机器学习第二章答案2

Recognition is the process of incorporating in the balance sheet or income statement an item that meet the definition of an element and satisfies the recognition criteria.()

此题为判断题(对,错)。


正确答案:正确


In John Whitehead's opinion, which statement is true?

A.Face recognition technology may interfere with people's privacy.

B.Face recognition technology may enhance the country's constant surveillance.

C.Face recognition technology can be used in the same way wiretaps are used.

D.Face recognition technology can be used after its threat has been removed.


正确答案:A
解析:文章最后一段最后一句话“After all,that is exactly what constant surveillance is—the ultimate implied threat of coercion.”这是约翰博士的观点,这项技术威胁到美国每个公民参与社会的权利。所以A、“会干扰人们的隐私”,是正确答案。


What is this passage mainly about?

A.Disadvantage of face recognition technology.

B.Purposes of face recognition technology.

C.Controversial face recognition technology.

D.Effect of face recognition technology.


正确答案:C
解析:文章讲述了警察局对这项技术非常谨慎,为监视摄像机的使用做了充分准备,但收效甚微。所以反对这项技术的人非常多。有人认为它是潜在的威胁,有人认为会侵犯守法公民,但马伦认为这个系统最终会和其他城市,其他州和联邦的执法部门连在一起跟踪罪犯和可疑的恐怖分子。所以说这项技术充满争议。因此选C。


When my grandfather died, I discovered that he had left me some money in his ______.

A. savings

B. will

C. credit card

D. cash machine


正确答案:B


The ( ) refers to the integration of complex physical machinery with networked sensors and software. It draws together fields such as machine learning, big data, the Internet of things and machine-to-machine communication to ingest data form machines, analyze it (often in real-time), and use it to adjust operations.

