1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
9

Três exemplos de inteligência artificial que estao em contato direto com os usuarios

Computers and Technology
1 answer:
Ghella [55]3 years ago
8 0

Answer:

Explanation:

????

You might be interested in
What is a leased line​
scoundrel [369]

Explanation:

A leased line is a dedicated fixed bandwidth data connection. The word leased refers to the connection rented by the internet service provider directly to a business. A leased line needs to be symmetrical, uncontended and point to point

3 0
3 years ago
Read 2 more answers
A customer is experiencing intervals during the day when the file server on her local network cannot keep up with the demands of
levacccp [35]

Answer: Contact the manufacturer and asks for another filter driver device.

Explanation:This issue can occur if a non-Microsoft program installed on your computer uses an outdated kernel-mode filter driver. And it can be that kernel-mode filter driver may be outdated.

3 0
4 years ago
Which of these AWS resources cannot be monitored using VPC Flow logs?a) V​PCb) A​ subnet in a VPCc) A network interface atta
WINSTONCH [101]

Answer:

d) An Internet Gateway attached to VPC.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Amazon Web Services (AWS) is an example of a cloud computing platform that offer its users a global cloud-based products and services such as storage, security, computing resources, database, analytics and management tools etc.

Some of the Amazon Web Services (AWS) resources that can be monitored using virtual private cloud (VPC) Flow logs includes;

I. A VPC

II. A subnet in a VPC

III. A network interface attached to EC2

However, an Internet Gateway attached to VPC is an AWS resource that cannot be monitored using virtual private cloud (VPC) Flow logs.

7 0
3 years ago
12. The best method of protecting the residential user with an Internet connection from intruders out on the Internet is to use
Lyrx [107]

Answer:

Updated OS software patches

Explanation:

Firstly we need to know that patches are those software updates as well as operating system updates that addresses the vulnerabilities In a program or a products security. Software operators may decide to roll out new updates which have the power to fix performance bugs in a program as well as providing more enhanced methods of security.

3 0
3 years ago
A compile-time error occurs because obj1 is declared as type C1 but instantiated as type C2. A compile-time error occurs because
Agata [3.3K]

The code segment doesn't produce the intended output (AB) because "method m1" was not executed since it does not appear in C2.

<h3>What is a method?</h3>

In computer programming, a method can be defined as sets of instruction or a block of executable codes that are used to break down a complex problem into small but manageable fragments.

Thus, methods are typically used by programmers to break down a complex problem into simple, small and manageable fragments. In this scenario, the code segment doesn't produce the intended output (AB) because "method m1" was not executed since it does not appear in C2.

Read more on methods here: brainly.com/question/25619349

6 0
2 years ago
Other questions:
  • PLZ HELP ASAP!!!
    10·1 answer
  • A + B (AC (B +C’) D) = A + BD
    10·2 answers
  • What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over
    7·1 answer
  • Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
    7·1 answer
  • What laws are broken when you hack someone?
    9·1 answer
  • Computer memory uses different numbers of bytes to store different data types.
    7·1 answer
  • By default, Outlook displays messages in the Content pane grouped by the
    13·1 answer
  • Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?
    8·2 answers
  • Please help me with this this is Computer chapter Advanced HTML of class 8th​
    10·1 answer
  • The project team is creating detailed documents to guide the team. What phase of the project life cycle are they in?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!