1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
15

Assume we have a two-class learning problem where the labeled data consists of 1,000 data points from one class, and 10 data poi

nts from the other class. A grad student is working on a machine learning algorithm and manages to get 99% accuracy using ten fold cross validation. Recall that 10-fold cross validation splits the data into 10 equal-sized chunks. For each chunk, the algorithm is trained on the other 9 and then tested on the held out chunk. The accuracies on each of the held-out chunks are then averaged to get an overall accuracy rate. Is this a big achievement for the algorithm?Justify your answer by describing why it should be difficuilt to get this accuracy on this kind of data, or giving a simple classification strategy whose accuracy is at least as good.
Computers and Technology
1 answer:
lakkis [162]3 years ago
4 0

Answer:

I don't know

Explanation:

please just thank me I need the points

You might be interested in
Heeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeelp plz
Tanya [424]

Answer:

i wish i could help you

Explanation:

i wish i could help you

6 0
3 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
When are computers most vulnerable to threats or damage?
valentinak56 [21]
With virus protection
8 0
3 years ago
1. Which of the style guides is most focused on professionals who are writing articles for publication?
I am Lyosha [343]
"APA" is the one style guide among the following choices given in the question that <span>is most focused on professionals who are writing articles for publication. The correct option is the second option.

"MLA" is the one style guide among the following choices that </span>no longer recommends citing URLs. The correct option among all the options given is the first option.
8 0
3 years ago
Read 2 more answers
Keyboarding and typing 100 words per minute can be thought of as a
bija089 [108]
is categorised as typing speed skill
5 0
3 years ago
Other questions:
  • To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwi
    11·1 answer
  • Lesson 15: Integrated Literacy Connections Education Introduction to Computer Applications Unit 6: Internet Safety
    5·1 answer
  • You are an administrator for contoso.com. you have two servers called server1 and server2 that run windows server 2012 and have
    9·1 answer
  • What defines "print media"? It is media that includes words and text rather than video, such as many blogs. It is media that is
    8·1 answer
  • Create a program which will input data into a pipe one character at a time. Count the number of characters as they are written i
    9·1 answer
  • Radar devices are used by law enforcement to be sure that individuals are driving safely. They tell the officer how fast the veh
    12·1 answer
  • While there are a some exceptions such as an if-statement, Scheme has one primary syntax () a) True b) False
    14·1 answer
  • 7. Question
    12·1 answer
  • The process of providing only the essentials and hiding the details is known as _____. a. algorithm b. data structure c. abstrac
    6·1 answer
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!