A.Industrial internet

B.factory interne

C.Industrial web

D.business internet


正确答案:A


11.1. Give three computer applications for which machine learning approaches seem appropriate and three for which they seem inappropriate. Pick applications that are not already mentioned in this chapter, and include a one-sentence justification for each. Ans. Machine learning: Face recognition, handwritten recognition, credit card approval. Not machine learning: calculate payroll, execute a query to database, use WORD. 2.1. Explain why the size of the hypothesis space in the EnjoySport learning task is 973. How would the number of possible instances and possible hypotheses increase with the addition of the attribute WaterCurrent, which can take on the values Light, Moderate, or Strong? More generally, how does the number of possible instances and hypotheses grow with the addition of a new attribute A that takes on k possible values? Ans. Since all occurrence of “ ” for an attribute of the hypothesis results in a hypothesis which does not accept any instance, all these hypotheses are equal to that one where attribute is “ ”. So the number of hypothesis is 4*3*3*3*3*3 +1 = 973. With the addition attribute Watercurrent, the number of instances = 3*2*2*2*2*2*3 = 288, the number of hypothesis = 4*3*3*3*3*3*4 +1 = 3889. Generally, the number of hypothesis = 4*3*3*3*3*3*(k+1)+1. 2.3. Consider again the EnjoySport learning task and the hypothesis space H described in Section 2.2. Let us define a new hypothesis space H that consists of all pairwise disjunctions of the hypotheses in H. For example, a typical hypothesis in H is (?, Cold, High, ?, ?, ?) v (Sunny, ?, High, ?, ?, Same) Trace the CANDIDATE-ELIMINATATION algorithm for the hypothesis space H given the sequence of training examples from Table 2.1 (i.e., show the sequence of S and G boundary sets.) Ans. S0= (, , ) v (, , )G0 = (?, ?, ?, ?, ?, ?) v (?, ?, ?, ?, ?, ?) Example 1: S1=(Sunny, Warm, Normal, Strong, Warm, Same)v (, , )G1 = (?, ?, ?, ?, ?, ?) v (?, ?, ?, ?, ?, ?) Example 2: S2= (Sunny, Warm, Normal, Strong, Warm, Same)v (Sunny, Warm, High, Strong, Warm, Same),(Sunny, Warm, ?, Strong, Warm, Same) v ( , , , , , ) G2 = (?, ?, ?, ?, ?, ?) v (?, ?, ?, ?, ?, ?) Example 3: S3=(Sunny, Warm, Normal, Strong, Warm, Same)v (Sunny, Warm, High, Strong, Warm, Same),(Sunny, Warm, ?, Strong, Warm, Same) v ( , , , , , ) G3 = (Sunny, ?, ?, ?, ?, ?) v (?, Warm, ?, ?, ?, ?), (Sunny, ?, ?, ?, ?, ?) v (?, ?, ?, ?, ?, Same ), (?, Warm, ?, ?, ?, ?) v (?, ?, ?, ?, ?, Same )2Example 4: S4= (Sunny, Warm, ?, Strong, ?, ?) v (Sunny, Warm, High, Strong, Warm, Same) ,(Sunny, Warm, Normal, Strong, Warm, Same) v (Sunny, Warm, High, Strong, ?, ?) ,(Sunny, Warm, ?, Strong, ?, ?) v (, , ),(Sunny, Warm, ?, Strong, Warm, Same)v (Sunny, Warm, High, Strong, Cool, Change)G4 = (Sunny, ?, ?, ?, ?, ?) v (?, Warm, ?, ?, ?, ?), (Sunny, ?, ?, ?, ?, ?) v (?, ?, ?, ?, ?, Same ), (?, Warm, ?, ?, ?, ?) v (?, ?, ?, ?, ?, Same )2.4. Consider the instance space consisting of integer points in the x, y plane and the set of hypotheses H consisting of rectangles. More precisely, hypotheses are of the form a x b, c yd, where a, b, c, and d can be any integers. (a) Consider the version space with respect to the set of positive (+) and negative (-) training examples shown below. What is the S boundary of the version space in this case? Write out the hypotheses and draw them in on the diagram. (b) What is the G boundary of this version space? Write out the hypotheses and draw them in. (c) Suppose the learner may now suggest a new x, y instance and ask the trainer for its classification. Suggest a query guaranteed to reduce the size of the version space, regardless of how the trainer classifies it. Suggest one that will not. (d) Now assume you are a teacher, attempting to teach a particular target concept (e.g., 3 x 5, 2 y 9). What is the smallest number of training examples you can provide so that the CANDIDATE-ELIMINATION algorithm will perfectly learn the target concept? Ans. (a) S= (4,6,3,5) (b) G=(3,8,2,7) (c) e.g., (7,6), (5,4) (d) 4 points: (3,2,+), (5,9,+), (2,1,-),(6,10,-) 2.6. Complete the proof of the version space representation theorem (Theorem 2.1). Proof: Every member of VSH,D satisfies the right-hand side of expression. Let h be an arbitrary member of VSH,D, then h is consistent with all training examples in D. Assuming h does not satisfy the right-hand side of the expression, it means ? (?s S)?(g G)(g h s) = ? (?s S)?(g G) (g h) (h s). Hence, there does not exist g from G so that g is more general or equ、al to h or there does not exist s from S so that h is more general or equal to s. If the former holds , it leads to an inconsistence according to the definition of G. If the later holds, it 3leads to an inconsistence according to the definition of S. Therefore, h satisfies the right-hand side of the expression. (Notes: since we assume the expression is not fulfilled, this can be only be if S or G is empty, which can only be in the case of any inconsistent training examples, such as noise or the

English course objectives at the stage of basic education include five aspects, that is,students' language skills, language knowledge, emotional attitude, cultural awareness and__________.

A.learning level
B.practical activities
C.learning strategies
D.habits of thinking

答案:C
解析:
考查英语课程目标。基础教育阶段英语课程的目标是“以学生语言技能、语言知识、情感态度、学习策和文化意识的发展为基础.培养学生英语综合语言运用能力”。故C项正确。


To establish the evaluation index system of evaluation of students' all-round development must include__________ .

