1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
5

____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various

mathematical models, and comparing the mutated models to search for a best alternative.
A. Expert systems
B. Ad hoc reporting tools
C. Iterative mutations
D. Sampled alliterations
E. Genetic algorithms
Computers and Technology
1 answer:
gregori [183]3 years ago
6 0

Answer:

E. Genetic algorithms

Explanation:

In Computer science, Genetic algorithms are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a best alternative.

You might be interested in
What is the most significant result based on the development of windmills and water wheels?
daser333 [38]
Power both wind mills and water wheels produced power which was used for textile factories ect
6 0
3 years ago
A typeface, plus any special attributes applied to the text is called ________.
grandymaker [24]

Answer:

I would like to say font but not sure

3 0
3 years ago
Read 2 more answers
Do the police check your mobile device during police checks?
JulsSmile [24]

They cannot legally check it without a warrant.


Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.


If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.

4 0
3 years ago
Here it is crews my profile pic
Murrr4er [49]
It looks niceee
Also can you mark me brainlyest for extra points
7 0
3 years ago
Read 2 more answers
System design is the determination of the overall system architecture-consisting of a set of physical processing components, ___
Alenkinab [10]

Answer:

C) Hardware, Software, People

Explanation:

System design is the determination of the overall system architecture-consisting of a set of physical processing components, Hardware, Software, People and the communication among them-that will satisfy the system’s essential requirements.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Graphic designers sometimes must adjust the spacing between letters so that the result looks right to them. This is called
    12·1 answer
  • How does modularity provide flexibility in a structured programming design?
    6·1 answer
  • WHAT 1 + 1 ???? ???????????????????
    15·2 answers
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • Is a bottle opener considered an engineered item?
    12·1 answer
  • What type of display allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message,
    10·1 answer
  • A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
    12·1 answer
  • Hmm what should i do with this information
    14·2 answers
  • What happens when the electrons flowing through the light bulb change direction?
    11·1 answer
  • Where are 'if' and 'else' statements shown when printing a document in a word processor?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!