1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
13

How do programmers recognise patterns, generalise and abstract information

Computers and Technology
1 answer:
Dima020 [189]3 years ago
4 0

Answer:

Pattern recognition is the process of recognizing patterns by using machine learning algorithm. ... In a typical pattern recognition application, the raw data is processed and converted into a form that is amenable for a machine to use. Pattern recognition involves classification and cluster of patterns

Explanation:

You might be interested in
The means by which an operating system or any other program interacts with the user is called th
natulia [17]
Networking capabilities of a computer
7 0
3 years ago
What are the values of the following expressions? In each line assume that,
MissTica

Answer:

double x = 2.5;

double y = -1.5;

int m = 18;

int n = 4;

string s = "Storm";

string t = "Watch";

The output of the expression "x + n*y - (x+n)*y" is "6.25".

and the output of expression "m/n + m%n" is "6".

Explanation:

for the first expression,

x + n*y - (x+n)*y ,put value of every variables in it.

=2.5+4*(-1.5)-(2.5+4)*(-1.5)

=2.5-6.0-(6.5*(-1.5)

=-3.5+9.75

=6.25

for the second expression,

m/n + m%n,  put value of every variables in it.

=18/4 +18%4

=4+2      ("/ will give quotient and % will give remainder")

=6

4 0
3 years ago
Package Newton’s method for approximating square roots (Case Study: Approximating Square Roots) in a function named newton. This
lutik1710 [3]
I’m confused what are you asking
7 0
3 years ago
Determine and prove whether an argument in English is valid or invalid. About Prove whether each argument is valid or invalid. F
yawa3891 [41]

Answer:

Each understudy on the respect roll got an A.  

No understudy who got a confinement got an A.  

No understudy who got a confinement is on the respect roll.  

No understudy who got an A missed class.  

No understudy who got a confinement got an A.  

No understudy who got a confinement missed class  

Explanation:

M(x): x missed class  

An (x): x got an A.  

D(x): x got a confinement.  

¬∃x (A(x) ∧ M(x))  

¬∃x (D(x) ∧ A(x))  

∴ ¬∃x (D(x) ∧ M(x))  

The conflict isn't considerable. Consider a class that includes a lone understudy named Frank. If M(Frank) = D(Frank) = T and A(Frank) = F, by then the hypotheses are overall evident and the end is counterfeit. Toward the day's end, Frank got a control, missed class, and didn't get an A.  

Each understudy who missed class got a confinement.  

Penelope is an understudy in the class.  

Penelope got a confinement.  

Penelope missed class.  

M(x): x missed class  

S(x): x is an understudy in the class.  

D(x): x got a confinement.  

Each understudy who missed class got a confinement.  

Penelope is an understudy in the class.  

Penelope didn't miss class.  

Penelope didn't get imprisonment.  

M(x): x missed class  

S(x): x is an understudy in the class.  

D(x): x got imprisonment.  

Each understudy who missed class or got imprisonment didn't get an A.  

Penelope is an understudy in the class.  

Penelope got an A.  

Penelope didn't get repression.  

M(x): x missed class  

S(x): x is an understudy in the class.  

D(x): x got a repression.  

An (ax): x got an A.  

H(x): x is on the regard roll  

An (x): x got an A.  

D(x): x got a repression.  

∀x (H(x) → A(x)) a  

¬∃x (D(x) ∧ A(x))  

∴ ¬∃x (D(x) ∧ H(x))  

Real.  

1. ∀x (H(x) → A(x)) Hypothesis  

2. c is a self-self-assured element Element definition  

3. H(c) → A(c) Universal dispatch, 1, 2  

4. ¬∃x (D(x) ∧ A(x)) Hypothesis  

5. ∀x ¬(D(x) ∧ A(x)) De Morgan's law, 4  

6. ¬(D(c) ∧ A(c)) Universal dispatch, 2, 5  

7. ¬D(c) ∨ ¬A(c) De Morgan's law, 6  

8. ¬A(c) ∨ ¬D(c) Commutative law, 7  

9. ¬H(c) ∨ A(c) Conditional character, 3  

10. A(c) ∨ ¬H(c) Commutative law, 9  

11. ¬D(c) ∨ ¬H(c) Resolution, 8, 10  

12. ¬(D(c) ∧ H(c)) De Morgan's law, 11  

13. ∀x ¬(D(x) ∧ H(x)) Universal hypothesis, 2, 12  

14. ¬∃x (D(x) ∧ H(x)) De Morgan's law, 13  

4 0
3 years ago
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
Other questions:
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • ) Suppose algorithm A takes 10 seconds to handle a data set of 1000 records. Suppose the algorithm A is of complexity O(n2). Ans
    12·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • A marketing associate wants to use the Validate button to ensure an email is CAN-SPAM compliant. What information does the assoc
    5·2 answers
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • Whats an MAR? lolz better not take my points #bonkers
    12·2 answers
  • Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed
    6·1 answer
  • Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
    13·1 answer
  • New product ideas must fit into a company's mission statement and?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!