1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
11

What algorithm should I use?

Computers and Technology
2 answers:
svetlana [45]3 years ago
7 0

Answer:

YOu should use `ordinary least square regression ´

natima [27]3 years ago
5 0

Answer:

Read the path and algorithm labels on the chart as "If <path label> then use <algorithm>." For example: If you want to perform dimension reduction then use principal component analysis. If you need a numeric prediction quickly, use decision trees or linear regression.

You might be interested in
What underlying concept is edge computing based on?
guajiro [1.7K]

Answer:

Edge computing was developed due to the exponential growth of IoT devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. And many IoT devices generate enormous amounts of data during the course of their operations.

Explanation:

8 0
3 years ago
Read 2 more answers
Meaning of mesh topology​
Pachacha [2.7K]

The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

<h3>What is meant by mesh topology?</h3>

Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation  so that they can be able to share or distribute data among themselves.

Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.

Hence, The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

Learn more about mesh topology​ from

brainly.com/question/14879489

#SPJ1

6 0
2 years ago
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
Lady_Fox [76]

Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

<h3>What are the three main causes of security breaches?</h3>

The major reasons for data breaches are:

  • Old, Unpatched Security Vulnerabilities.
  • Human Error
  • Malware, etc.

Therefore, Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

Learn more about Cybersecurity from

brainly.com/question/12010892

#SPJ1

5 0
3 years ago
Which of the following is a command shell with a built-in scripting language?1. The Server Manager’s Roles and Features wizard2.
IgorLugansk [536]
Your kinda right but wrong
4 0
3 years ago
Read 2 more answers
The rules and guidelines for appropriate computer mediated communication are called?
irinina [24]
<span>The rules and guidelines for appropriate computer mediated communication are called netiquette. 
It is a blend of two words: net (from Internet) and etiquette, or the appropriate behavior. 
</span>
4 0
4 years ago
Other questions:
  • While you are working with a document using a program such as wordpad, the document is stored in ___________?
    15·2 answers
  • Not providing guarding or fall protection for workers on a 25-foot scaffold. The resulting fall would most likely end in death,
    6·1 answer
  • Pls answer fast in five mins​
    12·1 answer
  • How we know that how many domain exist in window server 2012?
    14·1 answer
  • What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive m
    10·1 answer
  • 2. Which Interface uses
    7·1 answer
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPLICATION SOFTWARES.
    5·2 answers
  • How can you create a messages to look like an IMessage?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!