1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
9

Which data type is used to teach a Machine Learning (ML) algorithm during structured learning?

Computers and Technology
1 answer:
vodka [1.7K]3 years ago
5 0

Which data type is used to teach a Machine Learning (ML) algorithm during structured learning?

answer:

You might be interested in
Write a program 10 enter 3 number and find smallest.​
timama [110]

10 + 3 = 13

13 - 10 = 3

5 0
2 years ago
The page-replacement policy means that pages are not placed to make more space. A. True B. False
BabaBlast [244]

Answer:

B. False

Explanation:

A page-replacement policy can be defined as a set of algorithm that instructs the operating systems on what memory page is to be swapped, paged out or written to disk in order to allocate more memory as they're required by various active processes during virtual memory management.

Some of the algorithms or techniques used by the operating system for page-replacement policy are;

1. Last In First Out (LIFO).

2. First In First Out (FIFO).

3. Least Recently Used (LRU).

4. Least Frequently Used (LFU).

5. Optimal (OPT or MIN).

Hence, the page-replacement policy means that pages are placed to make more space and to minimize the total number of page that would be missing.

7 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
To assign a conditional value, use the ____ function.
zubka84 [21]
<span>To assign a conditional value, use the IFF function.  It is an abbreviation for  Immediate If.  It is a function </span>on spreadsheets that returns the second or third parameter based on the evaluation of the first parameter.  <span>You use </span>IIf<span> to determine if another expression is true or false. If the expression is true, 
</span>IIf<span> returns one value; if it is false, </span>IIf<span> returns another.</span>
3 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
4 years ago
Read 2 more answers
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • I plugged my headphones into my computer, but the sound still came out of the speakers. help!
    12·2 answers
  • What is the purpose of a Program Epic?
    7·2 answers
  • Write an application named [LastName]_MultiplicationTable and create a method that prompts the user for an integer value, for ex
    11·1 answer
  • Universal Containers has strict security model enforced through object, field, and row-based security mechanisms. The Architect
    9·1 answer
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • Challenge
    6·1 answer
  • Given the following code, assume the myStack object is a stack that can hold integers and that value is an int variable. Assume
    8·1 answer
  • Any task done by software can also be done using computer hardware, and any operation performed directly by hardware can be done
    8·1 answer
  • Can someone be my friend,don't friend me until i ask you Questions
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!