1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
2 years ago
12

Explain approaches of AI​

Computers and Technology
2 answers:
Readme [11.4K]2 years ago
7 0

Answer:

Main AI Approaches

There are three related concepts that have been frequently used in recent years: AI, machine learning, and deep learning.

Umnica [9.8K]2 years ago
5 0
A-artificial I-intelligent
You might be interested in
The system tray contains _____.
xeze [42]

Answer:

the system tray is located in the Windows Taskbar (usually at the bottom next to the clock) and contains miniature icons for easy access to system functions such as fax, printer, modem, volume, and more. Double click or right click on an icon to view and access the details and controls.

Explanation: in window 95

7 0
3 years ago
Read 2 more answers
Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
Kruka [31]
D. each table must depend on the entire foreing key
4 0
1 year ago
Can somebody help me with this plzzz, I watched the video but I don’t got it :’(
krek1111 [17]

Answer:

n,

Explanation:

4 0
2 years ago
Read 2 more answers
How many Packs of cigarettes in one carton? 6, 8, 10, 12 ?
Gnesinka [82]
There are 8packs of 25, or 10 packs of 20 depending on the brand.... both adding up to 200 cigarettes total.

6 0
2 years ago
"someone has tampered with your computer and erased data". what kind of computer threat is this
pishuonlain [190]
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
4 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • Which is the correct process for adding page numbers to a spreadsheet you will print? A. Click Page Break Preview. Type the page
    7·1 answer
  • Consider the classes below, declared in the same file: class A { int a; public A() { ​ a = 7; } } class B extends A { int b; pub
    6·1 answer
  • How does applying Fontworks effects to text on an advertising flyer change the text?
    8·1 answer
  • Need help ASAP Examples of utilities that make it possible for people to create and share multimedia files include _____. audio
    9·2 answers
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • Want to.learn about computers​
    9·1 answer
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • Current flow is the same through all the elements of a series circuit.<br><br> true or false?
    15·1 answer
  • During the maintenance phase of the sdlc, the team must _____ if a system's objectives are not being met
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!