subject

Betty is developing a machine learning algorithm that looks at vast amount of data collected over 100 years and checks for relationships between humidity, temperature, and rainfall. what form of machine learning is she developing? a. regression
b. association
c. big data
d. classification
e. clustering

Answers

ansver
Answer from: Min1on7

The answer to this question is given below in the explanation section.

Explanation:

Betty is developing a machine learning algorithm that looks at a vast amount of data that is collected over 100 years, and She also wants to check the relationship among variables such as humidity, temperature, and rainfall in the given data.

So, the correct answer to this question is b. She is developing an association machine learning algorithm.

Because the association tells the relationship between variables. She used the association to find the relationship among variables such as humidity, temperature,  and rainfall.

While the other options are not correct because:

Regression is used to find out the cause and effect relationship between dependent and independent variables. Big data is the biggest field of data analysis, so this option does not best suit this context. Classification is used to classify data, or organizing data into their related group. While clustering is the task of dividing the population into a number of groups such that populations in the same groups are more similar to other populations in the same group than those in other groups. so these are all incorrect options to this question except the "b" option i.e association.

ansver
Answer from: Quest

answer; middle level managers;

ansver
Answer from: Quest
Answercrawler;

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 04:30, kkeith121p6ujlt
Eye injuries usually occur as a result of all of the following things, except: a) proper machine operation b) battery explosion c) falling or flying debris d) electric welding arc
Answers: 2
image
Computers and Technology, 22.06.2019 12:50, michaelchavez6959127
You have just been hired as an information security engineer for a large, multi-international corporation. unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. the other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks. requirementswrite a brief description of the case study. it requires two to three pages, based upon the apa style of writing. use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. use a double-spaced, arial font, size 12.
Answers: 1
image
Computers and Technology, 23.06.2019 22:20, kandi2565
What is a programming method that provides for interactive modules to a website?
Answers: 1
image
Computers and Technology, 24.06.2019 04:30, juliemiddleton05
1. web and mobile applications allow users to be actively engaged in an online activity. a true b false 2. some examples of business applications purposes are to collaborate, share files, meet virtually in real-time, and accept payments. a true b false 3. an education application would most likely do which of the following? a allow users to watch popular movies and tv shows b connect users with social and business contacts c confirm users' travel plans d teach users a new language 4. a uniform resource locator (url) is how the internet knows where to take users when an address is typed into a browser. a true b false 5. deon is required to provide the citation information for his sources. what type of information should he collect from his sources? a author name, title, date of publication, date of access, url b connections to background information c interesting facts and statistics d notes on important information
Answers: 1
You know the right answer?
Betty is developing a machine learning algorithm that looks at vast amount of data collected over 10...