( )is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the abillity to mlGarnr,(i.e.,progressively improve performance on a specific task)with data.Without being explitiy?programmed.A.Machine learningB.Program language learningC.Natural language learningD.Statistical?learning

( )is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the abillity to mlGarnr,(i.e.,progressively improve performance on a specific task)with data.Without being explitiy?programmed.

A.Machine learning
B.Program language learning
C.Natural language learning
D.Statistical?learning

参考解析

解析:

相关考题:

Techniques that can improve communication include:A establishing a single, one-way communications channelB avoiding face-to-face communicationC using redundancy (i.e. saying it two different ways) whenever possibleD disregarding the sensitivity of your receiverE All of the above.

195 Techniques that can improve communication include:A. establishing a single, one-way communications channelB. avoiding face-to-face communicationC. using redundancy (i.e. saying it two different ways) whenever possibleD. disregarding the sensitivity of your receiverE. All of the above

The fifth generation computers, with artificial intelligence, () and perfected now. A、will have been developedB、developedC、are being developedD、have developed

The field of artificial _________is a new branch of computer science.A. intelligenceB. talentC. capabilityD. power

● Perform Quality Control is the process of monitoring and recording results of executing the Quality Plan activities to assess performance and recommend necessary changes.(74) are the techniques and tools in performing quality control.Statistical sampling ① Run chart ②Control charts ③ Critical Path Method ④Pareto chart ⑤ Cause and effect diagrams ⑥(74)A.①②③④B.②③④⑤C.①②③⑤⑥D.①③④⑤⑥

Artificial intelligence (AI) ,an interdisciplinary field, is usually regarded as a branch of computer science, dealing with models and systems for the performance of functions generally associated with human intelligence, such as(71)and learning.In AI, knowledge-based system is an information(72)system that provides for solving problems in a particular domain or application area by drawing inferences from a knowledge base. Moreover, some knowledge-based systems have learning capabilities. Expert system (ES) indicates the knowledge-based system that provides for solving problems in a particular domain or application area by drawing inferences from a knowledge base developed from human(73). Some expert systems are able to(74)their knowledge base and develop new inference rules based on their experience with previous problems. The term "expert system" is sometimes used(75)with "knowledge-based system", but should be taken to emphasize expert knowledge.A.inferringB.reasoningC.derivingD.proving

Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are introduced broadly including its producing background, its application and its classification. The principal techniques used in the data mining are surveyed also, which include rule induction, decision(67), artificial(68)network, genetic algorithm, fuzzy technique, rough set and visualization technique. Association rule mining, classification rule mining, outlier mining and clustering method are discussed in detail. The research achievements in association rule, the shortcomings of association rule measure standards and its(69), the evaluation methods of classification rules are presented. Existing outlier mining approaches are introduced which include outlier mining approach based on statistics, distance-based outlier mining approach, data detection method for deviation, rule-based outlier mining approach and multi-strategy method. Finally, the applications of data mining to science research, financial investment, market, insurance, manufacturing industry and communication network management are introduced. The application(70)of data mining are described.A.intractableB.emergingC.easyD.scabrous

Perform. Quality Control is the process of monitoring and recording results of executing the Quality Plan activities to assess performance and recommend necessary changes. ______ are the techniques and tools in performing quality control.. ① Statistical sampling ② Run chart ③ Control charts ④ Critical Path Method ⑤ Pareto chart ⑥ Cause and effect diagramsA.①②③④B.②③④⑤C.①②③⑤⑥D.①③⑤⑥

What is a sub-select statement?A.a select statement that selects a subset of fields in a tableB.a select statement that returns a subset of the data in a tableC.a select statement that appears within another select statementD.a select statement that returns a subset of the constraints on a field

Perform Quality Control is the process of monitoring and recording results*of executing the Quality Plan activities to assess performance and recommend necessary changes.() are the techniques and tools in performing quality control① Statistical sampling ② Run chart③ Control charts ④ Critical Path Method⑤ Pareto chart⑥ Cause and effect diagramsA.①②③④B.②③④⑤C.①②③⑤⑥D.①③④⑤⑥

共用题干第二篇The next big breakthrough in artificial intelligence could come from giving machines not just more logical capacity,but emotional capacity as well.Feeling aren't usually associated with inanimate(无生命的)machines, but Posalind Picard, a professor of computer technology at MIT,believes emotion may be just the thing computes need to work effectively.Computers need artificial emotion both to understand their human users better and to achieve self-analysis and self-improvement,says Picard."If we want computers to be genuinely intelligent,to adapt to us,and to interact naturally with us,then they will need the ability to recognize and express emotions,to have emotions,and to have what has come to be called emotional intelligence,"Picard says.One way that emotions can help computers,she suggests,is by helping keep them from crashing. Today's computers produce error messages,but they do not have a "gut feeling" of knowing when something is wrong or doesn't make sense.A healthy fear of death could motivate a computer to stop trouble as soon as it starts.On the other hand, self-preservation would need to be subordinate to service to humans.It was fear of its own death that promoted RAL,the fictional computer in the film 2002 :A Space Odyssey, to extermine(消灭)most of its human associates.Similarly,computers that could"read"their users would accumulate a store of highly personal information about us一not just what we said and did,but what we likely thought and felt."Emotion not only contribute to a richer quality of interaction,but they directly impact a person's ability to interact in an intelligent way,"Picard says."Emotional skills,especially the ability to recognize and express emotions,are essential for natural communication with humans." According to Picard,emotion intelligence is necessary to computers because_________.A:it can make computers analyze the information more efficientlyB:it can help to eliminate the computrs' innate problemsC:it can improve the mechanic capacity of computersD:it can make computers achieve a better understanding of human users

