1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
8

Which of the following examples can be solved with unsupervised learning?

Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
6 0

Answer:

Explanation:

Segmentation of students in ‘Technical Aspects of Big Data’ course based on activities they complete. The training data has no labels.

You might be interested in
What aspect should you consider before adding pictures to a document? You should structure the first before you search for a rel
suter [353]

Answer:make sure it line up with tour essay

Explanation:

5 0
3 years ago
Should people who download music and movies illegally be punished?
Mrrafil [7]
Opinion wise, I disagree with punishment. 
3 0
3 years ago
When you first turn on a computer and you don’t hear a spinning drive or fan or see indicator lights, is the problem hardware or
abruzzese [7]
It is a hardware issue. Hope it helps! 
5 0
3 years ago
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has be
scoundrel [369]

Answer:

Proxy Server.

Explanation:

An administrator was given the responsibility of customizing Internet connection for around the numbers of computer systems. He stated the admin that those Internet connections need to go through a system connected to the internet because otherwise inbound and outbound traffic can still be examined but only that systems should have a Web address identified.

So, the admin configured Proxy Server because only certain systems have been identified the following address to the internet.

3 0
4 years ago
Other questions:
  • propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.
    12·1 answer
  • What makes it possible for e-mail to be sent and received on a wide variety of devices, including cell phones, PDAs, laptops, an
    12·1 answer
  • A model release can be either oral or written down. true or false
    11·2 answers
  • Which of the following is not a component of Google Display ads' value proposition?
    9·1 answer
  • How do you make Thumbnails and outros on Youtube for free?
    8·1 answer
  • Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicab
    15·1 answer
  • Order the steps for accessing the junk email options in Outlook 2016
    9·2 answers
  • And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
    10·1 answer
  • The area of ai that investigates methods of facilitating communication between computers and people is?.
    5·1 answer
  • What are the advantages of hybrid computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!