. Enter a String value as a variable "word": "Instructorcanofferminimalhints"
2. Create a method that is called "showPairs(String word)"
-In the method, the program shows us "word" that is separated by 3 characters
The program, "showPairs(String word)", takes a string value as input and displays the string with three-character separation. In this case, the input string is "Instructorcanofferminimalhints," and the program will separate it as "Ins tru cto rca noff erm inh int s."
To achieve the desired functionality, we can define a method called "showPairs" that takes a string parameter, "word." Within this method, we can create a new string, "result," to store the separated version of the input string.
Next, we can iterate over the characters of the input string using a for loop. Inside the loop, we can append the current character to the "result" string. After appending the character, we can check if the next three characters are available in the input string. If they are, we can append a space to the "result" string. This process ensures that every three characters are separated by a space in the final result.
Finally, we can return the "result" string as the output of the method. When we invoke the "showPairs" method with the input string "Instructorcanofferminimalhints," it will return "Ins tru cto rca noff erm inh int s" as the output, which represents the input string separated by three characters.
learn more about string value here:
https://brainly.com/question/31764266
#SPJ11
You listened to a song on your computer is it hardware or sofrtware, explain?
hardware, because u are using speaker which is a hardware
Help ASAP this Answer is simple…
why is fair use important
Answer:
to ensure that the rights of the copyright holders are fair or balanced properly
Explanation:
hope this helps
are our current copyright policies helping society or hurting society? i need help
Answer:
helping society
Explanation:
it can help you to protect your works and creativity and brilliant ideas from liars and cheaters and frauds
Assuming that he runs the program on a computer that can run 8 tasks in parallel, how long will the parallelized solution take
Given the number of tasks that can be run in parallel is 8. Hence, it can be said that the parallelized solution will take at most 150/8 seconds because when the tasks are run in parallel, they can be completed more quickly.
Parallel processing is a kind of computation in which multiple calculations or the execution of multiple processes are carried out simultaneously. The parallel processing system may be composed of multiple processors, each of which has its own memory. The goal of parallel processing is to reduce the time it takes to complete computations by dividing them into smaller ones that can be run simultaneously.Parallel computing is important because it allows a lot of data to be processed more quickly. Parallel programming makes it easier to create algorithms that divide data into smaller parts that can be processed simultaneously by different CPUs.In summary, it can be concluded that the parallelized solution will take at most 150/8 seconds.
Learn more about Parallel processing here,Parallel processing that uses two or more computers working together to solve a single problem using parallel processing...
https://brainly.com/question/29027138
#SPJ11
on your newly-installed systemd-based server you want to view log files that pertai tp the systems booting and any error messages. which command would you use on this system to view the desired information?
Journalctl is the command used on the system to view the desired information
What is journalctl?
A tool called journalctl is used to search and display the logs kept by journald, the logging service provided by systemd.Journalctl is the preferred method of reading log messages processed by journald since journald maintains log data in a binary format rather than a textual format.
Numerous tools are available on Linux-based systems to assist in recording and analysing system logs. Similar to "systemd," a strong programme that collects logs from sources in binary format and enables command-line access to the logs for the user.The "Journald" is a system application from the systemd utility that gathers information in binary format from various logs. It provides a more effective way to manage logs while operating in a similar manner to syslog.
Hence to conclude the Journalctl command is used on the system to view the desired information
To know more on commands in systemd follow this link:
https://brainly.com/question/29727723
#SPJ4
Understand spreadsheet software. a. What is the difference between a workbook and a worksheet? b. Identify five common business uses for electronic spreadsheets. c. What is what-if analysis?
a. A wοrksheet is a single page within a wοrkbοοk where data can be entered and manipulated using fοrmulas, functiοns, and fοrmatting tοοls.
b. five cοmmοn business uses fοr electrοnic spreadsheets:
Budgeting and financial analysisInventοry managementPrοject managementData analysis and repοrtingEmplοyee schedulingc. What-if analysis is a technique used in spreadsheet sοftware tο explοre different scenariοs by changing input values and οbserving the resulting changes in οutput values.
