1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
15

Assume we have a two-class learning problem where the labeled data consists of 1,000 data points from one class, and 10 data poi

nts from the other class. A grad student is working on a machine learning algorithm and manages to get 99% accuracy using ten fold cross validation. Recall that 10-fold cross validation splits the data into 10 equal-sized chunks. For each chunk, the algorithm is trained on the other 9 and then tested on the held out chunk. The accuracies on each of the held-out chunks are then averaged to get an overall accuracy rate. Is this a big achievement for the algorithm?Justify your answer by describing why it should be difficuilt to get this accuracy on this kind of data, or giving a simple classification strategy whose accuracy is at least as good.
Computers and Technology
1 answer:
lakkis [162]3 years ago
4 0

Answer:

I don't know

Explanation:

please just thank me I need the points

You might be interested in
Some of your non-Windows clients aren't registering their hostnames with the DNS server. You don't require secure updates on the
Ivenika [448]

Answer:

c.Update DNS records dynamically for DHCP clients that don't request updates.

Explanation:

A DNS server is a computer server that contains a database of public IP addresses and their associated host names, and in most cases serves to resolve, or translate, those names to IP addresses as requested.

A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices.

Dynamic DNS is a method of automatically updating a name server in the Domain Name Server, often in real time.

5 0
3 years ago
Which phrase best describes a folder in Outlook 2016?
svetoff [14.1K]

Answer:

The phrase that describes the best folders in outlook 2016 is:

An organizational container.

Explanation:

The reasons behind this answer are that in the first place the folder allows the user to group emails, contacts, tasks, or even a calendar. So, because this is not only for emails or files. It is an object that can group several types of things and create a new category. Instead of only applying for certain objects. Thus, it is an organizational container. Because the first the third, and the fourth option describe objects that can only group-specific objects instead of all of them. There is no flexibility in the rest of the answers.

5 0
3 years ago
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
A three-character code is to be assigned only if it cannot be further subdivided, and a code is __________ if it has not been co
pav-90 [236]

Answer:

Invalid are the correct answer to the following statement.

Explanation:

The following statement is correct because the following code is invalid if the code is not summarized properly according to the requirement of the following code in which the seventh character extension is included, if the three-character code is not be subdivided any more then, the following code is invalid.

5 0
4 years ago
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
Other questions:
  • In Florida no fault insurance is optional for owners of a vehicle
    6·1 answer
  • The phrase ____ refers to an organization of components that define and regulate the collection, storage, management and use of
    10·1 answer
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • Write four overloaded methods called randomize. Each method will return a random number based on the parameters that it receives
    5·2 answers
  • Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
    12·1 answer
  • The term integration mean?
    7·2 answers
  • To discover how many cells in a range contain values that meet a single criterion, use the ___ function
    5·1 answer
  • Which changes the natural world? <br> technology <br> science <br> prototypes <br> feedback
    5·1 answer
  • People of brainly Just a quick warning that there is a group of people posting links with virus.
    11·2 answers
  • Programmers use an Integrated Development Environment (IDE) to write software programs, because:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!