A.subject learning goals
B.general development goals
C.subject learning goals and general development goals
D.emotional goals

答案:C
解析:
考查学生评价内容。建立评价学生全面发展的评价指标体系必须包括学科学习目标和一般性发展目标。故C正确。


( )is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the abillity to mlGarnr,(i.e.,progressively improve performance on a specific task)with data.Without being explitiy?programmed.

A.Machine learning
B.Program language learning
C.Natural language learning
D.Statistical?learning

答案:A
解析:


The ( ) refers to the integration of complex physical machinery with networked sensors and software. It draws together fields such as machine learning, big data, the Internet of things and machine-to-machine communication to ingest data form machines, analyze it (often in real-time), and use it to adjust operations.

A.Industrial internet
B.factory internert
C.Industrial web
D.business

答案:A
解析:
工业互联网涉及到复杂的由传感器和软件的集成的物理机械。它涉及很多领域,如机器学习,大数据,物联网,以及通过从机器获取数据来进行机器之间交互等方法,分析其数据(通常是实时的),并用它来调整操作。A.工业互联网 B.企业互联网C.工业万维网 D.商务网络


共用题干
第二篇

Credit Card Only Works When Spoken To

A credit card that will not work unless it hears its owner's voice could become an
important weapon in the fight against fraud(欺骗).
The card requires users to give a spoken password that it recognizes using a built-in
voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using
someone else's credit card details to buy goods online.
A model built by engineers at Beepcard in Santa Monica,California,represents the
first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip
into a standard-sized credit card.
They are not quite there yet:the card is the length and width of an ordinary credit card,
but it is still about three times as thick.The company now plans to make it thinner.
The voice card is based on an earlier Beepcard technology designed to prevent fraud in
online transactions.This earlier card has no microphone,but has a built-in loudspeaker
that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an
online server.
By verifying(证实)that the signal matches the card details,the server can establish
that the user is not simply keying in a credit card number but actually has the card to hand.
The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.
This prevents fraudsters recording the beeps, noting the card details and then playing
back the audible ID when they key in the details later.But this earlier technology cannot
prevent fraudulent use of stolen cards.The new one can.
The new voice card also identifies itself by its ID squawk,but it will not do this until it
has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use
the card because even if they knew the password they would have to be able to copy the
owner's voice with a high degree of accuracy.
The challenge for Beepcard has been to develop voice-recognition and audio circuitry
that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximize
battery life,the electronics are only switched on when the card is being used.Pressing a
button on the card's surface prompts it to utter "Say your password" in female voice.If the
voice-recognition software proves that the password is authentic(真实的),it sends its ID
squawk which the server then identifies,allowing the transaction to proceed.

What can we learn from the last paragraph about the voice card?
A:Only female voice passwords could be recognized.
B:Further improvement should be made to extend battery life.
C:There is no!imit to its application.
D:Female customers like to use it.

答案:B
解析:

更多 “机器学习第二章答案2” 相关考题
考题 Online distance learning is an instructional system which connects learners with educational resources.Students work on their own at home,at work,or at school and communicate with faculty and other students by means of e-mail,electronic meetings,videoconferencing,chat rooms,instant messaging and other forms of computer-based communication.There are both advantages and disadvantages to online distance learning. There are many benefits to using online distance learning environments.Online education is available all the time,anywhere and to all people.However,there are weaknesses for some learners.The online learner only has the written text and no other face-to-face hints.This may confuse the learner and cause misunderstanding.While distance learning allows for an openness,it is also difficult because it is done by e-mail messages and writing,and therefore may take more time than face-to-face learning.Sometimes the messages can be overwhelming for many online students. Universities,colleges and schools use online distance learning environments.These are important for students who may be unable to attend classes for various reasons like illnesses or busy everyday schedules.Some learners just want to further their studies at home.They enjoy the convenience of home learning as they take regular programs or enrichment classes. Online courses keep learners very occupied at all hours of the day.There are a great many messages and other online resources to read and respond to.Most learners have regular jobs or attend regular school classes on ground as well.However,the benefits are clear.Online distance learning is becoming very popular.Some online classes have become a profitable business as they replace regular traditional means of learning.One of the good aspects of online distance learning is__.A.speed B.convenience C.easy operation D.variety of instruction答案:B解析:从第三段可知,远程教育的好处是方便。时间、地点可自由选择。

