1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
14

Explain three applications of data mining

Computers and Technology
1 answer:
maria [59]3 years ago
5 0

Answer:

Future Healthcare

Manufacturing Engineering

Corporate Surveillance

Explanation:

You might be interested in
The monkey-and-bananas problem is faced by a monkey in a laboratory with some bananas hanging out of reach from the ceiling. A b
elixir [45]

Answer:

a) <u>initial state description</u>

<em>At(Monkey, A) ∧ At(Bananas, B) ∧ At(Box, C) ∧</em>

<em>Height(Monkey, Low) ∧ Height (Box, Low) ∧</em>

<em>Height (Bananas, High) ∧ Push(Box) ∧ ClimbUp(Box)</em>

b)  <u>the six action schemas.</u>

1 - Go from one place to another

<em>Action (Go(x, y),</em>

<em>PRECONDITION: At (Monkey, x)</em>

<em>EFFECT: At (Monkey, y) ∧¬At(Monkey, x))</em>

2 - Push an object from one place to another

<em>Action (Push(b, x, y),</em>

<em>PRECONDITION: At (Monkey, x) ∧ Can Push(b)</em>

<em>EFFECT: At(b, y) ∧ At (Monkey, y) ∧¬At(b, x) ∧¬At(Monkey, x))</em>

3 - Climb up unto an object

<em>Action (ClimbUp(b),</em>

<em>PRECONDITION: At(b, x) ∧ At(Monkey, x) ∧ ClimbUp(b)</em>

<em>EFFECT: On (Monkey, b) ∧¬Height (Monkey, High))</em>

4 - ClimbDown from an object

<em>Action (ClimbDown (b),</em>

<em>PRECONDITION: On (Monkey, b) ∧ Height (Monkey, High)</em>

<em>EFFECT: ¬On (Monkey, b) ∧¬Height (Monkey, High) ∧ Height(Monkey, Low))</em>

5 - Grasp an object

<em>Action (Grasp (object, position, height),</em>

<em>PRECONDITION: Height(Monkey, h) ∧ Height(b, h) ∧ At(Monkey, x) ∧ At(b, x)</em>

<em>EFFECT: Has(Monkey, b))</em>

6 - Ungrasp an object

<em>Action (Ungrasp(b),</em>

<em>PRECONDITION: Have(Monkey, b)</em>

<em>EFFECT: Has(Monkey, object))</em>

<em />

c) <u>general goal state.</u>

<em>Has(Monkey, Bananas, s) ∧ (ЗхAt(Box, x, s₁) ∧ At(Box, x, s))</em>

STRIPS only consider about goal state, there is no relation between two states within the plan, so there is no way to represent this goal.

6 0
3 years ago
The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
Feliz [49]

Answer:

Light text on a dark background

Explanation:

Microsoft PowerPoint is an application software in which the company ables to introduce themselves by making slides and presented to an audience in an easy and innovative way. In this,  we can add pictures, sound, video by adding the different text, colors, backgrounds, etc

For memorable and professional presentations, the light text on a dark background is a best combination as it is easy to read and give the best view of the message you want to convey.

8 0
3 years ago
Artificial intelligence (AI) and machine learning are especially important during which security information and event managemen
Juli2301 [7.4K]

Answer:

hueiweke

Explanation:

5 0
2 years ago
What is a biometric scanner?
Lisa [10]
<span>an electronic device used to determine a person's identity by detecting and matching the person's physical features, such as fingerprints or the eyes, to a database</span>
3 0
3 years ago
Read 2 more answers
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
Other questions:
  • The IP address 129.53.82.20 falls under what class of IP addresses??
    5·2 answers
  • Pls help! ive been looking everywhere online but I couldn't find the answer to this:
    5·1 answer
  • What are the names of the two main characters in pirates of silicon valley
    5·1 answer
  • Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
    8·2 answers
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • Which are examples of non-linear presentations? Choose all that apply.
    11·1 answer
  • Which of the following describes a recording scout's job in the music industry?
    5·2 answers
  • The higher the ____________________, the faster the ____________________.
    5·1 answer
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!