1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
7

How neural networks impact our life??

Computers and Technology
1 answer:
Helen [10]3 years ago
5 0

Here are a few examples of ways neural networks are currently used by different industries:

Finance: Neural nets are used to predict currency exchange rates. They are also used in the technology behind automatic trading systems used in the stock market.

Medicine: The image processing capabilities of neural nets have contributed to technology that helps more accurately screen for and detect early-stage and difficult to identify types of cancers. One such type of cancer is invasive melanoma, the most serious and deadly form of skin cancer. Identifying melanoma at earlier stages, before it has spread, gives patients with this type of cancer the best chances to beat it.

Weather: The ability to detect atmospheric changes that indicate a potentially serious and dangerous weather event as quickly and accurately as possible is essential for saving lives. Neural nets are involved in the real-time processing of satellite and radar images that not only detect early formation of hurricanes and cyclones but also detect sudden changes in wind speed and direction that indicate a forming tornado. Tornadoes are some of the strongest and most dangerous weather events on record—often more sudden, destructive, and deadly than hurricanes.

You might be interested in
Jim is a forensic specialist. He seized a suspect computer from a crime scene, removed the hard drive and bagged it, documented
Andreyy89

Answer: Jim left the computer unattended while shopping for supplies to be used at the next crime scene.

Explanation: While transporting the evidence to a secure location (lab), he left the computer unattended in his car and goes shopping for supplies that will be used in his next crime scenes. This act will give the criminals or their accomplice the opportunity to break into his car and tamper with what ever evidence he might have left behind in his car.

7 0
3 years ago
What must you do to enable the members of the rome backup group to perform backup operations on the local system?
steposvetlana [31]
Add Rome Backup group to a membership list of a group that already has access to perform backup operations on the local system. Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions here.
5 0
3 years ago
Which type of communication protocol converts data into standard formats that can be used by applications?
larisa86 [58]
<span>Arrival protocols are the type of data protocols that convert data into standard formats that can be used by applications, such as email, Web browsers and Skype</span>
8 0
3 years ago
What is the difference between operating systems and application software?
Oliga [24]
The operating system is what allows the user to interact with the computer's hardware. It has basic services such as accepting commands from the user, managing, loading, and executing programs, and managing hardware resources. Some examples of operating systems are Windows, Linux, Mac OSX, and IOS.

Application software are pieces of software that perform specific tasks such as word processors.
5 0
3 years ago
Don't click on this I am testing
Andrew [12]

Don't click on this I am testing... I want the points so.

3 0
3 years ago
Read 2 more answers
Other questions:
  • If it can be applied, the least-damaging recovery option is ________.
    10·1 answer
  • You can use predesigned, formatted files called _____ to create new worksheets quickly.
    13·1 answer
  • Tom is very curious as to whether terrorism is truly linked to levels of religiosity around the world. As such, he gathers data
    15·1 answer
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • A new product was introduced in 2003, which functions as both an identification device and a medium of communication. It uses in
    8·1 answer
  • Which is slower RAM or the CPU?
    11·2 answers
  • In "When Is a Planet Not a Planet?" why does the author say that the outer planets are made of gas when the inner planets are ma
    5·1 answer
  • Why do agriculture and natural resource systems vary from state to state?
    8·1 answer
  • Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creatin
    5·1 answer
  • As you are discussing marketing with a client, you try to explain how individuals find sites. Which tool will you explain as the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!