Answer:
b, with grace and maturity
Answer:
C.) for priority-based scheduling algorithms
Explanation:
for priority-based scheduling algorithms
Security/Insider threats.
As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.
Cyber-attacks.
Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.
Answer:
4. Supervised learning.
Explanation:
Supervised and Unsupervised learning are both learning approaches in machine learning. In other words, they are sub-branches in machine learning.
In supervised learning, an algorithm(a function) is used to map input(s) to output(s). The aim of supervised learning is to predict output variables for given input data using a mapping function. When an input is given, predictions can be made to get the output.
Unsupervised learning on the other hand is suitable when no output variables are needed. The only data needed are the inputs. In this type of learning, the system just keeps learning more about the inputs.
Special applications of supervised learning are in image recognition, speech recognition, financial analysis, neural networking, forecasting and a whole lot more.
Application of unsupervised learning is in pre-processing of data during exploratory analysis.
<em>Hope this helps!</em>