1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
6

Which is true of case-based reasoning (CBR)?

Computers and Technology
1 answer:
DaniilM [7]3 years ago
4 0

Answer:

The correct option is Option C: It matches a new problem with a previously solved problem and its solution.

Explanation:

Case-based reasoning (CBR) is used when someone tries to solve new problems based on old problems that were similar. The person applying case-based reasoning would look for the solutions to these similar past problems and try to apply them to the new case. For example, a doctor who tries to treat a patient based on what was successful with a prior patient with a similar problem is applying case-based reasoning. In some instances, these problems are available in a database and ideally, that is how it is conceived, but it would depend on the field and the kind of problems. There is no universal global network dedicated to CBR as a whole (other than generic searches on the internet in general). One example of a specific CBR database is the European Nuclear Preparedness system called PREPARE.

You might be interested in
Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network a
ArbitrLikvidat [17]

Answer:

Security Intelligence Operations      

Explanation:

Security Intelligence Operations    

  • It is an advanced security framework that offers the detection, assessment and prevention of risks and continuously provides clients with the maximum level of security.
  • It provides quick and efficient security to allow consumers to interact and work together and adopt new technology in a secure manner.
  • It does effective identification of malware, proactive security against loss of data and embraces new technologies to stay ahead of the new threats.
  • The three main components of Cisco Security Intelligence Operations are Cisco SensorBase, Threat Operations Center, and Dynamic updates.
  • Cisco SensorBase is the biggest vulnerability detection database that collects traffic and sensor data from an extensive network of Cisco devices and services worldwide.
  • Threat Operations Center consists of a virtual team of researchers, technicians, security analysts, engineers that collect data from SensorBase and provide actionable intelligence and realistic information to provide security against current and complex threats.
  • Dynamic updates provide real time alerts distributed automatically to monitoring devices, as well as best guidelines and other resources focused on helping customers to monitor attacks, interpret information, and eventually improve the overall security procedures of their organization.
4 0
3 years ago
A person's birth date consists of the month, day, and year in which that person was born. The domain for a relation R is a set o
Y_Kistochka [10]

Answer:

A parties order and a total order

Reason is because the person is the related to the person being discussed and they share the same birthday date.

3 0
3 years ago
what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
nikklg [1K]
Dod required a car to access data gahagsgssgsg
3 0
3 years ago
Read 2 more answers
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various type
Kitty [74]

Answer:

A Firmware

Explanation:

A firmware is a hardware device usually ROM (Read Only Memory) containing a program. This program will be responsible for making the device to run and perform its expected functions. examples of devices that use firmware to run are printers, computer peripheral devices, many of the modern consumer electronics, etc. The manufacturer may decide to give an update on the firmware from time-to-time if there is a need.

4 0
3 years ago
A degenerate tree might actually be less efficient than a linked list. Why?
Alla [95]

Answer:

A degenerate tree is a tree which has the pattern of the parent node attached only to single child node .It can work in a dynamic manner and are also considered similar as the linked list.

Linked list are the dynamically working data structures having elements of the list to be connected through pointers in a linear manner. The unbalanced nature of the degenerate tree makes it less efficient which results in the low performance .Thus, degenerate tree doesn't have efficiency similar to linked list.

8 0
3 years ago
Other questions:
  • Members of which generation were born after the turn of the millennium?
    11·1 answer
  • Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
    7·2 answers
  • An airline company would like to easily locate lost luggage. What technology would make it easier for them to locate the luggage
    6·2 answers
  • Patricia's partner Alex has shared a spreadsheet he created. On the first row he has given the spreadsheet a title. The title ap
    7·1 answer
  • What is a type of destructive program?
    8·2 answers
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • How are gems and precious metals similar?
    6·2 answers
  • Write the working of dot matrix printer?<br><br>no links<br>​
    7·1 answer
  • IBM’s system that is built on the middle ground approach to AI.
    12·1 answer
  • What is the advantage of learning through story compared to learning through personal experience?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!