The difference between a training data set and a scoring data set lies in their purpose and usage in the context of machine learning.
A training data set is a subset of the available data that is used to train a machine learning model. It consists of labeled examples, where each example includes input features (independent variables) and corresponding target values (dependent variable or label). The purpose of the training data set is to enable the model to learn patterns and relationships within the data, and to generalize this knowledge to make predictions or classifications on unseen data. During the training process, the model adjusts its internal parameters based on the patterns and relationships present in the training data.
On the other hand, a scoring data set, also known as a test or evaluation data set, is a separate subset of data that is used to assess the performance of a trained model. It represents unseen data that the model has not been exposed to during training. The scoring data set typically contains input features, but unlike the training data set, it does not include target values. The purpose of the scoring data set is to evaluate the model's predictive or classification performance on new, unseen instances. By comparing the model's predictions with the actual values (if available), various performance metrics such as accuracy, precision, recall, or F1 score can be calculated to assess the model's effectiveness and generalization ability.
The Apply Model operator in RapidMiner serves the purpose of applying a trained model to new, unseen data for prediction or classification. Once a machine learning model is built and trained using the training data set, the Apply Model operator allows the model to be deployed on new data instances to make predictions or classifications based on the learned patterns and relationships. The Apply Model operator takes the trained model as input and applies it to a scoring data set. The scoring data set contains the same types of input features as the training data set, but does not include the target values. The Apply Model operator uses the trained model's internal parameters and algorithms to process the input features of the scoring data set and generate predictions or classifications for each instance. The purpose of the Apply Model operator is to operationalize the trained model and make it usable for real-world applications. It allows the model to be utilized in practical scenarios where new, unseen data needs to be processed and predictions or classifications are required. By leveraging the Apply Model operator, RapidMiner users can easily apply their trained models to new data sets and obtain the model's outputs for decision-making, forecasting, or other analytical purposes.
To learn more about machine learning click here:
brainly.com/question/29834897
#SPJ11
what do raichle's default mode network and corbetta's ventral attentional network have in common?
Answer: voluntary deployment of attention and the reorientation to unexpected events
Explanation:
Raichle's Default Mode Network and Corbetta's Ventral Attentional Network both have in common that they are large-scale brain networks involved in cognitive processing and attentional functions.
They are both activated in the human brain when people are at rest and not involved in any specific task. The default mode network is involved in self-reflection, introspection, and mind-wandering. On the other hand, the ventral attentional network is responsible for detecting and reacting to sensory stimuli that have significant emotional, social, or motivational implications.
Both these networks have been associated with cognitive flexibility and creativity. They work together to coordinate human behavior and maintain a balance between internal and external stimuli.
Learn more about brain networks: https://brainly.com/question/29669975
#SPJ11
which of the following is usually an advantage of using an array to implement the adt bag? group of answer choices removing a particular entry requires time to locate the entry adding an entry to a bag is fast increasing the size of the array requires time to copy its entries the capacity of the bag is limited
The following option that show us about the advantage of using array is adding an entry to a bag is fast. So the correct option is C.
In the term of In computer science and programming, array programming generally can be defined as the solutions which allow the application of operations to an entire set of values at once. Array usually be used in scientific and engineering settings. Array generally can be classified into two major group, such as Two-Dimensional Arrays and also Three-Dimensional Arrays. Array has a function to store a collection of data.
Here you can learn more about array in the link https://brainly.com/question/19570024
#SPJ4
Order the steps for using the Rules Wizard to create an email rule.
Select the Home tab, and
click Rules button.
Click New Rule, and select Make any exceptions, and
a template.
name the rule.
Edit a description of the
rule by adding values.
