1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
7

What language do the Vikings speak in the game " For Honor"?

Computers and Technology
2 answers:
Otrada [13]3 years ago
4 0

Icelandic but highlander speaks Gaelic

aivan3 [116]3 years ago
3 0
In the game the Vikings speak icelandic
You might be interested in
after installing a secondary hard drive what needs to be done to the hard drive and what do these two task do?
gladu [14]
Keep the first hard drive then override it insert the second one and memory goes into the second one
8 0
3 years ago
____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
elixir [45]

Answer:

The correct answer to the following question will be Vendor Lock-In.

Explanation:

Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.

Some ways to avoid Vendor Lock-In, these are as follows:

  • Design your application portable.
  • Keep watching vendor contracts.
  • Arrange both entry and exit with your vendor.

8 0
3 years ago
Expresa tu reflexión sobre la necesidad de un código de etica para la IA (inteligencia artificial) , oponia sobre los bots en la
JulsSmile [24]

Answer:

Ethics in artificial intelligence and robotics are of greater importance today as machine learning or robots are put to use to benefit humans and also ti harm humans.

Explanation:

Ethics in robotics or artificial intelligence in sometimes referred to as "roboethics". It is very necessary in todays time because robots are made to interact with the society, the humans.

This is the key concern for ethics which is based on growing awareness of the requirement to regulate, the  advancements in the field of AI in the near future. The future law or regulations should be on the basis of some of the shared values such as privacy, freedom, security, respect for human dignity, non - military, inclusions, etc. Here, the uncertainty is also being recognized, the uncertainty to know the advancements of AI in the near future. Therefore the regulations and ethical dilemmas should be rethought in the middle.

4 0
3 years ago
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
Adding transitions to slides in a presentation.
8090 [49]

B.) The addition of slide transitions

4 0
3 years ago
Read 2 more answers
Other questions:
  • When activating windows, which type of volume activation is used to activate multiple windows systems, but must be individually
    12·1 answer
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    8·1 answer
  • You are holding a rock tied to a string, which is an example of a pendulum. identify and explain the proper term for each part o
    10·2 answers
  • Pls help brainliest
    12·1 answer
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
    9·1 answer
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • If you entered data into row 4 and it should be in row 3, you should _____.
    8·2 answers
  • Which shot is not the best for a widescreen image
    11·2 answers
  • Which of these words is used to begin a conditional statement?<br> when<br> input<br> if<br> until
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!