1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
2 years ago
12

What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as

close together as possible to one another and the different groups are as far apart as possible?
1. Statical detection
2. Cluster analysis
3. Association detection
4. None of these.
Computers and Technology
1 answer:
Sphinxa [80]2 years ago
0 0

Answer:

The correct answer to the following question will be Option 2 (Cluster analysis).

Explanation:

  • The process of sorting a collection of items in such a manner that objects within the same category are much more identical than objects in many other clusters, known as Cluster analysis.
  • The goal of this analysis would be to create similar groups of topics where "commonality" means a global metric across the entire set of characteristics between each pair of subjects.

The other options, Option 1 and Option 3 would not be able to create common motifs, such groups. Therefore, the correct answer is Option 2.

You might be interested in
If using a dual or multiboot configuration, what screen appears during the boot sequence?
WITCHER [35]
Boot loader menu is the correct answer
5 0
2 years ago
Hello could someone please work out what this kinder toy does if does nothing I want my money back all the best Izzy
Roman55 [17]

Answer:

Explanation:it’s supposed to stamp on paper

5 0
2 years ago
Read 2 more answers
If you play video games, please answer these questions it’s for a survey for my game development class!!
Mademuasel [1]

Answer:

Cause it fun and i have fun

call of duty and football and boxing games

Since i was 7 now im 13

with your mind

I dont know

4 0
2 years ago
Word typically provides how many types of main documents.
Veronika [31]
It provides 5 documents
4 0
2 years ago
Let A be an array of n numbers. Recall that a pair of indices i, j is said to be under an inversion if A[i] > A[j] and i <
AysviL [449]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

int inversions(int a[], int low, int high)

{

int mid= (high+low)/2;

if(low>=high)return 0 ;

else

{

int l= inversions(a,low,mid);

int r=inversions(a,mid+1,high);

int total= 0 ;

for(int i = low;i<=mid;i++)

{

for(int j=mid+1;j<=high;j++)

if(a[i]>a[j])total++;

}

return total+ l+r ;

}

}

int main() {

int a[]={5,4,3,2,1};

printf("%d",inversions(a,0,4));

  return 0;

}

Check the output in the below attached image.

5 0
1 year ago
Other questions:
  • The Apple ll is an IBM compatible PC “clone.”<br><br> True <br><br> False
    11·1 answer
  • Explain the differences between the orange industry in California and Florida.
    13·1 answer
  • What is the acronym that helps you remember the order of math operations?
    9·2 answers
  • How can software be used to protect against hardware failures in systems that embody both? Give two examples of how software can
    14·1 answer
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • whats a hood hinge? I want to buy a new hood for my Impala but it's telling me to buy a hood hinge? ​
    14·1 answer
  • A predictive data analyst___.
    14·1 answer
  • PLEASE HELP me with at least 1 of the problems in the picture <br><br>We are coding using python​
    14·1 answer
  • Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
    7·1 answer
  • Which tool in Access will give you a detailed report showing the most accurate and complete picture of
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!