What is a detailed explanatiοn οf spreadsheet sοftware?Spreadsheet sοftware is a tοοl used tο οrganize and manipulate numerical data in rοws and cοlumns, using fοrmulas and functiοns tο perfοrm calculatiοns and analysis.
A. In spreadsheet sοftware, a wοrkbοοk is a file that cοntains multiple wοrksheets. A wοrksheet, alsο knοwn as a spreadsheet οr a sheet, is a single page within a wοrkbοοk where data can be entered and manipulated using fοrmulas, functiοns, and fοrmatting tοοls.
B. Five cοmmοn business uses fοr electrοnic spreadsheets are:
Budgeting and financial analysis: Spreadsheets can be used tο track incοme and expenses, create financial prοjectiοns, and analyze data.Inventοry management: Spreadsheets can be used tο track inventοry levels, reοrder pοints, and sales data tο help businesses manage their inventοry efficiently.Prοject management: Spreadsheets can be used tο track tasks, timelines, and milestοnes fοr prοjects, as well as tο allοcate resοurces and mοnitοr prοgress.Data analysis and repοrting: Spreadsheets can be used tο analyze and visualize large amοunts οf data, create charts and graphs, and generate repοrts.Emplοyee scheduling: Spreadsheets can be used tο create schedules fοr emplοyees, manage vacatiοn time and sick leave, and track emplοyee hοurs wοrked.C. What-if analysis is a technique used in spreadsheet sοftware tο explοre different scenariοs by changing input values and οbserving the resulting changes in οutput values.
It allοws users tο mοdel different scenariοs and test assumptiοns by changing variables such as sales prοjectiοns, expenses, οr interest rates tο see hοw they wοuld impact the bοttοm line. What-if analysis can be used tο suppοrt decisiοn-making and fοrecasting in a variety οf business settings.
To learn more about Spreadsheet software, visit:
https://brainly.com/question/30458965
#SPJ4
Define columns ,types of columns and it's stability and
equilibrium conditions?
The column stability factor, or CP, ought to be set to 1.0 when calculating the crushing stress of a wood compression member.
A parameter in the calculation of the allowable compressive stress for wood compression members is the column stability factor, or CP. It considers the thinness proportion of the part, which is the proportion of the successful length of the part to its least sweep of gyration.
The allowable compressive stress in wood design is determined by a variety of equations and factors based on the member geometry, loading conditions, and type of wood. One usually involved condition for wood pressure individuals is the Euler clasping condition, which decides the basic clasping load for a thin section.
Learn more about crushing stress here :
brainly.com/question/30214665
#SPJ4
What is the name for the dynamic memory space that, unlike the stack, doesn't rely on
sequential ordering or organization?
A. Pointer
B. Heap
C. Pile
D. Load
The name for the dynamic memory space that, unlike the stack, doesn't rely on sequential ordering or organization is Heap. The Heap is a data structure that allows dynamic memory allocation.
The management of that memory is known as the Heap memory. It is also known as the dynamic memory allocation method. When the program execution begins, some memory is assigned to the program by the operating system, which is known as Stack Memory.
The Heap Memory is very flexible and allows the memory to be used whenever required and is less efficient than the Stack Memory. It takes a little more time for Heap Memory to locate the memory blocks and to allocate and deallocate memory. It is not sequential in nature, so the data allocation is not sequential.
To know more about dynamic visit:
https://brainly.com/question/29216876
#SPJ11
Consider sending a 1,600-byte datagram into a link that has an mtu of 500 bytes. suppose the original datagram is stamped with the identification number 291. how many fragments are generated? what are the values in the various fields in the ip datagram(s) generated related to fragmentation?
