1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
2 years ago
13

What is a system that uses computerized advisory programs to imitate the reasoning processes of experts in solving difficult pro

blems?
Computers and Technology
1 answer:
algol132 years ago
6 0

Answer:

Expert systems

Explanation:

Experts systems are known as computerized advisory programs that are used for the imitation of expert's reasoning processes when solving problems that pose a difficulty. They are usually a knowledge base that have several accumulated experience and certain rules that are used in the application of the knowledge according to the specific situation.

You might be interested in
Select all the correct answers.
TEA [102]

Answer:

comlleting novice-level certifications working on one

4 0
2 years ago
The next four octal numbers after 36 is:________.
Papessa [141]

Answer: b. 37, 40, 41, 42

Explanation:

The next four octal numbers after 36 is 37, 40, 41, 42.

The octal numeral system, which is also referred to as "oct" for short, is simply base-8 number system.

It is a number system whereby only digits from 0 to 7 are used and there are no letters or numbers that are above 8 that are used.

In this case, after 36, the next number will be 37 after which we go to 40 as we can't write 38 in the octal system. Therefore, the next four octal numbers after 36 is 37, 40, 41, 42.

7 0
3 years ago
What are the advantages of using variables in a data type?
mixas84 [53]

Answer:

A variable is a name associated with a data value; we say that the variable "stores" or "contains" the value. Variables allow us to store and manipulate data in our programs.

5 0
3 years ago
Which smb share option should you enable if you don't want users to see files they don't have at least read permission to?
BigorU [14]
Enable all of them. have a nice day


5 0
3 years ago
_______ is a variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.
Zanzabum
It's voice phishing but it's also sometimes referred to as vishing 
4 0
2 years ago
Other questions:
  • Which factor did not contribute to the increase of leisure travel in the early twentieth century in the United States?
    7·2 answers
  • Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o
    11·1 answer
  • The CSS property of top , bottom , left , or right moves the element the specified distance from the respective edge of the clos
    7·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • Modern Computers compared to earlier computers are
    10·1 answer
  • Which requires large computer memory?
    15·1 answer
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    8·1 answer
  • How does 5G technology enhance the Internet of Things (IoT)?
    9·1 answer
  • What should a pie chart represent?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!