The correct answer to the question is Option D (<span>social involvement in technology innovation). It has been said that there are three points at which there must be some social involvement in </span><span>technological innovation:
1. So</span><span>cial need
2. Social resources
3. A sympathetic social ethos
If there is a default in any of these three factors, it is unlikely that a </span>technological innovation will be widely adopted or successful.
TensorFlow and Pytorch are examples of Supervised Machine Learning (ML), in addition, both support Artificial Neural Network (ANN) models.
<h3>What is a Supervised Machine Learning?</h3>
Machine learning (ML) is a subcategory of artificial intelligence that refers to the process by which computers develop pattern recognition or the ability to continually learn or make predictions based on data, and then make adjustments without being specifically programmed to do so.
In the supervised machine learning, the computer is given a labeled dataset that allows it to learn how a human does a task. This is the least complex model as it attempts to replicate human learning.
see more about computing at: brainly.com/question/2175764
#SPJ1
Is there a picture you can attach because some computers are different
Answer:
Demarcation point
Explanation:
There is point that is set by engineers for the entrance of the cables to provide different services such as Telephone, internet and other utilities. At this point a device has been installed, in which service provider and end users plugin their cables.
Service providers is responsible for any service degradation till this point. After this point user is responsible for any damage. This point is called Demarcation point
.
Answer:
The answer is "Option c".
Explanation:
Cryptography is a process, in which by using code we encrypt information and communication to be read and processed by only those expected, and the explanation of given option, that were not correct can be described as follows:
- In option a, It is a process that encrypts data within the file, that's why it is not correct.
- In option b, It is used for text encryption, that's why it is not correct.
- In option d, It is a protocol which uses keys for encryption, that's why it is not correct.