共用题干第二篇The next big breakthrough in artificial intelligence could come from giving machines not just more logical capacity,but emotional capacity as well.Feeling aren't usually associated with inanimate(无生命的)machines, but Posalind Picard, a professor of computer technology at MIT,believes emotion may be just the thing computes need to work effectively.Computers need artificial emotion both to understand their human users better and to achieve self-analysis and self-improvement,says Picard."If we want computers to be genuinely intelligent,to adapt to us,and to interact naturally with us,then they will need the ability to recognize and express emotions,to have emotions,and to have what has come to be called emotional intelligence,"Picard says.One way that emotions can help computers,she suggests,is by helping keep them from crashing. Today's computers produce error messages,but they do not have a "gut feeling" of knowing when something is wrong or doesn't make sense.A healthy fear of death could motivate a computer to stop trouble as soon as it starts.On the other hand, self-preservation would need to be subordinate to service to humans.It was fear of its own death that promoted RAL,the fictional computer in the film 2002 :A Space Odyssey, to extermine(消灭)most of its human associates.Similarly,computers that could"read"their users would accumulate a store of highly personal information about us一not just what we said and did,but what we likely thought and felt."Emotion not only contribute to a richer quality of interaction,but they directly impact a person's ability to interact in an intelligent way,"Picard says."Emotional skills,especially the ability to recognize and express emotions,are essential for natural communication with humans." The film 2002:A Space Odyssey (Para. 4) is mentioned to illustrate__________.A:a typical case of a fictional computer with emotionsB:the necessity of bringing computers with emotions under controlC:the possibility that computers with emotion might kill human associatesD:the troubles that might be caused by computers with emotions

共用题干Artificial SpeechBecause speech is the most convenient form of communication,in the future we want essentially natural conversations with computers.The primary point of contact will be a simple device that will act as our window into the world. It will have to be small enough to slip into our pocket,so there will be a screen but no keyboard:you will simply talk to it. The device will be permanently connected to the Internet and will keep relevant information up to you as it comes in. Such devices will evolve naturally in the next five to ten years.Just how quickly people will adapt to a voice-based Internet world is uncertain.Many believe that,initially at least,we will need similar conventions for the voice to those we use at present on screen:click,back,forward,and so on.But soon you will undoubtedly be able to interact by voice with all those IT-based services you currently connect with over the Internet by means of a keyboard. This will help the Internet serve the entire population.Changes like this will encompass(围绕,包围)the whole world. Because English is the language of science,it will probably remain the language in which the technology is most advanced,but most speech-recognition techniques are transferable to other languages provided(假如)there is sufficient motivation to undertake the work.Of course,in any language there are still huge problems for us to solve.Carefully dictated, clear speech can now be understood by computers with only a 4-5 percent error rate,but even the most advanced technology still records 30-40 percent errors with spontaneous speech.Within ten years we will have computers that respond to goal-directed conversation,but for a computer to have a conversation that takes into account human social behaviors is probably 50 years off. We are not going to be chatting to the big screen in the living room just yet.In the past,insufficient speed and memory have held us back,but these days they are less of an issue.However,there are those in the IT community who believe that current techniques will eventually hit a brick wall. Personally, I believe that incremental(不断增长的)developments in performance are more likely. But it is true that by about 2040 or so,computer architectures will need to become highly parallel(并行的)if performance is to keep increasing. Perhaps that will inspire some radically new approaches to speech understanding that will replace the methods we are developing now. Besides English,French is another frequently used language of science.A:Right B:WrongC:Not mentioned

“…nor does giving people breakfast improve performance”means______.A.anyone without breakfast does improve his performanceB.not giving people breakfast improve performanceC.having breakfast does not improve performance,eitherD.people having breakfast do improve their performance

The fifth-generation computers,with artificial intelligence,( )and perfected now. A.developed B.have developed C.are being developed D.will have been developed

AI的英文缩写是Artificial Intelligence

人工智能(Artificial Intelligence),英文缩写为Al。

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

Data is transferred between two servers using NFS, where one server is configured with token ring, and the other system is configured with ethernet. It is discovered that the performance is greatly reduced during this transfer. Which of the following steps should be taken to improve performance?()A、 Reduce MTU on token ring system to match ethernet system using ifconfig command (i.e. ifconfig tr0 mtu 1500)B、 Reduce MTU on token ring system to match ethernet system using no command (i.e. no -o mtu=1500)C、 Increase MTU on ethernet system to match token ring system using ifconfig command (i.e. ifconfig en0 mtu 4096)D、 Increase MTU on ethernet system to match token ring system using no command (i.e. no -o mtu=4096)

Which statement is true about the forwarding plane?()A、It uses ASICs for increased performance.B、It is the intelligence of the platform.C、It maintains the routing tables.D、It is based on an x86 architecture.

You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()A、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application usesB、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registryC、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computerD、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file

单选题Which of the following could be disabled to improve performance and response, in Windows Vista,on a computer with an older video card?()ADesktop IconsBAeroCTask ManagerDUAC

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题Emotional intelligence is important because ______.Ait can increase the logical capacity of the computerBit can raise the mechanic capacity of the computerCit can eliminate all the defects of the computerDit can improve user-computer communication

单选题The newly developing science of artificial intelligence aims at programming the computer to think, reason and react()people do.Aby the same way asBin much the same way thatCwith the same way asDas much as the same way that

单选题Which statement is true about the forwarding plane?()AIt uses ASICs for increased performance.BIt is the intelligence of the platform.CIt maintains the routing tables.DIt is based on an x86 architecture.

单选题Which object may be used during query optimization to improve the performance for a subset of SELECT queries?()AMQTBTriggerCRead Only CursorDStored Procedure