1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
3 years ago
15

The slope and intercept pair you found in Question 1.15 should be very similar to the values that you found in Question 1.7. Why

were we able to minimize RMSE to find the same slope and intercept from the previous formulas? Write your answer here, replacing this text.
Computers and Technology
1 answer:
iren2701 [21]3 years ago
4 0
I don’t get the question
You might be interested in
To create an effective study schedule, a student must guess the amount of time needed for studying. write down all activities an
Inessa [10]

Answer:

B) write down all activities and commitments

Explanation:

It seems the most logical.

3 0
3 years ago
Read 2 more answers
Write a program to read 2 numbers and display the largest of the two. You should use scanfto read the two numbers and use if sta
Harman [31]

Answer: in C

#include <stdio.h>

int main(){

  int num1, num2;

  printf("Enter first number :: ");

  scanf("%d", &num1);

  printf("Enter second number :: ");

  scanf("%d", &num2);

 

  if(num1 > num2){

     printf("%d is larger than %d\n", num1, num2);

  } else if (num2 > num1) {

     printf("%d is larger than %d\n", num2, num1);

  } else{

     printf("Both of them are equal\n");

  }

  return 0;

}

8 0
4 years ago
Consider a binary search tree where each tree node v has a field v.sum which stores the sum of all the keys in the subtree roote
AVprozaik [17]

Answer:

Each time you insert a new node, call the function to adjust the sum.

This method has to be called each time we insert new node to the tree since the sum at all the

parent nodes from the newly inserted node changes when we insert the node.

// toSumTree method will convert the tree into sum tree.

int toSumTree(struct node *node)

{

if(node == NULL)

return 0;

// Store the old value

int old_val = node->data;

// Recursively call for left and right subtrees and store the sum as new value of this node

node->data = toSumTree(node->left) + toSumTree(node->right);

// Return the sum of values of nodes in left and right subtrees and

// old_value of this node

return node->data + old_val;

}

This has the complexity of O(n).

Explanation:

6 0
3 years ago
Which input device can advanced computer users use instead of a mouse to perform tasks such as opening new windows and saving or
pogonyaev
[C], a keyboard. A keyboard can pretty much do any basic tasks that a mouse can do, given that you know the short cuts.

For example,

CTRL + Esc to open the start menu, then use the arrow keys to navigate, and return key to select.

Windows Key + R to run a program, often in the form of an executable.

And obvious much, much more.
6 0
4 years ago
Convert to binary140
marshall27 [118]

00110001 00110100 00110000

5 0
3 years ago
Other questions:
  • Mitchell is assisting her teacher in a project by entering data into the spreadsheet. Which types of data can Michelle enter in
    14·2 answers
  • A client is concerned that a power outage or disaster could impair the computer hardware's ability to function as designed. The
    13·1 answer
  • What type of multimedia is a game CD? Game CDs are examples of ___ multimedia.
    15·2 answers
  • According to the video, what are some hazards Stationary Engineers may face? Check all that apply. noise, hazardous materials, d
    7·2 answers
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA.
    13·1 answer
  • if you love games played on facebook, such as farmville, what might be your motivation for playing games
    13·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • Which of the following technique is well suited to support very large address space, e.g. 64-bit address space? Select one: a. C
    11·1 answer
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
  • Canada’s energy plan, named __________, makes three governmental agencies accountable for safeguarding Canada’s environment.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!