1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
2 years ago
9

1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu

t device. true/false?
Computers and Technology
1 answer:
Svetllana [295]2 years ago
5 0

Answer:

I would say true.

You might be interested in
Objective:This assignment is designed to give you experience with thinking about algorithm analysis and performanceevaluation.Pr
wolverine [178]

Answer:

Check the explanation

Explanation:

#include<stdio.h>

/*Function to return max sum such that no two elements

are adjacent */

int FindMaxSum(int arr[], int n)

{

 int incl = arr[0];

 int excl = 0;

 int excl_new;

 int i;

 for (i = 1; i < n; i++)

 {

    /* current max excluding i */

    excl_new = (incl > excl)? incl: excl;

    /* current max including i */

    incl = excl + arr[i];

    excl = excl_new;

 }

  /* return max of incl and excl */

  return ((incl > excl)? incl : excl);

}

/* Driver program to test above function */

int main()

{

 int arr[] = {5, 5, 10, 100, 10, 5};

 printf("%d \n", FindMaxSum(arr, 6));

 getchar();

 return 0;

}

7 0
3 years ago
__________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
lbvjy [14]

Answer:

Business Intelligence

Explanation:

The approach uses tools to access & analyze data sets and present analytical findings in reports, summaries, dashboards, maps, charts and graphs to provide users with detailed intelligence about the state of the business.

Business intelligence uses softwares and services to convert data into actionable insights that inform an organization’s strategic and tactical business decisions.

6 0
3 years ago
You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on y
inn [45]

Answer:

The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data

Explanation:

Solution

The various reasons that could be causing the problem is given as follows :

1. A wide number of parameters :

  • In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers.
  • When the training is performed in this tree, then the model files the data too well.
  • When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.

2. Noisy Data:

  • The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values.
  • When the tree is trained on this noisy data, then it sets its parameters according to the training data.
  • As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.

8 0
3 years ago
Why operating system is pivotal in teaching and learning
trasher [3.6K]

Answer:

Without it information flow is impossible

Explanation:

The word 'pivotal' also means crucial or vital, and so we need to consider what an operating system actually does.

Remember, merely having all the hardware of a computer would not allow you to run (install and use) programs. It is by means of an operating system that teaching programs can be installed, and it is also by means of an operating system learning can take place.

For example, a student can decode (learn) instructions/lessons from his teacher via a software program; and the software program needs an operating system to open (run) the program.

6 0
3 years ago
Snap Me on <br>samxavier.18​
Ahat [919]

Answer:no thank you ima goody

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • When you copy a formula that contains an absolute reference to a new location, the reference ____. a. has a dotted outline in it
    6·1 answer
  • Which is an example of an incremental approach to solving a problem?
    15·1 answer
  • Write a program that prompts the user to enter the area of the flat cardboard. The program then outputs the length and width of
    15·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • Explain the following buttons as used in emails:compose,inbox and Draft.<br>​
    10·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • WILL GIVE BRAINLIEST!!! PLEASE HELP!!!
    5·1 answer
  • How to hack a I'd Indian brainly bot​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!