Select Manage Rules and
Alerts
To use the Rules Wizard to create an email rule, you can follow these steps:
Select the Home tab and click the Rules button.Click New Rule and select a template.Edit a description of the rule by adding values and making any exceptions.Name the rule.Select Manage Rules and Alerts to save the rule.What is the email rule about?Below is the process in a more detailed form:
Open your email client and go to the Home tab.Click the Rules button, which is usually located in the Move section of the ribbon.In the Rules dialog box, click the New Rule button.In the Rules Wizard, choose a template that best fits your needs. You can also choose to create a custom rule by selecting "Start from a blank rule."Follow the prompts in the wizard to specify the conditions and actions for the rule. You can specify values and exceptions, such as the sender or recipient of the email, or the subject of the email.Give the rule a name and click Finish to save the rule.Therefore, To manage your rules, click the Manage Rules & Alerts button in the Rules dialog box. From here, you can edit or delete existing rules, or create new ones.
Learn more about email rule from
https://brainly.com/question/4783467
#SPJ1
Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.
Answer:
It should have high color contrast.
A software engineer is designing a program to make tasks easier and solve
problems for users. Which computer discipline does this person most likely
work in?
O A. Computer engineering
OB. Applications development
OC. Network administration
OD. Information technology
How do I get to easy settings in Windows 10?
(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}
Answer:
Following are the code to this question:
RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value
resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value
Explanation:
In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal" is defined, that holds a value that is 0.
In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.please find the attachment of the code file and its output.
_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care
Answer:
Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.
Language is abstract. Authoritative. Allopathic. Altruistic.
The adjectives "abstract," "authoritative," "allopathic," and "altruistic" highlight the diverse ways in which language functions and its significance in society.
What are the different perspectives on language presented in the sentence?The sentence presents a list of adjectives that describe language from different perspectives. "Abstract" refers to the fact that language is not concrete but rather consists of symbols and meanings that are created and understood by humans.
"Authoritative" suggests that language is often used to assert power or control over others. "Allopathic" implies that language can be used to cure or alleviate problems, as in the context of medicine.
"Altruistic" means that language can be used for the benefit of others, as in the context of philanthropy or social justice.
Together, these adjectives highlight the multifaceted nature of language and its role in society.
Learn more about language
brainly.com/question/31133462
#SPJ11
write short cut of
fully justified
Answer:
To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L
Name and discuss the first three stages of the window of
opportunity and give a brief description of each stage.
The term "window of opportunity" is used in the context of change and strategic planning to describe the time span when conditions are right for a particular decision or action.
Below are the first three stages of the window of opportunity and their descriptions:1. Awakening stage: In this stage, people become aware of the need for change. A crisis or opportunity may prompt this awareness. People may have already acknowledged the issue, but it has not yet reached the stage of active consideration.2. Mobilisation stage: In this stage, people begin to take action to bring about change. People gather information and put together resources to generate a viable alternative.
They do this to guarantee that the change they want to see occurs.3. Acceleration stage: In this stage, individuals and groups commit to the change and begin to implement it. It's when they can clearly define the change, create a detailed plan, and actively work toward achieving the goal. They collaborate with others to achieve their objectives, create a sense of urgency, and create a win-win situation for all stakeholders.
To know more about window visit:
https://brainly.com/question/28193153
#SPJ11
Direction: Choose the letter of the correct answer.
1. It is a substance consumed to provide nutritional sustenance for an
organism.
a. food
b. dish
c. menu
d. meal
2. This refers to a prepared item of food like cordon bleu.
a. meal
b. dish
c. menu
d. food
3. This is the term for all item that has been manufactured and is useful to us.
a. nutritive tool b. dishes
c. product evaluation
d. sensory evaluation
4. This involves the sense of sight and can be described through colors, size,
shape, consistency and crumb.
a. flavour
b. fresh
c. appearance
d. texture
5. This is produced by a combination of taste and aroma.
a. flavour
c. changes in color
b. texture
d. sensory
6. This involves the senses of sight and touch and results to different cooking
methods to produce different textures such as soft , chewy, crispy, sticky
and grainy.
a. flavour
c. appearance
b. texture
d. aroma
7. This refers to the nutritive value of the food or dish .
a. sensory tools
c. nutritive tools
b. senses
d. food evaluation
8. This must be evaluated for the purpose of maintaining the consistency of
the products served.
a. meal
c. menu
b. recipe
d. dish
9. It refers to the taste buds on our tongue.
a. taste
c. aroma
b. appearance
d. texture
10. This involves the sense of smell and is detected by the nose.
a. taste
c. texture
b. aroma
d. appearance
Ano pong answer nyo dito?.
pahelp po.
