1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
10

5.1 A data mining routine has been applied to a transaction dataset and has classified 88 records as fraudulent (30 correctly so

) and 952 as non-fraudulent (920 correctly so). Construct the confusion matrix and calculate the overall error rate.
Computers and Technology
1 answer:
ikadub [295]3 years ago
7 0

Confusion matrix and overall error rate is described below.

Explanation:

The error rate is not the same? Like, even if I prioritize non-fraudulent and create confusion matrix we get the same error rate right?

So we have 88 + 952 = 1040 records in total.

Using the current method, it appears that the error rate is ((88-30) + (952-920)) / 1040 = 90/1040 = 8.65%.

The 'analyst' says that the accuracy could be improved by using a different model. They propose to just assume all the classifications are non-fraudulent.

We can calculate that there are 30 + (952 - 920) = 62 fraudulent records. Then, the error rate for this model is simply the number of frauds divided by the number of records. 62 / 1040 = 5.96%.

You might be interested in
A developer writes a trigger on the Account object on the before update event that increments a count field. A workflow rule als
Andreyy89

Answer:

The answer is "2"

Explanation:

In the given question, the answer is "2" because if the user is new. so very first, the user creates its account and after creating his account, he will update his account value.

When the user creates its account, the value will be 1, and when he updates its account value. so, the value will be 2, that's why 2 is the correct answer.

4 0
3 years ago
WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
ad-work [718]

Answer:

The answer is "True"

Explanation:

In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.

  • It provides protects in wireless transmissions from both the poking and collecting information of packets.  
  • It also lets hackers crack their computer, that's why the given statement is true.
3 0
3 years ago
What are the names of each devices pleaseee​
nignag [31]

Answer:

the answer is computer, phone, laptop

Explanation: that is all ik

3 0
2 years ago
Read 2 more answers
When is it not necessary to invoke the method myMethod using dot notation? When myMethod is private. When myMethod is invoked by
Paraphin [41]

Answer:

When myMethod is invoked by a method in the same class as myMethod.

Explanation:

When you are in a class, it is like a different enviroment and within that class you can call a method without using the dot notation because you are still within the class.

Outside the class and despite the type of method, public, private or static, the dot notation will be required.

5 0
3 years ago
Read 2 more answers
What is the Multiple Source Test
Andrews [41]
It's a test Where you can research your answers Like the internet,Library,etc to find your answers.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Write an expression that evaluates to 1 more than the value in the location pointed to by the integer pointer variable ip. Thus,
    8·1 answer
  • How do u determine the voltage across diode
    15·1 answer
  • What is a taskbar?
    5·1 answer
  • Henry Ford would have been most interested to bring which modern innovation to his automotive factories?
    5·2 answers
  • Which one of these is correct PI of a XML document?
    13·1 answer
  • True or false a computer with a high efficiency rating should stay cooler than one with a low effiency rating
    9·1 answer
  • What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)
    9·1 answer
  • What is the answer ????​
    9·1 answer
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
  • These are pictorial images displayed on a computer screen​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!