1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
3 years ago
10

Many clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situati

ons in which this is not the case
Computers and Technology
1 answer:
xeze [42]3 years ago
4 0

Answer:

The list of those two situations is given below.

Explanation:

<u>Case 1:</u>

Yet another condition for manual cluster formation that wasn't an improvement would be whenever the number of observations measured is higher than even the machine can accommodate.  

<u>Case 2:</u>

The second scenario which isn't an improvement whenever the original data is recognized for automated cluster analysis, and therefore also implementing the algorithms doesn't generate any extra details.

You might be interested in
Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfo
lesya [120]

Answer:

Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfortunately, a recent power surge caused a malfunction in the system just before votes were counted. The only information saved consists of the following facts:

Explanation:

• All the N citizens casted their vote.

• Exactly one candidate received more than N/2 votes.

• We don’t know how many candidates there were.

You are hired to help using your expertise in algorithms.

5 0
2 years ago
What size hard disc is recommended for powerpoint writting
mixas84 [53]

Answer:

Depends on how many PowerPoint files you want to store and how long they are. I'd recommend at least a 256GB hard drive to store your OS and software and then leave space for PowerPoints.

5 0
3 years ago
If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originate
suter [353]
<span>The answer is IP address.  If you experience a denial-of-service attack, you can use firewall logs to determine the IP address from which the attack originated.</span>
6 0
3 years ago
Read 2 more answers
Which of these is NOT a benefit of trade?
Natasha_Volkova [10]

Answer:

<em>Creation of Dependencies</em> is not the only benefit of trade in the list.

Explanation:

People can provide the access to their resource with the help of trading, it will also increase the satisfaction of customer as he will be able to buy the product of his own choice with satisfactory price, as it breaks the monopoly of local producers.

There many disadvantages of the trade, such as it will create dependencies on other countries and local producers not be able to produce that products, this will lead to increase in imports and will increase the trade deficit of the country.

8 0
4 years ago
Mike needs to export some animation videos from his smartphone to an online platform. Which common file format can he use for th
Anastasy [175]
The answer would be b
8 0
3 years ago
Other questions:
  • 19. Squares. Write a program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program
    11·1 answer
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • Displays unsolicited advertisements in banners or pop-up windows
    5·1 answer
  • Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    5·1 answer
  • In object-oriented programming, the object encapsulates both the data and the functions that operate on the data.
    10·1 answer
  • Using media allows us to:
    15·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • Which of the following devices can be connected to a network? Check all of the boxes that apply.
    9·1 answer
  • Please help ⊙﹏⊙ thank you &lt;3
    10·2 answers
  • A ____ risk assessment evaluates threats to and vulnerabilities of the network.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!