Explanation:
b c a d d d a b c c good luck bro
The origin and/or destination of data, sometimes referred to as external entities defines: A) source. B) data store. C) data flow. D) process. E) predecessor.
The correct answer is Option C. data flow because the origin and/or destination of data refers to the movement of data between external entities in a system, which is represented by data flows in data flow diagrams (DFDs).
In the context of data flow diagrams (DFDs), the origin and/or destination of data refers to external entities. These entities represent external sources or sinks of data within a system. They can be individuals, organizations, or even other systems that interact with the system being analyzed.
External entities are depicted as rectangles in a DFD, and arrows represent data flows between these entities and the processes within the system. The data flows represent the movement of data from one entity to another or between entities and processes.
The main purpose of identifying external entities and data flows is to understand how information is exchanged between different parts of a system. By mapping out the data flows, analysts can gain insights into the inputs and outputs of the system, enabling them to identify potential bottlenecks, inefficiencies, or areas for improvement.
In summary, the origin and/or destination of data, also known as external entities, is what defines the data flow in a system. These entities represent external sources or sinks of data, and understanding the data flows between them is crucial for analyzing and improving the system's functionality.
Therefore, the correct answer is Option C. data flow.
Learn more about Data flow diagrams
brainly.com/question/32221532
#SPJ11
Helpppp
You can see the output if your html result using any web browser ?
True or False
Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.
The procedure depends on the software and methods she uses.
In photoshop or InDesign she might need to fdrag and drop the title to the new location.
In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.
true or false: when your system is idle, or an application is running, the processor should not be running at its peak.
"True or false: when your system is idle, or an application is running, the processor should not be running at its peak."
The processor is to execute instructions and carry out tasks. When the system is idle, there are fewer instructions to execute, and therefore, the processor should not be running at its peak. Similarly, when an application is running, the processor will execute instructions specific to that application, but it should not be constantly running at its peak.
When your system is idle or running a basic application, the processor does not need to run at its peak performance. Modern processors are designed to adjust their performance based on the current workload, saving energy and reducing heat generation.
To know more about Running visit:-
https://brainly.com/question/13761360
#SPJ11
To sign into an online portal, you must enter a certain password. You have n passwords to choose from, but only one of them matches the correct password. You will select a password at random and then enter it. If it works, you are logged in. Otherwise, you will select another password from the remaining n−1 passwords. If this one works, you are logged in after two attempts. If not, you will choose a third password from the remaining n−2 passwords and so on. You will continue this process until access is granted into the portal. (a) What is the probability you will gain access on the kth login attempt, where k∈{1,2,3,…,n−1,n} ? (b) Suppose now that n=500, and the system will automatically lock after three failed login attempts. What is the probability you will gain access into the portal?
(a) The probability of gaining access on the kth login attempt, where k∈{1,2,3,…,n−1,n}, can be calculated using the concept of conditional probability.
(b) To determine the probability of gaining access into the portal when n=500 and the system locks after three failed attempts, we need to consider the different scenarios that lead to successful login within three attempts.
How can we calculate the probability of gaining access on the kth login attempt and the probability of gaining access when n=500 with a maximum of three attempts?(a) The probability of gaining access on the kth login attempt can be calculated as follows:
The probability of selecting the correct password on the first attempt is 1/n.The probability of selecting an incorrect password on the first attempt and then selecting the correct password on the second attempt is (n-1)/n * 1/(n-1) = 1/n.Similarly, for the kth attempt, the probability is 1/n.Therefore, the probability of gaining access on the kth attempt is 1/n for all values of k.
