1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
10

Help Me What are the four types of graphic models?

Computers and Technology
1 answer:
kramer3 years ago
4 0

Answer:

-Bayesian network

-Naive Bayes classifier where we use a tree with a single root

-Dependency network where cycles are allowed

-Tree-augmented classifier or TAN model

Explanation:

You might be interested in
1 pound is equivalent to how many grams?<br>A.463.59 grams<br>B.10 grams<br>C.59 grams<br>D.5 grams​
Anvisha [2.4K]
A
I looked it up lol can I have brainliest?
4 0
3 years ago
Read 2 more answers
What is a geotag?
Angelina_Jolie [31]

Answer:

It helps to give the geographic location of photos.

Explanation:

A geotag is added into the photography information when it's taken.  That info is part of the EXIF information of a photo that lists a bunch of data related to the photo, like the camera brand, model, the aperture, the speed, the ISO, and so on.

That's assuming the GPS info is available of course, but if it's taken by a phone, it has the GPS info.  Most mid-range and upper-range cameras have it too.

That information is used for example by Google Maps to present photos taken at a specific location.

6 0
3 years ago
What is Processor to Memory Mismatch problem?
Gala2k [10]
Direct-mapped cache;
fully associative cache;
N-way-set-associative cache.
That is all I could find sorry I can’t help
8 0
3 years ago
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
Lubov Fominskaja [6]

Answer:

The answer is "Option B".  

Explanation:

The main drawback of commercial security is, that the software may not protect digital technology against data mining, and they are not known to be the  imperial tools, that's why the only option B is correct, and certain options are wrong, which can be explained as follows:

  • In option A, It used to provide a sequence of instructions, which is used in security.  
  • In option C, It doesn't use in security, that's why it is wrong.
  • Option D and Option E are wrong because in software there is no use of court and new software, it only upgrades the software.
4 0
3 years ago
PYTHON Write a grade program using a function called computegrade that takes a score as its parameter and return a grade as a st
makvit [3.9K]

def computeGrade(float grade, str a){

a = "A" if a > 0.9 else a = "B" if a > 0.8 else "C"

return a;

}

print(a)

3 0
3 years ago
Other questions:
  • If you print a document with red green or blue underlines will they show up on printed pages
    14·1 answer
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane
    11·2 answers
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
    6·1 answer
  • Why is it important to be part of a team in times you fail and in times you succeed?​
    15·1 answer
  • Select the correct answer.
    7·1 answer
  • If you need some one to talk to you can talk to me
    13·2 answers
  • A web site that contains large numbers of misspelled words and grammatical errors fails which of these general criteria?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!