1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
11

Imagine you had a learning problem with an instance space of points on the plane and a target function that you knew took the fo

rm of a line on the plane where all points on one side of the line are positive and all those on the other are negative. If you were constrained to only use decision tree or nearest-neighbor learning, which would you use? Why?
Computers and Technology
1 answer:
gavmur [86]3 years ago
5 0

Answer:

The answer is nearest-neighbor learning.

because nearest neighbor learning is classification algorithm.

It is used to identify the sample points that are separated into different classes and to predict that the new sample point belongs to which class.

it classify the new sample point based on the distance.

for example if there are two sample points say square and circle and we assume some center point initially for square and circle and all the other points are added to the either square or circle cluster based on the distance between sample point and center point.

while the goal of decision tree is to predict the value of the target variable by learning some rules that are inferred from the features.

In decision tree training data set is given and we need to predict output of the target variable.

Explanation:

You might be interested in
_____ is the operation of setting a variable to a value.
Helen [10]

Answer:

Assignment is the operation of a variable to a value

3 0
3 years ago
A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o
kobusy [5.1K]
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




8 0
3 years ago
Which of the following controls computer memory?
Bogdan [553]
Operation system (OS)
4 0
3 years ago
Did it go from a sail boat to a row boat or vise versea
Bingel [31]
A sail boat went to a row boat.
8 0
3 years ago
An online conference room reservation system lets a user reserve rooms. The user is required to enter contact information and re
lisov135 [29]

Answer:b)Reserve Room, Enter Contact Information, Enter Reservation Detail

Explanation: The use case is described as actors , actors goal, usage of use cases, units of scope and initial point and terminating point of use cases .

The situation mentioned in the question will take place for the reservation of the room through the instances in the form like filling the contact details for the identification , filling out reservation information as well for getting the knowledge about the room requirement by the person.

These details help in reaching out the particular person if required, number of days he wants to book the room,any extra facility he would like to have etc. After these detail filling activity the room can be reserved successfully.Thus , the most appropriate option is option (b).

Other options are incorrect because room reservation cannot be done without any formality as mentioned in the question and entering contact detail and reservation detail one by one.

7 0
3 years ago
Other questions:
  • Why is it that even though there aren't the max number of answers on a question, (or sometimes even NO answers) When I click the
    11·1 answer
  • Theâ ______ is a large worldwide collection of networks that use a common protocol to communicate with one another.
    5·1 answer
  • There are several methods of updating information and data on a webserver. We must consider who performs those updates upfront w
    9·2 answers
  • A typical self-expelling fire extinguisher empties its contents in
    8·1 answer
  • Your neighbor has moved to another country. He informs you about his new job. You wantto congratulate him by sending an e-mail m
    13·1 answer
  • The machine should not be oiled until the
    11·1 answer
  • In cell B7, enter a formula without using a function to determine the profit generated at the Downtown location by subtracting t
    9·1 answer
  • In Modern operating system, the __ feature has dramatically improved user productivity.
    11·1 answer
  • What is the capacity of a disk with two platters, 10,000 cylinders, an average of 400 sectors per track, and 512 bytes per secto
    9·1 answer
  • What is an IF statement used for?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!