1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
4 years ago
11

Imagine you had a learning problem with an instance space of points on the plane and a target function that you knew took the fo

rm of a line on the plane where all points on one side of the line are positive and all those on the other are negative. If you were constrained to only use decision tree or nearest-neighbor learning, which would you use? Why?
Computers and Technology
1 answer:
gavmur [86]4 years ago
5 0

Answer:

The answer is nearest-neighbor learning.

because nearest neighbor learning is classification algorithm.

It is used to identify the sample points that are separated into different classes and to predict that the new sample point belongs to which class.

it classify the new sample point based on the distance.

for example if there are two sample points say square and circle and we assume some center point initially for square and circle and all the other points are added to the either square or circle cluster based on the distance between sample point and center point.

while the goal of decision tree is to predict the value of the target variable by learning some rules that are inferred from the features.

In decision tree training data set is given and we need to predict output of the target variable.

Explanation:

You might be interested in
Select the correct answer.
AveGali [126]

Answer:A

Explanation:

3 0
3 years ago
Read 2 more answers
What can I do with this? Lol
nikitadnepr [17]
Do with what? If you have a question please contact me ;)
3 0
3 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
What is the value of the variable result after these lines of code are executed?
Marta_Voda [28]

Answer:

W

Explanation:

W

3 0
3 years ago
Read 2 more answers
Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
timofeeve [1]

Answer:

The answer is "URL".

Explanation:

The term URL is also known as the "Uniform-Resource-Locator", which is also known as the address of the website or internet file. To access this file we use to type its address in the web browser by using the "http:// or https://" protocol. It contains the domain name, with several other basic data to guide a visitor to a certain internet website called a web page.

5 0
3 years ago
Other questions:
  • The code that follows saves the data that was in the $names array as
    13·1 answer
  • Determine whether the relation represents a function. If it is a​ function, state the domain and range.
    6·1 answer
  • Christine would like to add something to her document that will illustrate the text. She should _____.
    10·2 answers
  • Assume you have functions f and g such that f(n) is O(g(n)). For each of the following statements, decide whether you think it i
    12·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·1 answer
  • A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that tak
    8·1 answer
  • While performing disk and file maintenance on the company file server, you determine a user in the accounting department has bee
    13·2 answers
  • What best describes the computer's BIOS (basic input-output system)?
    5·1 answer
  • Complete the sentence.
    10·1 answer
  • What is the difference between encoding and decoding?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!