考题 语音识别是机器自动语音识别(Automatic Speech Recognition by Machine)的简称。正确答案:正确

考题 单选题To establish the evaluation index system of evaluation of students’ all-round development must include _____.A subject learning goalsB general development goalsC subject learning goals & general development goalsD emotional goals正确答案:A解析:建立评价学生全面发展的评价指标体系必须包括总体发展目标。

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.What is the problem with the model card?A:It is too large.B:It is too thick.C:It can't be used in online transactions.D:It doesn't have a loudspeaker.答案:B解析:

考题 In order to keep students interested in learning English it is important to include a variety of activities and techniques in the lesson.()正确答案:正确

考题 判断题语音识别是机器自动语音识别(Automatic Speech Recognition by Machine)的简称。A 对B 错正确答案:对解析:暂无解析

考题 Online distance learning is an instructional system which connects learners with educational resources.Students work on their own at home,at work,or at school and communicate with faculty and other students by means of e-mail,electronic meetings,videoconferencing,chat rooms,instant messaging and other forms of computer-based communication.There are both advantages and disadvantages to online distance learning. There are many benefits to using online distance learning environments.Online education is available all the time,anywhere and to all people.However,there are weaknesses for some learners.The online learner only has the written text and no other face-to-face hints.This may confuse the learner and cause misunderstanding.While distance learning allows for an openness,it is also difficult because it is done by e-mail messages and writing,and therefore may take more time than face-to-face learning.Sometimes the messages can be overwhelming for many online students. Universities,colleges and schools use online distance learning environments.These are important for students who may be unable to attend classes for various reasons like illnesses or busy everyday schedules.Some learners just want to further their studies at home.They enjoy the convenience of home learning as they take regular programs or enrichment classes. Online courses keep learners very occupied at all hours of the day.There are a great many messages and other online resources to read and respond to.Most learners have regular jobs or attend regular school classes on ground as well.However,the benefits are clear.Online distance learning is becoming very popular.Some online classes have become a profitable business as they replace regular traditional means of learning.With regular means of learning,the learners have to study__.A.at school B.on their own C.at all hours of the day D.by means of reading and writing答案:A解析:常规教育指的是在学校受教育。其他三个选项都是文中提及的远程教育的形式。

考题 单选题Which of the following is NOT an advantage of distance learning?A The student may choose his or her own pace.B The student may study at any time to his or her convenience.C They can pursue their chosen career while studying.D Their tutorial assistance comes through regular airmail, telephone, facsimile machine, etc.正确答案:D解析:文章提到的优缺点是几种教育方式之间的比较,问题涉及哪个选项的内容不是远程教育的优点。前三个选项,A“学生可以选择自己的进度”,B“学生可以在他(或她)方便的时候学习”,C“在学习的同时还可以追求自己的事业”都是文章中提及的与另两种方式比较的优点。在文章第二段中的一句话“Tutorial assistance may be available via regular airmail, telephone, fax machine, and over the Internet”(辅导可以通过定期的航空邮件、电话、传真以及因特网等方式进行),作者只是提出了一种可能,实际上是弥补远程教育不足的一个建议,并不是远程教育(函授)的优点。因此选项D符合题意。

考题 While attempting to load a base operating system to a machine, an administrator is receiving bootp timeout error messages. What steps should be followed to troubleshoot communications between the NIM master and the client machine?()A、View debug logs on NIM master for errors or failures.B、Boot the client machine to SMS, and view the POST Error log.C、Boot the client machine to SMS, setup remote IPL, and execute a ping test.D、Boot the client machine to diagnostics, and ping the client from the NIM master.正确答案:C

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.The voice credit card is an important invention becauseA:it can be made cost-effectively.B:it can leave voice messages.C:it makes online shopping easy.D:it makes fraud difficult.答案:D解析: