1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
12

The k-nearest neighbor machine learning algorithm (kNN) is _________.a. highly mathematical and computationally intensive. b. a

method that has little in common with regression. c. regarded as a "lazy" learning method. d. very complex in its inner workings.
Computers and Technology
1 answer:
elena-s [515]3 years ago
7 0

Answer:

c. regarded as a "lazy" learning method.

Explanation:

<h2><u>Multiple choice </u></h2>

The k-nearest neighbor machine learning algorithm (kNN) is :

c. regarded as a "lazy" learning method.

You might be interested in
How do you make a ringtone on earsketch
RoseWind [281]

Haven't used earsketch, but here we go.

Answer:

1). Make a track in earsketch, make it like 6/7 seconds

2.) export your track as an .mp3, .wav, or  .ogg (your choice!)

3.) (If on android) Navigate to settings, now search for an entry for ringtone.

4.) If you have no luck, look up how to set ringtone on your desired phone brand (iOS, Android, etc.)

5.) Test out your new ringtone

6.)Profit

4 0
3 years ago
You're the sole IT employee at your company, and you don't know how many users or computers are in your organization. Uh oh! Wha
Neporo4naja [7]

Answer

Directory Services

<u></u>

<u>Definition</u>

It is a type of software that is used to unify and customize the resources available at the network.

<u>Explanation</u>

This software is used to gather the information and addresses of all computers connected on the network.

It is a type of information store, where all the information related to resources (computer) and services of network has been stored. It also gives administrator rights to the single point to manage whole network resources.

This is the reason, Option "D" is the best choice for me as sole IT employ in a company. I will prefer directory services software to gather the information of all computers of organization and manage users in company.  

4 0
3 years ago
Which feature of a blog helps to store and retrieve older posts?
Rashid [163]
Could it be archive posts? I'm not sure, but I believe it's archive posts.
8 0
3 years ago
Read 2 more answers
OSHA standards appear in the ___________ and are then broken down into ____________.
miskamm [114]
OSHA standards appear in the <span>Code of Federal Regulations (CFR) and are then broken down into Parts</span>
3 0
3 years ago
Which of the following are important for protecting computing devices and systems? Physical safeguards like a secure space prote
Elenna [48]

Answer: All of the above

Explanation:

All the above listed point serves as security measures to safeguard our computing devices and systems.

4 0
3 years ago
Other questions:
  • What dose it need For a device to be considered a kind of computer
    14·2 answers
  • Write an application that instantiates five Recording objects and prompts the user for values for the data fields. Then prompt t
    13·1 answer
  • Why does brainly keep saying “oops... something went wrong! Try again”
    7·2 answers
  • Which HTML tag is used to add a paragraph to a web page?
    15·1 answer
  • What does SFA software provides tools for
    11·2 answers
  • Character positions in<br> arrays start counting with<br> the number 1.<br> True<br> False
    14·1 answer
  • Positive use of the technology before the pandemic.
    8·1 answer
  • Write if true or false
    12·1 answer
  • IN EXCEL, File, menu , edit, insert are all located in ?
    7·1 answer
  • Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!