1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
3 years ago
6

Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________.

Computers and Technology
1 answer:
nata0808 [166]3 years ago
8 0

Answer:

4. Supervised learning.

Explanation:

Supervised and Unsupervised learning are both learning approaches in machine learning. In other words, they are sub-branches in machine learning.

In supervised learning, an algorithm(a function) is used to map input(s) to output(s). The aim of supervised learning is to predict output variables for given input data using a mapping function. When an input is given, predictions can be made to get the output.

Unsupervised learning on the other hand is suitable when no output variables are needed. The only data needed are the inputs. In this type of learning, the system just keeps learning more about the inputs.

Special applications of supervised learning are in image recognition, speech recognition, financial analysis, neural networking, forecasting and a whole lot more.

Application of unsupervised learning is in pre-processing of data during exploratory analysis.

<em>Hope this helps!</em>

You might be interested in
Importance of word processing application​
alina1380 [7]

Answer:

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing.

Explanation:

8 0
4 years ago
Type the numbers 1-50 and then type Computers and Technology twice type it once forward and once backwards.
Ierofanga [76]

Answer:

Why?

Explanation:

7 0
3 years ago
Read 2 more answers
Password ____ traverse the network searching for passwords from remote authentication systems.
irga5000 [103]

The correct answer is scanners.

<h3>what is password?</h3>

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

When a password contains more than one word, it may be referred to as a passphrase. When a password contains solely digits, such as a personal identification number, it may be referred to as a passcode or passkey (PIN).

learn more about password refer:

brainly.com/question/15569196

#SPJ4

3 0
2 years ago
Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which
bagirrra123 [75]

The software development methodology used by the Game Changer teams is called; <u><em>Prototyping</em></u>

<u><em /></u>

We are given that;

- Game changer technologies has four software teams

- Each of the teams develops 4 different examples of the new game app.

Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.

When the acceptable prototype is gotten, then it will be used to develop its final game app.

Read more about prototype at; brainly.com/question/25824140

8 0
2 years ago
If you wouldn't want someone to photograph you doing something, don't photograph someone else in that situation either. True Fal
Sunny_sXe [5.5K]

In the United States, it's illegal for a photographer to use someone's likeness ... Model release forms contain conditions on working with people, and in some ... You'll need this release form if you want to publish photos of another person's ... If you don't want to take any legal risks, then use a photo release form to be safe.

4 0
3 years ago
Other questions:
  • In gaming, "rendering" refers to:
    12·2 answers
  • While creating a sketch, what helps you identify positive and negative space?
    13·1 answer
  • . A program will ""fall through"" a case section if it is missing the __________ statement.
    15·1 answer
  • 9
    10·1 answer
  • The Electronic Communications Privacy Act requires an investigator to have a wiretap order to acquire ___________ information fr
    8·1 answer
  • Which of the following is NOT true about simple machines?
    10·1 answer
  • Jerry can use an <br> program to restrict information from going out without his permission.
    12·2 answers
  • What is not an advantage of a computer network?
    14·1 answer
  • What are the important points
    7·1 answer
  • The pH scale is_____ ?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!