Explanation:
Step one
The maximum size of data field in each fragment = 480
(because there are 20 bytes IP header) Thus the number of required
fragments \(=\frac{1600-20}{480} \\\\= \frac{1580}{480} \\\\=3.29\\\\\)
thus the number of required fragment is 4
Step two
Each fragment will have identification number 291. each fragment except the last one will be of size 500 bytes (including IP header). the offset of the fragments will be 0, 60, 120, 180. each of the first 3 fragments will have
flag = 1; the last fragment will have flag =0
Using the appropriate formula, the number of fragments which would be present in the datagram to be sent would be 4
The minimum length of IP header = 20 bytes
Maximum transmission unit (mtu) = 500 bytes
Hence, the payload would be calculated thus :
mtu - header ;Payload = 500 - 20 = 480Hence, the maximum size of data field per Fragment = 480 bytes
The number of fragments required :
\(\frac{datagram \: size - Header \: size}{payload} \)\( Number \: of \: fragments = \frac{1600 - 20}{480} = 3.29\)
Hence, the number of fragments is 4
Size per Fragment would be 500 bytes each ; the last Fragment would be about 100 bytes Each Fragment would bear the identification number 291.Learn more : https://brainly.com/question/16289731
A palindrome is a word or a phrase that is the same when read both forward and backward. examples are: "bob," "sees," or "never odd or even" (ignoring spaces). write a program whose input is a word or phrase, and that outputs whether the input is a palindrome.
this the code that i put in it all worked until the phrase "never odd or even" gets tested
here is the code that i entered
name = str(input())
name = name.replace(' ', '')
new_name = name
new_name = new_name[::-1]
if name == new_name:
print('{} is a palindrome'.format(name))
else:
print('{} is not a palindrome'.format(name))
#and this is my output
neveroddoreven is a palindrome
#it needs to be
never odd or even is a palindrome
A word or phrase that reads the same both forward and backward is known as a palindrome. "bob," "sees," or "never odd or even" are some instances (ignoring spaces).
#include <iostream>
#include <string>
#include <cctype>
using namespace std;
bool is_palindrome(string s){
//use two indices, we will check if characters at indices match
int left_index = 0;
int right_index = s.length()-1;
while (right_index > left_index){ //loop until the left index is less than the right index
if(s[left_index] == ' '){ //if char at left_index is a space ignore it
left_index++;
}
else if(s[right_index] == ' '){ //if char at right_index is a space ignore it
right_index--;
}
else if(tolower(s[left_index]) == tolower(s[right_index])) //if chars at indices match
{
left_index++; //increment left, decrement right
right_index--;
}
else{
return false; //Not a palindrome
}
}
return true; //palindrome
}
int main()
{
string text;
cout << "Enter input string: ";
getline(cin, text); //read-string
if(is_palindrome(text)) //check for palindrome
cout << text << " is a palindrome" << endl;
else
cout << text << " is not a palindrome" << endl;
return 0;
}
Learn more about palindrome here:
https://brainly.com/question/29804965
#SPJ4
In a table form differentiate between email and nipost system
Answer:
Refer to the picture for the table...
Nipost is the abbreviation for Nigerian Postal Service on the other hand an e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.
What is an e-mail?An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.
In Computer Networking, a reengagement email is a type of email communication that is designed and developed to reach out to former clients and older prospects, and it encourages a reply.
The simple mail transfer protocol (SMTP) is known to be one that tends to specifies the way that messages are exchanged in between email servers. FTP is known to be a kind of a file transfer protocol. ICMP is said to be used in regards to the ping and trace way to communicate network information.
Read more about e-mail here:
brainly.com/question/15291965
#SPJ2
Codes written for one type of computer using _____ do not work on another type of computer.
Answer:
Codes written for one type of computer using assembly language do not work on another type of computer. Assmebly language generally is displayed as a list of letter and number codes that communicate certain functions.
Which of the following interior routing protocols support VLSM? (Choose four answers.)
a. RIP-1
b. RIP-2
c. EIGRP
d. OSPF
e. Integrated IS-IS
The interior routing protocols that support Variable Length Subnet Masking (VLSM) are EIGRP, OSPF, Integrated IS-IS, and RIP-2.
Variable Length Subnet Masking (VLSM) allows for the creation of subnets with different sizes within a network, which is useful for efficient utilization of IP addresses. Among the given options, the interior routing protocols that support VLSM are EIGRP, OSPF, Integrated IS-IS, and RIP-2.
EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol that supports VLSM. It allows for the creation of subnets with varying subnet mask lengths within a network, providing flexibility in network design and address allocation.
OSPF (Open Shortest Path First) is an industry-standard link-state routing protocol that also supports VLSM. With OSPF, network administrators can create subnets of different sizes by assigning appropriate subnet masks to the network interfaces, allowing for efficient address allocation.
Integrated IS-IS (Intermediate System-to-Intermediate System) is a link-state routing protocol used in larger networks. It also supports VLSM, enabling the creation of subnets with different subnet mask lengths within the network.
RIP-2 (Routing Information Protocol version 2) is an updated version of RIP that supports VLSM. Unlike its predecessor RIP-1, which only supports classful routing, RIP-2 allows for the use of variable length subnet masks, facilitating the creation of subnets with different sizes.
In contrast, RIP-1 (Routing Information Protocol version 1) does not support VLSM. It only supports classful routing, which means all subnets within a network must have the same subnet mask length.
Therefore, the correct answers are EIGRP, OSPF, Integrated IS-IS, and RIP-2, as these interior routing protocols support Variable Length Subnet Masking (VLSM).
Learn more about IP address here:
https://brainly.com/question/16011753
#SPJ11
Which of the following statements best describes the
location of the Options bar?
Select one:
At the top of the workspace window, home for
essential commands, adjustments and actions
Directly beneath the Menu bar, it displays available
options for the tool selected in the Tools Panel
At the left of the workspace window, it is a column
of icons for creating and editing
At the right of the workspace, the contains the
groups of controls for working with images
The statements that best describes the location of the Options bar is
Directly beneath the Menu bar, it displays available options for the tool selected in the Tools Panel.
What is option bar?Option bar serves as a tool bar, where some functional tools can be gotten when running a program.
Therefore, option bar is located Directly beneath the Menu bar, it displays available options for the tool selected in the Tools Panel
Learn more about options bar at;
https://brainly.com/question/1360051
You have been managing a $5 million portfolio that has a beta of 1.45 and a required rate of return of 10.975%. The current risk-free rate is 3%. Assume that you receive another $500,000. If you invest the money in a stock with a beta of 1.75, what will be the required return on your $5.5 million portfolio? Do not round intermediate calculations.
Round your answer to two decimal places.
%
The required return on the $5.5 million portfolio would be 12.18%.
1. To calculate the required return on the $5.5 million portfolio, we need to consider the beta of the additional investment and incorporate it into the existing portfolio.
2. The beta of a stock measures its sensitivity to market movements. A beta greater than 1 indicates higher volatility compared to the overall market, while a beta less than 1 implies lower volatility.
Given that the initial portfolio has a beta of 1.45 and a required rate of return of 10.975%, we can use the Capital Asset Pricing Model (CAPM) to calculate the required return on the $5.5 million portfolio. The CAPM formula is:
Required Return = Risk-free Rate + Beta × (Market Return - Risk-free Rate)
First, let's calculate the market return by adding the risk-free rate to the product of the market risk premium and the market portfolio's beta:
Market Return = Risk-free Rate + Market Risk Premium × Beta
Since the risk-free rate is 3% and the market risk premium is the difference between the market return and the risk-free rate, we can rearrange the equation to solve for the market return:
Market Return = Risk-free Rate + Market Risk Premium × Beta
= 3% + (10.975% - 3%) × 1.45
= 3% + 7.975% × 1.45
= 3% + 11.56175%
= 14.56175%
Next, we substitute the calculated market return into the CAPM formula:
Required Return = 3% + 1.75 × (14.56175% - 3%)
= 3% + 1.75 × 11.56175%
= 3% + 20.229%
= 23.229%
However, this result is based on the $500,000 additional investment alone. To find the required return on the $5.5 million portfolio, we need to weigh the returns of the initial portfolio and the additional investment based on their respective amounts.
