Answer:
.N. Generación & Descripción
1
Primera Generación
El período de primera generación: 1946-1959. Base del tubo de vacío.
2
Segunda Generación
El período de la segunda generación: 1959-1965. Base del Transistor
3
Tercera generación
El período de tercera generación: 1965-1971. Circuito integrado de base.
4
Cuarta Generación
El período de cuarta generación: 1971-1980. Base del Microprocesador VLSI.
5
Quinta Generación
El período de la quinta generación: 1980 en adelante. Base del Microprocesador ULSI.
Explanation:
espero y esto te sirva de algo
Answer:
Succeed and show traction within 6-10 months.
Explanation:
Ai (Artificial Inteliigence), also known as machine intelligence, is a branch of computer science that is specialized in making smart machines that are capable of doing human tasks
AI Transformation Playbook is a guide to use AI in enterprises successfully, written by Co-founder of Google Brain, Andrew Ng. In his guide, he unveiled the steps that can be followed to successfully installing AI in enterprises, companies, etc.
The most important trait of the first pilot projects is that it succeeds and begins to show traction within 6-10 months.
In his guide, he summarised five steps to install AI in enterprises. The first step is to 'Execute pilot projects to gain momentum.'
The most important trait of beginning with AI projects is that it succeeds first before being most valuable projects. The success is important as it will help to achieve familiarity and will help other people of the company to invest in this project more.
This success begins to show tractions within 6-12 months of its success.
Answer:
Spyware
Explanation:
Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.
Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.
Bot: this is a software application that runs automated tasks. So, it is not the correct option.
Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.
Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.
Answer:
Logic
Explanation: Should be right, someone else got it right.