1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
4 years ago
12

Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning

to create a variety of ads that will be displayed across networks. Which of Tom's resources are needed to accomplish his aims as part of his Smart Shopping campaign?
Computers and Technology
1 answer:
borishaifa [10]4 years ago
3 0

Answer:

Account product feed and uploaded assets

Explanation:

Account product feed and uploaded assets are needed to accomplish Tom’s aims of creating ads automatically and simplify campaign management as part of his Smart Shopping campaign. With Smart Shopping campaigns, Tom’s existing product feed and assets are combined with Google’s machine learning to show a variety of ads across networks.

You might be interested in
. Briefly describe an SQL DML statement for changing existing data in a table.
bearhunter [10]

Answer:

The Update statement in the DML is used for changing existing data in a table.

Explanation:

Their are following Sql statement in the DML.

Insert

This SQL statement is used for inserting data into the table.

select

This SQL statement is used for retrieving data from database  

update

This SQL statement is used for updating data in a table.

delete

This SQL statement is used for delete data from database .

The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .

Following are the syntax of Update SQL query

Update tablename

set column1=value1,column2=value2............column N=valueN

Where condition;

Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105

Then we use update query like that

UPDATE STUDENT

SET add='kalam nagar'

where rollno=105;

8 0
3 years ago
Which tool is often used by devops to facilitate the development, testing, and deployment of new software?.
ella [17]

The Jenkins tool is often used by DevOps to facilitate the development, testing, and deployment of new software.

<h3>What is software development?</h3>

The practice of conceptualizing, planning, designing, coding, documenting, testing, and bug-fixing that went into building and maintaining applications, platforms, or other software modules is known as software creation.

Jenkins is a Java-based continuous integration/continuous delivery and deployment system that is free and open-source.

Thus, the Jenkins tool is often used by DevOps to facilitate the development, testing, and deployment of new software.

Learn more about software development here:

brainly.com/question/3188992

#SPJ4

3 0
2 years ago
Which are examples of hardware? Select 3 options.
umka21 [38]

Answer: OS(Operating System), CPU, And The Program That you use to view email

6 0
3 years ago
Read 2 more answers
What are the paragraph different formatting paragraph tools?draw its icon and state its function.
aliya0001 [1]

Theres Tab, And File


:)

7 0
3 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
Other questions:
  • A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
    7·1 answer
  • Which of these is the most likely result if the internet download speed in your home is 25 Mbps?
    14·1 answer
  • A descriptive study represents the highest level on the knowledge-level continuum.
    11·1 answer
  • Please create C program, the task is to implement a function edoublepowerx that has an input parameter x of floating-point value
    11·1 answer
  • The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the databas
    14·1 answer
  • Explain the term information security?​
    9·1 answer
  • If the fluid level in a battery is below the separators<br> should be added but never add
    5·1 answer
  • What is an automatic update and when should you use it
    10·1 answer
  • What critical-thinking tool is being used when asking the question, "Is there a large enough scope of
    10·1 answer
  • Which language should you use to add functionality to web pages.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!