answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
2 years ago
13

Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?

Computers and Technology
1 answer:
patriot [66]2 years ago
6 0

Answer:

Classification.

Explanation:

Classification is the wide field of data mining apps that analyzes data and establishes rules for making a distinction in specified classes.

Data mining is a method that corporations use to transform the raw information into valuable information. Corporations can understand something about their clients through using technology to identify trends in large quantities of info to create more successful marketing campaigns, increase revenue and reduce costs.

You might be interested in
9. Which of the following are true for all regular languages and all homomorphisms? (a) h (L1 ∪ L2)= h (L1) ∩ h (L2). (b) h (L1
mixer [17]

Answer:

h (L1 ∪ L2)= h (L1) ∩ h (L2).

This is true.

There will be w ∈  (L1 ∪ L2) for any s ∈ h (L1 ∪ L2) in such a way that s=h(w)

we can assume that w ∈ L1

So In this case h(w) ∈ L (S1). Hence s ∈ L(S1)

for any s ∈ h (L1) U h(L2)

We can assume that s ∈ L(S1)

There exists w ∈ L1 such that s= h(w)

In this case it is w ∈ L1 U L2 as well.

Hence , s ∈ h (L1 U L2)

Explanation

consider  = 0,1 and  = a,b and h(0) = a , h(1) = ab

(a) Consider L1 = 10,01 and L2 = 00,11

   Now L1 ∪ L2 = 00,01,10,11

   h (L1 ∪ L2) = h(00) , h(01) , h(10) , h(11) = h(0)h(0) , h(0)h(1) , h(1)h(0) , h(1)h(1)

  = aa, aab , aba , abab

Hence h (L1 ∪ L2) = aa, aab , aba , abab .

Here h (L1) = h(10) , h(01) = h(1)h(0) , h(0)h(1) = aba , aab

Hence h (L1) = aba , aab .

Here h (L2) = h(00) , h(11) = h(0)h(0), h(1)h(1) = aa, abab

Hence h(L2) = aa, abab.

Finally Hence , h (L1 ∪ L2)= h (L1) ∩ h (L2).

5 0
2 years ago
A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are sa
muminat

The code below is used to determine a recursive, bool-valued function, isPalindrome, that accepts an integer-valued array, and the number of elements and returns whether the array is a palindrome.

Explanation:

  • The code shows 'array palindrome' is an array which, when its elements are reversed, remains the same.

bool isPalindrome(arr[((n-1) - n) +1], n)

{

   if (n == 0 || n == 1)

   {

       return true;

   }

   else if (arr[n-1] == isPalindrome(arr[], n-1)

   {

       return true;

   }  

   else {

       return false;

   }

}

5 0
2 years ago
Which statement accurately describes the clutter feature in outlook 2016
I am Lyosha [343]

Answer:

The answer is the last option

8 0
2 years ago
Which of the following is considered technology?
nevsk [136]
A. computer
computer because computer is technology and pencil is not and spoon.
8 0
2 years ago
Identify the correct language concept or term from the drop-down menu. A Programming Language is a language that physically runs
babymother [125]

Answer and Explanation:

In computer processing of text, a markup language is a way to annotating a document that is different from the book.In the computer, the markup language is a system annotating a text. Such a system uses procedural and descriptive markup. These are called lightweight markup language.

A programming language that physically runs on the website is called display markup.A programming language that is frequently used to develop websites with database is known as JAVA , PHP , HTML ,tags.These are the language that are used with existing markup language.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Name and summarize the four levels of administration necessary to keep human services organization operating smoothly
    9·2 answers
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • What is printed by the following program provided all necessary standard header files are included? Explain each line of the out
    10·1 answer
  • The following checksum formula is widely used by banks and credit card companies to validate legal account numbers: d0 + f(d1) +
    13·1 answer
  • Consider the following classes:
    8·1 answer
  • In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports
    15·1 answer
  • Show how the recursive multiplication algorithm computes XY, where X = 1234 and Y = 4321. Include all recursive computations.
    11·1 answer
  • Find the sum of the squares of the integers from 1 to MySquare, where MySquare is input by the user. Be sure to check that the u
    6·1 answer
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
  • You are an IT manager at Gigantic Life Insurance. You have a new desktop support person starting today whose experience is limit
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!