hacker: prefer linux

from Quasimodo
0.2 0.4 0.6 0.8 Plausible Typical Remarkable Salient

Related concepts

Parents criminal
Weight: 0.63
, outsider
Weight: 0.63
, person
Weight: 0.57
, third party
Weight: 0.57
, individual
Weight: 0.55
Siblings spammer
Weight: 0.33
, pickpocket
Weight: 0.32
, terrorist
Weight: 0.32
, thief
Weight: 0.32

Related properties

Property Similarity
prefer linux 1.00
use linux 0.96
prefer kali linux 0.92
use irc 0.80
use mac 0.79
use vpn 0.79
be upset with sony 's new movie 0.77
prefer bitcoin 0.77

Priors about this statement

Cues

0.2 0.4 0.6 0.8 Joint Necessity Sufficiency Implication Entailment Contradiction Entropy

Evidence

0.2 0.4 0.6 0.8 Plausible Typical Remarkable Salient

Clauses

Salient implies Plausible

0.22
Rule weight: 0.28
Evidence weight: 0.79
Similarity weight: 1.00
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.79
¬ Salient(hacker, prefer linux)

Similarity expansion

0.74
Rule weight: 0.85
Evidence weight: 0.90
Similarity weight: 0.96
Evidence: 0.79
Typical(hacker, prefer linux)
Evidence: 0.45
¬ Typical(hacker, use linux)
0.70
Rule weight: 0.85
Evidence weight: 0.86
Similarity weight: 0.96
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.53
¬ Plausible(hacker, use linux)
0.70
Rule weight: 0.85
Evidence weight: 0.85
Similarity weight: 0.96
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.68
¬ Salient(hacker, use linux)
0.66
Rule weight: 0.85
Evidence weight: 0.84
Similarity weight: 0.92
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.73
¬ Salient(hacker, prefer kali linux)
0.66
Rule weight: 0.85
Evidence weight: 0.97
Similarity weight: 0.79
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.11
¬ Plausible(hacker, use mac)
0.66
Rule weight: 0.85
Evidence weight: 0.97
Similarity weight: 0.79
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.15
¬ Salient(hacker, use mac)
0.65
Rule weight: 0.85
Evidence weight: 0.83
Similarity weight: 0.92
Evidence: 0.60
Remarkable(hacker, prefer linux)
Evidence: 0.43
¬ Remarkable(hacker, prefer kali linux)
0.65
Rule weight: 0.85
Evidence weight: 0.95
Similarity weight: 0.79
Evidence: 0.79
Typical(hacker, prefer linux)
Evidence: 0.22
¬ Typical(hacker, use vpn)
0.64
Rule weight: 0.85
Evidence weight: 0.82
Similarity weight: 0.92
Evidence: 0.79
Typical(hacker, prefer linux)
Evidence: 0.86
¬ Typical(hacker, prefer kali linux)
0.64
Rule weight: 0.85
Evidence weight: 0.94
Similarity weight: 0.79
Evidence: 0.79
Typical(hacker, prefer linux)
Evidence: 0.28
¬ Typical(hacker, use mac)
0.63
Rule weight: 0.85
Evidence weight: 0.80
Similarity weight: 0.92
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.74
¬ Plausible(hacker, prefer kali linux)
0.62
Rule weight: 0.85
Evidence weight: 0.92
Similarity weight: 0.79
Evidence: 0.60
Remarkable(hacker, prefer linux)
Evidence: 0.20
¬ Remarkable(hacker, use mac)
0.62
Rule weight: 0.85
Evidence weight: 0.91
Similarity weight: 0.80
Evidence: 0.79
Typical(hacker, prefer linux)
Evidence: 0.41
¬ Typical(hacker, use irc)
0.62
Rule weight: 0.85
Evidence weight: 0.91
Similarity weight: 0.79
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.34
¬ Plausible(hacker, use vpn)
0.61
Rule weight: 0.85
Evidence weight: 0.90
Similarity weight: 0.79
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.45
¬ Salient(hacker, use vpn)
0.59
Rule weight: 0.85
Evidence weight: 0.91
Similarity weight: 0.77
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.43
¬ Salient(hacker, prefer bitcoin)
0.59
Rule weight: 0.85
Evidence weight: 0.86
Similarity weight: 0.80
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.52
¬ Plausible(hacker, use irc)
0.58
Rule weight: 0.85
Evidence weight: 0.85
Similarity weight: 0.80
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.70
¬ Salient(hacker, use irc)
0.57
Rule weight: 0.85
Evidence weight: 0.87
Similarity weight: 0.77
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.50
¬ Plausible(hacker, prefer bitcoin)
0.57
Rule weight: 0.85
Evidence weight: 0.87
Similarity weight: 0.77
Evidence: 0.79
Typical(hacker, prefer linux)
Evidence: 0.63
¬ Typical(hacker, prefer bitcoin)
0.55
Rule weight: 0.85
Evidence weight: 0.84
Similarity weight: 0.77
Evidence: 0.60
Remarkable(hacker, prefer linux)
Evidence: 0.39
¬ Remarkable(hacker, prefer bitcoin)
0.55
Rule weight: 0.85
Evidence weight: 0.67
Similarity weight: 0.96
Evidence: 0.60
Remarkable(hacker, prefer linux)
Evidence: 0.81
¬ Remarkable(hacker, use linux)
0.46
Rule weight: 0.85
Evidence weight: 0.67
Similarity weight: 0.79
Evidence: 0.60
Remarkable(hacker, prefer linux)
Evidence: 0.81
¬ Remarkable(hacker, use vpn)
0.45
Rule weight: 0.85
Evidence weight: 0.66
Similarity weight: 0.80
Evidence: 0.60
Remarkable(hacker, prefer linux)
Evidence: 0.84
¬ Remarkable(hacker, use irc)

Typical and Remarkable implies Salient

0.12
Rule weight: 0.14
Evidence weight: 0.90
Similarity weight: 1.00
Evidence: 0.79
Salient(hacker, prefer linux)
Evidence: 0.79
¬ Typical(hacker, prefer linux)
Evidence: 0.60
¬ Remarkable(hacker, prefer linux)

Typical implies Plausible

0.38
Rule weight: 0.48
Evidence weight: 0.79
Similarity weight: 1.00
Evidence: 0.73
Plausible(hacker, prefer linux)
Evidence: 0.79
¬ Typical(hacker, prefer linux)