(b) When n=500 and the system locks after three failed attempts, we need to consider the scenarios in which access is gained within three attempts.
The probability of gaining access on the first attempt is 1/500.The probability of gaining access on the second attempt is (499/500) * (1/499) = 1/500.The probability of gaining access on the third attempt is (499/500) * (498/499) * (1/498) = 1/500.Therefore, the probability of gaining access within three attempts is 3/500 or 0.006.
Learn more about probability
brainly.com/question/31828911
#SPJ11
after reading chapter 5 of your textbook, use a browser to research manifesto. what is a manifesto and how do you create one as a designer?
A manifesto is a written declaration or statement that communicates the beliefs, principles, intentions, or goals of an individual, group, or movement. As a designer, creating a manifesto involves articulating your design philosophy, values, and vision to guide your work and communicate your purpose to others.
L
A manifesto serves as a powerful tool for designers to express their perspectives, establish a clear direction, and communicate their principles and intentions. It encapsulates the designer's beliefs about design, their vision for the impact and value of their work, and their stance on important design-related issues.
Creating a manifesto as a designer involves a reflective and introspective process. It starts by clarifying your design philosophy, understanding what motivates and inspires you as a designer, and identifying the values that guide your decision-making. This could include principles such as user-centered design, sustainability, accessibility, or innovation.
Once you have a clear understanding of your beliefs and values, you can articulate them in a manifesto by writing a concise and compelling statement. A manifesto should be authentic, inspiring, and resonate with your intended audience. It should convey the essence of your design approach, express your aspirations, and provide a framework for making design decisions.
A well-crafted manifesto can serve as a guiding light throughout your design journey, helping you stay focused, make meaningful choices, and establish a strong identity as a designer. It also acts as a communication tool, allowing others to understand your perspective, connect with your work, and align with your values.
Learn more about manifesto here
https://brainly.com/question/29574734
#SPJ11
9.3 To iterate through (access all the entries of) a two-dimensional arrays you need _________ for loops. (Enter the number of for loops needed).
To iterate through a two-dimensional array, you need two for loops.
A two-dimensional array, also known as a matrix, is a data structure that contains rows and columns of elements.
To access all the entries of a two-dimensional array, you need to iterate through each element of the array.
This is usually done using nested for loops.
To iterate through a two-dimensional array, you need two for loops.
The outer loop iterates through the rows of the array, while the inner loop iterates through the columns of the array.
The outer loop starts from the first row and goes up to the last row, while the inner loop starts from the first column and goes up to the last column.
During each iteration of the inner loop, the current element of the array is accessed using the indices of the current row and column.
These indices are used to access the corresponding element of the array.
Once all the elements of the current row have been accessed, the inner loop terminates and the outer loop proceeds to the next row.
The number of for loops needed to iterate through a two-dimensional array is 2, as mentioned above.
The exact implementation of the nested for loops may vary depending on the programming language used and the specific requirements of the problem at hand.
For similar questions on array
https://brainly.com/question/28565733
#SPJ11
Assume you need to create a presentation on the effects of global warming. Keeping the topic in mind, you need to
focus on certain key guidelines while creating the presentation. In a table, list those appropriate guidelines that you
would follow to create an effective presentation. Your table should have guidelines related to image choices, font
size for the heading and body text, background and text color for the slide, number of bullet points you will use,
and number of words per line. Also, provide your rationale about the choices for these elements.
Answer:
................................................................................................
Explanation:
The half-life of a decaying radioactive isotope is the time it takes for half of the original mass of the isotope to decay. If the mass (in grams) of a particular radioactive sample is given by M(t)=30e^(-0. 05t) where t is in years, what is the half-life of that isotope?
