1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
2 years ago
9

Regarding k-NN algorithm which of the following statements is true?

Computers and Technology
1 answer:
Contact [7]2 years ago
3 0

Answer:

A

Explanation:

KNN could be used for both classification and regression problems

You might be interested in
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
Free_Kalibri [48]

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

7 0
3 years ago
Ex1. Classify the following statements as business (B), functional (F), non- functional (N), or data (D) requirements; for the l
Alina [70]

Answer:

<em>Solution</em>:

The statements are listed below.  

<em>(A) Functional requirement </em>

  • Functional specifications refer to the handling of calls.  
  • Minimum call number should be 3000, and a functional requirement.  

<em>(B) Non-functional requirement</em>

  • Non-functional requirement is the default option.  
  • Payment in "Visa" is required and this is not a functional requirement.

<em>(C) Data requirements</em>

  • Data requirements apply to quantity of order.  
  • When the quantity of data exceeds then an exception should be notified  

<em>(D) Business requirements. </em>

  • Product reviews are subject to business requirements.

3 0
3 years ago
There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a
spayn [35]

Answer:

The answer is True

Explanation:

Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.

When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.

6 0
3 years ago
Python coding beginners question
Llana [10]

Answer:

i really don't know

4 0
3 years ago
Read 2 more answers
Luis got himself in trouble by accidentally sending an e-mail to a client instead of his coworker. He resolved to be more carefu
Elodia [21]

Answer:

Explanation:

There are two main practices that Luis needs to make into a habit of doing every time he sends an e-mail, these are

  • Being careful when using the Reply to All feature.
  • Double-checking the Cc and Bcc fields.

Taking into account both of these practices will make sure that Luis is sending the written e-mail to the correct individual's address and also making sure that he is not sending the e-mail to any other individual by accident when using the Reply to All feature.

7 0
3 years ago
Other questions:
  • Suppose you wish to write a method that returns the sum of the elements in partially filled array. Which is the best choice for
    6·1 answer
  • What OS is most commonly used by businesses? Linux Macintosh Microsoft Windows
    11·1 answer
  • The drone intercepts at 1256 hour. what time do they plane to take control of the drone
    11·1 answer
  • The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
    12·1 answer
  • How many types of string types does python support?​
    13·1 answer
  • A __________ is a combination of software and hardware that links two different types of networks.
    14·1 answer
  • Which of the following is not a type of bank? (Everfi)
    9·2 answers
  • Which is better Play Station Xbox or PC
    14·2 answers
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • Heyyyyyy<br> byeeeeeeeeeeeeeeeeeeeeeee
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!