1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
6

Could Anyone Please Explain To Me What Is Supervised Learning In Machine Learning? I encourage that you explain it in simple wor

ds as I am pretty new to ML and do not know a lot about algorithms and stuff like that. All the explanations on the internet are pretty complex. I would also like to know that why do people refer to this as A to B mapping or Input to Output?
Computers and Technology
1 answer:
nadya68 [22]3 years ago
4 0

Answer:

Kindly check Explanation.

Explanation:

Machine Learning refers to a concept of teaching or empowering systems with the ability to learn without explicit programming.

Supervised machine learning refers to a Machine learning concept whereby the system is provided with both features and label or target data to learn from. The target or label refers to the actual prediction which is provided alongside the learning features. This means that the output, target or label of the features used in training is provided to the system. this is where the word supervised comes in, the target or label provided during training or teaching the system ensures that the system can evaluate the correctness of what is she's being taught. The actual prediction provided ensures that the predictions made by the system can be monitored and accuracy evaluated.

Hence the main difference between supervised and unsupervised machine learning is the fact that one is provided with label or target data( supervised learning) and unsupervised learning isn't provided with target data, hence, it finds pattern in the data on it's own.

A to B mapping or input to output refers to the feature to target mapping.

Where A or input represents the feature parameters and B or output means the target or label parameter.

You might be interested in
Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and lapto
k0ka [10]

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

  • Digital signature
  • Heuristic detection
  • Behavior detection
  • Sandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

7 0
3 years ago
When should the sponsor-monitor conduct the most detailed review of the study protocol with the site's study staff?
Likurg_2 [28]

Answer:

Site initiation visit is the correct answer.

Explanation:

Because the SIV is the sponsor-monitor which administers the detailed analysis of the site's study staff by the study protocol and it observes the process of the visite over a while that it take place after the visite of the site section. It also needed to set up the research site to administrates the analysis. So, that's why the following answer is true.

8 0
2 years ago
Why might you add the Outer Glow effect to text?
-Dominant- [34]

Answer:

nothing it's perfect in the way it is

Explanation:

4 0
2 years ago
Janet has to prepare a presentation on business strategies for work. Which guideline should she follow to create an effective pr
Tpy6a [65]

d.....................................


7 0
3 years ago
Read 2 more answers
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
Other questions:
  • What is an example of asynchronous communication
    7·1 answer
  • Which Game Is Better & Favorite For You?
    12·2 answers
  • Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
    5·2 answers
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • Which of the following is a default letter assigned for the primary hard drive
    6·2 answers
  • When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
    6·1 answer
  • What type of technology we need to use in order to make sure that users can freely room from one room to another one without wi-
    14·1 answer
  • which of the following peripheral does not belong to a group: A) Monitor B) Printer C) Hardware D) Keyboard​
    8·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
  • 4. is the disappearance of the individual a bad thing?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!