1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
7

How neural networks impact our life??

Computers and Technology
1 answer:
Helen [10]3 years ago
5 0

Here are a few examples of ways neural networks are currently used by different industries:

Finance: Neural nets are used to predict currency exchange rates. They are also used in the technology behind automatic trading systems used in the stock market.

Medicine: The image processing capabilities of neural nets have contributed to technology that helps more accurately screen for and detect early-stage and difficult to identify types of cancers. One such type of cancer is invasive melanoma, the most serious and deadly form of skin cancer. Identifying melanoma at earlier stages, before it has spread, gives patients with this type of cancer the best chances to beat it.

Weather: The ability to detect atmospheric changes that indicate a potentially serious and dangerous weather event as quickly and accurately as possible is essential for saving lives. Neural nets are involved in the real-time processing of satellite and radar images that not only detect early formation of hurricanes and cyclones but also detect sudden changes in wind speed and direction that indicate a forming tornado. Tornadoes are some of the strongest and most dangerous weather events on record—often more sudden, destructive, and deadly than hurricanes.

You might be interested in
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Write a Java program to accept an item's name and price from the user and output them to the console
Anit [1.1K]

Answer:

// program in java.

// package

import java.util.*;

// class definition

class Main

{// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read inputs

Scanner scr=new Scanner(System.in);

 // variables

String name;

   double price;

   System.out.print("Enter item's name: ");

   // read item's name

   name = scr.next();

   System.out.print("Enter item's price: ");

   // read item's price

   price= scr.nextDouble();

   // print name

   System.out.println("name of item is:"+name);

   // print price

   System.out.println("price of item is:"+price);

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read name & price of item from user and assign it to variables "name" & "price" respectively with scanner object.Then print the name and price of item .

Output:

Enter item's name: Apple                                                                                                  

Enter item's price: 100                                                                                                    

name of item is:Apple                                                                                                      

price of item is:100.0

6 0
3 years ago
A major advantage of a method is that it is easily reusable. What does it mean to reuse a method and what are the advantages of
JulijaS [17]

Answer: To reuse a method means to use a code which has been done or prepared already and just we need to change some of the functionalities.

This helps a great deal of saving time as well as helps in making the code manageable.

Explanation:

This has been practiced since long that methods can be reused. for example we need to build a calculator in c. then we can simply reuse the same method  just we need to change the sign of the operator. So in this process we can speed up our operations and work and also can make the code easy to understand and manage it when we have have to deal with large lines of code.

8 0
3 years ago
Complete the sentence. Assigning a data value to a variable in a program is referred to as______.
luda_lava [24]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is initialization.

When you write a variable in a program,  for example int firstNumber. The integer variable firstNumber is declaring in the program.

when you assign a data value to a variable in a program is referred to as initialization. for example:

firstNumber=10;

You can declare and initialize the variable in one statement such as:

int firstNumber=10;

6 0
3 years ago
HELP PLEASE GIVING BRAINLIEST
Phoenix [80]

Answer:

CompTIA A+ there ya go!!!

5 0
3 years ago
Read 2 more answers
Other questions:
  • Why would a brokered CD pay more than a regular CD?
    13·1 answer
  • If a company's IS-related programs are not developed in-house, then the development group of the IS department will be staffed p
    6·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ____
    12·1 answer
  • Is it better to meet online or offline<br> (Please answer QUICK)<br><br> Thanks :')
    5·2 answers
  • Which page in a web site do viewers usually see first?
    15·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. true or false.
    9·2 answers
  • Pleeeese help me for these questions
    8·1 answer
  • Q.drtrdyudoijoemrkdf
    6·2 answers
  • What is output?
    10·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!