3. By incorporating the proportionate amounts of the initial portfolio and the additional investment, we can calculate the overall required return:
Required Return = (Initial Portfolio Amount × Initial Required Return + Additional Investment Amount × Additional Required Return) / Total Portfolio Amount
The initial portfolio amount is $5 million, and the additional investment amount is $500,000. The initial required return is 10.975%, and the additional required return is 23.229%. Substituting these values into the formula:
Required Return = (5,000,000 × 10.975% + 500,000 × 23.229%) / 5,500,000
= (548,750 + 116,145.45) / 5,500,000
= 664,895.45 / 5,500,000
≈ 0.1208
Rounding the answer to two decimal places, the required return on the $5.5 million portfolio is approximately 12.18%.
Learn more about portfolio
brainly.com/question/17165367
#SPJ11
The best way to get clarification from someone is by
Answer:
Admit that you are unsure about what the speaker means.
Ask for repetition.
what are the advantages of saving files in a cloud?
Please help!!
to store three different strings using three variables and print the string aftet concatenation
Answer:
Explanation:
Certainly! Here's an example of how you can store three different strings using three variables and then concatenate them to print the resulting string:
```csharp
using System;
class Program
{
static void Main(string[] args)
{
string string1 = "Hello";
string string2 = "there";
string string3 = "world";
string result = string1 + " " + string2 + " " + string3;
Console.WriteLine(result);
}
}
```
In this example, we declare three string variables `string1`, `string2`, and `string3` to store the three different strings. Then, we use the concatenation operator `+` to combine the strings together with spaces in between. The resulting string is stored in the `result` variable. Finally, we use `Console.WriteLine()` to print the concatenated string to the console, which would display "Hello there world".
What responds to both visual appeal and functional needs? (1 point) A.) applied art B.) performance art C.) fine art D.) visual art
Answer:
A.) artes aplicadas
Explanation:
Calculate the turnover of gold rings sold in the south african market annually. demonstrate your approach to getting to an answer
The total turnover of gold sold in South Africa is estimated to be about $1.3 billion US Dollars/annum. This figure is likely to rise to $1.35 billion/annum by 2023.
What is turnover?Turnover is another word for sales in business. It is the total amount of revenue generated from the sale of goods or services.
What is the approach to getting the answer above?The figures gotten above were derived from statistical sources that are credible.
Learn more about South Africa's gold at:
https://brainly.com/question/15581783
I only put one answer and didn’t specify what it answered
How to check previous commits in git?
To check the previous commits in git, the command "git log" can be used. This command lists out the history of the commits that have been made to the repository.
What is Command ?Command is a directive or instruction given to a computer to perform a certain task. It can be a single word, a phrase, a combination of words, or even an entire sentence. Commands are typically used by users to control their computer systems, either through a command line interface or a graphical user interface. They are also used by software programs to control other software and hardware components. Commands may be stored in a file or written directly into a script that can be executed by the computer.
The output will include information such as the author, date and time, and commit message for each commit. Additionally, flags such as --online can be used to display the commits in a more concise format.
To learn more about Command
https://brainly.com/question/29627815
#SPJ4
what is a hexadeciaml
Answer:
I think it's relating to or using a system of numerical notation that has 16 rather than 10 as it's base
Answer:
Hexadecimal is the name of the numbering system that is base 16.
the standard code of respectful conduct governing the use of software and hardware for electronic communications is called electronic etiquette or
The standard code of respectful conduct governing the use of software and hardware for electronic communications is called electronic etiquette or Netiquette.
What is Netiquette?
Netiquette is a combination of the words net and etiquette. Netiquette thus describes the rules of conduct for respectful and appropriate internet communication.
Netiquette is another term for internet etiquette. These are not legally binding rules, but rather etiquette guidelines. Netiquette is mostly used when dealing with strangers on the internet. The rules of netiquette differ depending on the platform and its users. In general, the type and scope of netiquette is determined by the operator of a website or communication app. It is also their responsibility to monitor and penalize violations of these fundamental rules.
To know more about Netiquette, visit: https://brainly.com/question/1918317?referrer=searchResults
#SPJ4