1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
12

Assuming that data mining approaches are to be used in the following cases, identify whether the task required is supervised or

unsupervised learning:
a. Printing of custom discount coupons at the conclusion of a grocery store checkout based on what you just bought and what others have bought previously

b. Deciding whether to issue a loan to an applicant based on demographic and financial data, with reference to a database of similar data on prior customers.

c. Identifying a network data packet as dangerous (virus, hacker attack) based on comparison to other packets whose threat status is known.
Computers and Technology
1 answer:
Yuliya22 [10]3 years ago
7 0

Answer:

A - supervised

B- supervised

C- unsupervised

Explanation:

A supervised learning algorithms analyses to infer a function from it which can be used for mapping new replicas that is each example is a pair which consists of input object and a desired output value .

Unsupervised learning is that process that true to find a hidden structure in the unlabeled data.

You might be interested in
The IT department in a company is looking for a solution to consolidate the functionality of several mission critical server com
marshall27 [118]

Answer: (1) Oracle VM Server  

               (2) VM Ware v Sphere

Explanation:

  The oracle VM server and the VM ware v Sphere are the two hyper-visors that is used in the IT department by an organization for the purpose of high performance.

  • The oracle VM (Virtual machine) server is one of the type of virtual machine that is used to run various types of operating system and oracle VM server is one of the open source technology that support Linux and window.
  • The VM ware V sphere is one of the type of visualization based application which basically run the multiple OS based system by using the single machine. It is also helps in balancing the workload in the system.  

According to the given question, the two given hyper-visors are used by the information technology department that helps in handling the critical functionality in an organization.

 Therefore, The given answer s correct.

8 0
4 years ago
What does pdf stand for?
sladkih [1.3K]
A file format that provides an electronic image of text or text and graphics that looks like a printed document and can be viewed, printed, and electronically transmitted.

a file in PDF format.

"I sent him a PDF of the article"
8 0
3 years ago
An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the n
kirill115 [55]
True

explanation: bc it is
8 0
3 years ago
Write a program that asks the user for three names, then prints the names in reverse order.
sasho [114]

Answer:

The program written in C++ is as follows'

#include<iostream>

using namespace std;

int main()

{

string names[3];

cout<<"Please enter three names: "<<endl;

for (int i = 0; i< 3;i++)

{

cin>>names[i];

}

for (int i = 2; i>= 0;i--)

{

cout<<names[i]<<endl;

}

return 0;

}

Explanation:

This line declares an array for 3 elements

string names[3];

This line prompts user for three names

cout<<"Please enter three names: "<<endl;

This following iteration lets user input the three names

for (int i = 0; i< 3;i++)  {  cin>>names[i];  }

The following iteration prints the three names in reverse order

for (int i = 2; i>= 0;i--)  {  cout<<names[i]<<endl;  }

8 0
3 years ago
Why do we use computers?<br><br>​
Nina [5.8K]

Explanation:

Computers are very useful machines..We use it for creating presentations, creating documents, creating many more things that are made nicely by computer..

6 0
3 years ago
Read 2 more answers
Other questions:
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry.
    7·1 answer
  • • In your response, please include some examples of the three different types of storage.
    11·2 answers
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
    13·1 answer
  • 1.Menciona tres factores o variables que consideras influirán en el oscurecimiento del alimento cortado o pelado expuesto a la i
    8·1 answer
  • 20. The following are considered as ICT skills EXCEPT
    15·1 answer
  • HELPPP
    5·1 answer
  • What should you commit to your family members?
    10·1 answer
  • Which programming language in order takes the most lines code​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!