Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Decision Trees:
Visualize you only ever do four things at the weekend such as go shopping or watch a movie or play tennis and just stay in. In such case what you do depends on three things as: the weather or windy, rainy or sunny; means how much money you have rich or poor and where your parents are visiting. However you say to yourself as: there if my parents are visiting than we'll go to the cinema. And if they're not visiting or it's sunny so I'll play tennis further then if it's windy, and I'm rich, then I'll go shopping. Hence if they're not visiting so it's windy and I'm poor and I will go to the cinema. But if they're not visiting and it's rainy so I'll stay in.
Always memorize all this as you draw a flowchart that will enable you to read off your decision. And now if we call such diagrams decision trees. Then a suitable decision tree for the weekend decision choices would be as follows:
However we can justified by see that why such diagrams are called trees is just because of them, are admittedly upside down and they start from a root and have branches leading to leaves as the tips of the graph at the bottom. There is one important notice that the leaves are always decisions then a particular decision might be at the end of multiple branches like an example where we could choose to go to the cinema for two different reasons.
How do you create a permanent cookie? By setting the expiry date of the cookie to a later on time (like 10 years later.)
Explain the Working of Linker? Linker as well called as link editor and binder. A linker is the program that combines object modules to form an executable program. Several pro
What are the advantages of Hierarchical Networks? Hierarchical networks are able of handling heavy traffic where needed, and at similar time use minimal number of trunk groups
Q. Design a half adder? In half adder inputs are: The augend let's say 'x' and addend 'y' bits. The outputs are sum 'S' and carry 'C' bits. Logical relationship betwee
Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list
State the Disadvantages of interviewing - can be expensive to carry out - can be a very time consuming exercise - Unable to remain anonymous
Explain CSMsgInterface() Function with Predefined Protocol A REQUEST structure is created for each message sent to the server. Messages passed to CSMsgInterface() as *dataMSG
Convert the decimal number 45678 to its hexadecimal equivalent number. Ans: (45678) 10 =(B26E) 16 (45678) 10 =(B26E) 16
Q. Explain about Interlacing? Interlacing is a procedure in which in place of scanning the image one-line-at-a-time it's scanned alternatelyit implies thatalternate lines are s
Lists out some applications of Shift Register. Ans: Applications of Shift Registers: a. Serial to Parallel Converter b. Parallel to Serial Converter c. Delay li
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd