Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Decision Trees:
Visualize you only ever do four things at the weekend such as go shopping or watch a movie or play tennis and just stay in. In such case what you do depends on three things as: the weather or windy, rainy or sunny; means how much money you have rich or poor and where your parents are visiting. However you say to yourself as: there if my parents are visiting than we'll go to the cinema. And if they're not visiting or it's sunny so I'll play tennis further then if it's windy, and I'm rich, then I'll go shopping. Hence if they're not visiting so it's windy and I'm poor and I will go to the cinema. But if they're not visiting and it's rainy so I'll stay in.
Always memorize all this as you draw a flowchart that will enable you to read off your decision. And now if we call such diagrams decision trees. Then a suitable decision tree for the weekend decision choices would be as follows:
However we can justified by see that why such diagrams are called trees is just because of them, are admittedly upside down and they start from a root and have branches leading to leaves as the tips of the graph at the bottom. There is one important notice that the leaves are always decisions then a particular decision might be at the end of multiple branches like an example where we could choose to go to the cinema for two different reasons.
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform
Communication displays give support in determining the frequency of communication, whether congestion in message queues or not, volume and the type of patterns being communicated e
Public Key Infrastructure solutions The use of public-key based security systems requires great attention and due care in design and management of security features. The secur
Minimise the logic function F (A, B, C, D) = Π M (1, 2, 3, 8, 9, 10, 11,14) ⋅ d (7, 15) Use Karnaugh map. Ans. Given function F=∏M(1,2,3,8,9,10,11,14).d(7, 15) F'=B'D+B'C+AC+AB'
Write a script that will make x and y vectors. Then, it will ask the user for a color ('red', 'blue', or 'green') and for a plot style ('o', '*'). It will then make a string "pst
Convert the binary number 10110 to Gray code ? Ans. For changing binary number 10110 in its equivalent Gray code the rules are as, the left most bit that is MSB in Gray code is 1
What is Algorithm Design Technique? An algorithm design method is a general approach to solving problems algorithmically that is applicable to a variety of proble
In a 10000 line exchange, 0000 to 2999 is allotted to x group of subscribers, out of which 40% are active during busy hour. The remaining numbers are domestic numbers out of which
Performance metrics aren't able to attain a linear curve in comparison to increase in number of processors in parallel computer. The main reason for above situation is presence of
Vector reduction Instructions When operations on vector are being decreased to scalar items as a result then these are vector reduction instructions. These instructions are ref
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd