1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
13

How do programmers recognise patterns, generalise and abstract information

Computers and Technology
1 answer:
Dima020 [189]3 years ago
4 0

Answer:

Pattern recognition is the process of recognizing patterns by using machine learning algorithm. ... In a typical pattern recognition application, the raw data is processed and converted into a form that is amenable for a machine to use. Pattern recognition involves classification and cluster of patterns

Explanation:

You might be interested in
Which of the following explains why computers can be used in accounts payable? Computers can use random steps to identify the du
Sphinxa [80]

Answer:

Its A buddy

Explanation:

that what it was on ingenuity

4 0
3 years ago
Read 2 more answers
Explain the operation of POS
zaharov [31]

Answer: POS stands for point of sale.

Merchants typically use a POS system to complete a sales transaction. In its most basic definition, a POS system is a combination of POS hardware and POS software to create a POS machine for processing a transaction and payment.

Explanation: Hope this helps, have a great day.

4 0
3 years ago
Convert the Binary Number to a Decimal Number
Korolek [52]
There are convertors online for this but the answer is 5
<span />
8 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
When entering data into a cell, which keyboard key is used to remove characters to the left of the insertion point?
deff fn [24]
The backspace key is used for that
3 0
3 years ago
Other questions:
  • Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
    9·2 answers
  • How to tell if screen or screen protector is cracked?
    5·2 answers
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. Wh
    10·1 answer
  • I have a samsung tab 2 10.1 and all of my apps stopped working. Can anybody help me?
    13·2 answers
  • Write a class called Line that represents a line segment between two Points. Your Line objects should have the following methods
    8·1 answer
  • All of the followingshould be followed by entrepreneur for being effective
    10·1 answer
  • Place the steps in order for manually creating a New Contact Group
    10·2 answers
  • Computing is the provision of IT services on demand.
    9·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
  • What type pf physical security devices lets a company locate devices that have been moved to a new location?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!