Round your answer to 2 decimal places. Do not include units
Answer:
Explanation:
The half-life of 20F is 11.0 s. If a sample initially contains 5.00 g of 20F, how much 20F remains after 44.0 s?
Solution
If we compare the time that has passed to the isotope’s half-life, we note that 44.0 s is exactly 4 half-lives, so we can use Equation ???
with n=4
. Substituting and solving results in the following:
amountremaining=5.00g×(12)4=5.00g×116=0.313g
Less than one-third of a gram of 20F remains.
FILL IN THE BLANK The ___ discipline of the UP includes all activities for building, acquiring, and integrating application software components.
The software engineering discipline of the Unified Process (UP) includes all activities for building, acquiring, and integrating application software components.
This discipline focuses on the systematic and controlled development of software systems, encompassing the entire software development lifecycle. It involves various tasks such as requirements gathering, analysis, design, coding, testing, and deployment. The software engineering discipline within the UP emphasizes the use of best practices, methodologies, and tools to ensure the efficient and effective development of software solutions. It also emphasizes collaboration, communication, and feedback throughout the development process to achieve high-quality software products that meet the needs of stakeholders.
To learn more about building click on the link below:
brainly.com/question/30745253
#SPJ11
why does hashing prevent hackers from stealing the contents of a password file?
Answer:
Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.
Explanation:
pls mark brainliest
Identify the services that have a global (rather than regional) scope? (choose 2)
A. AWS Lambda
B. Amazon Elastic Compute Cloud (EC2)
C. Amazon Simple Storage Service (S3)
D. Amazon Route 53
E. Amazon CloudFront
The services that have a global scope are: A. AWS Lambda E. Amazon Cloud Front
AWS Lambda is a server less computing service provided by Amazon Web Services (AWS) that allows developers to run code without provisioning or managing servers. It is a globally available service that can be accessed and utilized from various regions. Amazon Cloud Front is a content delivery network (CDN) service provided by AWS. It helps deliver content, such as web pages, videos, and other files, to users globally with low latency and high transfer speeds. Cloud Front has edge locations distributed worldwide, allowing it to provide global coverage. Both AWS Lambda and Amazon Cloud Front are designed to be accessible and provide services globally, regardless of specific regions or geographic boundaries.
learn more about content delivery network here :
https://brainly.com/question/31946581
#SPJ11
miguel has designed an intricate powerpoint presentation that will blow his audience away. when he arrives, there are no computer capabilities in the room he is presenting in. miguel forgot to consider which of the overall aspects?
Miguel forgot to consider the technical capabilities of the room he was presenting in, such as whether there were computers and the necessary software to run his presentation.
Miguel had carefully designed an intricate powerpoint presentation that he believed would have a great impact on his audience. However, when he arrived at the presentation room, he realized that there were no computer capabilities. In other words, there were no computers or any of the necessary software to run his presentation. This was an important aspect that Miguel had overlooked, and it meant that his presentation would not be able to go ahead as planned. In order to ensure a successful presentation, it is important to consider all of the aspects, including the technical capabilities of the room you will be presenting in. Without the necessary equipment, the presentation will not be able to go ahead as planned and the audience will not be able to experience the full impact of Miguel's presentation.
Learn more about computers here:
brainly.com/question/30206316
#SPJ4
how can solver be used in excel? what are the specific steps to fill info needed and run solver to generate reports and outputs?
To use Solver in Excel, we must enable Solver Add-ins in Microsoft Excel.
What is Excel Solver?Solver is an optimization tool that can be used to analyze a spreadsheet and identify the ideal solution. It works by adjusting variables in a spreadsheet to achieve a target value. Solver does this by using trial and error to test various values for variables until it identifies the optimum solution.
