1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
2 years ago
9

Inteligencia Artificial

Computers and Technology
1 answer:
ludmilkaskok [199]2 years ago
7 0

Answer:

The term "Artificial Intelligence" refers to the simulation of human intelligence processes by machines, especially computer systems

Explanation:

~♥~

You might be interested in
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
4 years ago
How do you implement instruction level parallelism
netineya [11]

Answer:

To obtain substantial performance enhancements, we must exploit ILP across multiple basic blocks.

Explanation:

8 0
3 years ago
Most switches enable you to use multiple nics for a single machine, a process called __________ or link aggregation.
scZoUnD [109]
Bonding.



Good luck! (:
5 0
3 years ago
Which of the following galaxy types is most likely to be clearly identifiable, regardless of orientation? SBc
Reil [10]

Answer:

The most likely galaxy type to be identifiable regardless of orientation is: Irr

Explanation:

The Irr galaxies don't have a discernable or usual shape; that is why it is relatively easy to identify.

When we talk about E type galaxies, this statement proves itself by the way the cumulus of stars compounds the galaxy. The elliptical galaxies have the form of ellipses, with a reasonable distribution of stars. The degree of eccentricity is the number that complements the E letter; that's why E0 galaxies are almost spherical, while E7 is considerably elongated.

SBc, SBa galaxies are spiral; this means it can be flat in some angles difficulting their identification process; in this case, the last letter means the way the arms display their form, with "c" having a vague form and "a" well-defined arms. That's why in some angles can be mistreated as another type of galaxy.

3 0
3 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
Other questions:
  • HELP ME RIGHT NOW !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • How can earn more answer from brainly less than two minutes, please
    9·1 answer
  • The transitions between slides in a presentation are one type of powerpoint ____.
    6·1 answer
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • How many data bits are sent in a single psk31 character?
    15·1 answer
  • Which of the following problems is least likely to be solved through grid computing? Financial risk modeling Gene analysis Linea
    14·1 answer
  • What does running the “sudo” command do?
    6·1 answer
  • Este tipo de software sirve para controlar e interactuar con el sistema operativo, proporcionando control sobre el hardware y da
    11·1 answer
  • In GD, what does RWR stands for?
    9·1 answer
  • Jobs that use math and science to solve problems involving the design and development of technologies can be found in the what c
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!