The Solver tool is an Excel add-in, which means you must activate it before using it. To enable Solver, follow these steps:
Click on the 'File' menu, and then choose 'Options.'Choose the 'Add-ins' option.In the 'Manage' box, select 'Excel Add-ins,' and then press 'Go'.'Select' the 'Solver Add-in' checkbox, and then click on 'OK'. Fill the necessary information into SolverTo use Solver, you must first input the problem into a spreadsheet.
Start by entering the parameters of the problem you're trying to solve. You'll need to specify the objective function, decision variables, and constraints.In Solver, the objective function is what you're trying to optimize. For instance, you might want to maximize your profits or minimize your costs. The decision variables are the values that you can adjust to achieve your objective function.The constraints are the restrictions that must be followed while trying to reach the objective function.The Solver will adjust the decision variables until it satisfies all of the constraints and optimizes the objective function.When you've entered all of the information into Solver, click on 'OK' to run it. Excel will automatically update the worksheet with the new values that Solver generates. You may then generate reports and outputs based on the results of the Solver output.Learn more about Solver here:
brainly.com/question/29843128
#SPJ11
hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me
Answer:
a pseu code is a is an artificial and informal language that helps programmers develop algorithms.
Explanation:
PLEASE HELP
While reviewing the Web sites on vegetarian eating, you become very interested in the health benefits these sites say are associated with this diet. Many Web sites that you review report some of the same information.
What characteristic of an effective Web site does this show?
a. verifiable data
b. unbiased presentation
c. relevant information
d. reputable author
Answer:
B
Explanation:
Answer:
It is verifiable data.
Explanation:
Edge 2021 , its correct
Let S be a set with n elements and let a and b be distinct elements of S. How many relations R are there on S such that 1. (a, b) R?
To understand the answer to this question, we need to first understand what a relation is. A relation between two elements of a set is a set of ordered pairs of those elements. For example, if S = {1, 2, 3}, a relation R on S could be { (1,2), (2,3) }, which means that 1 is related to 2 and 2 is related to 3.
Now, let's look at the question. We have a set S with n elements and two distinct elements a and b. We need to find how many relations R are there on S such that (a, b) R.
First, let's consider the ordered pair (a, b). Since (a, b) is in R, we know that a is related to b in R. But what about the other elements in S? For each of the remaining (n-2) elements in S, we have two choices: either include that element in a pair with another element in S, or don't include it at all.
So, for each of the (n-2) remaining elements in S, we have two choices. Therefore, the total number of relations R that satisfy the condition (a, b) R is 2^(n-2).
To see why, let's take a simple example. Suppose S = {1, 2, 3, 4} and a = 1, b = 2. Then the possible relations that satisfy (a, b) R are:
{ (1,2) }, { (1,2), (3,4) }, { (1,2), (4,3) }, { (1,2), (3,4), (4,3) }
Each of these relations corresponds to a different choice of which elements in S are related to each other. There are 2^(n-2) such choices, as each of the (n-2) remaining elements can be either included in a pair or not.
In summary, the number of relations R on S such that (a, b) R is 2^(n-2), where n is the number of elements in S and a, b are distinct elements in S.
More questions on relations : https://brainly.com/question/28827119
#SPJ11
Select the correct answer from each drop-down menu.
What are the chief contributions of artificial intelligence in the field of robotics?
The two chief contributions of artificial intelligence in the field of robotics are (blank)
and (blank) .
tab one: writing, learning,reading
tab two: perception, intuition, emotion
The two chief contributions of artificial intelligence in the field of robotics are perception and learning. Options A and B are answers.
Artificial intelligence has made significant contributions in the field of robotics by enabling machines to perceive and interpret their surroundings using various sensors and algorithms. This perception is critical to the robot's ability to navigate, manipulate objects, and interact with its environment. Additionally, AI has enabled robots to learn from their experiences and adapt to new situations, making them more versatile and capable of handling a wide range of tasks. Option A (perception) and Option B (learning) are the correct answers.
You can learn more about Artificial intelligence at
https://brainly.com/question/31441777
#SPJ11