1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
8

To what extent are the following computer systems instances of artificial intelligence: a. Supermarket bar code scanners. b. Web

search engines.
Computers and Technology
1 answer:
Stells [14]3 years ago
5 0

Artificial Intelligence-It talks about the creation and usage  of intelligent machines which can eliminate errors caused by human.In simple words it replaces human intelligence

Explanation:

  • <u>A Supermarket bar code</u> is a set of characters which are encoded in black and white markings ,so that it can be for a machine to scanned via machine or scanner.
  • A Scanner consist of three parts-Lighting system,sensor and decoder.<u>The pulse width of the scanned bars is detected then a simple logic equation is applied to the detected pulse in order to encode the bar code.</u>
  • Thus, no AI technology is being used in Supermarket bar code.
  • <u>In Web Search Engine</u>s-The search engines rely on many algorithms to create search results for search queries.Thus the web search engine rely heavily on artificial intelligence.
  • For example: RankBrain Artificial intelligence technology used by Google search engine.

You might be interested in
Negative numbers are encoded using the __________ technique. a. two’s complement b. floating point c. ASCII d. Unicode
OLEGan [10]

Negative numbers are encoded using the two’s complement technique. Two's complement is used to encode negative numbers.

Option  A is correct .

<h3>What method does the in data type use to store negative numbers?</h3>

Most implementations you're likely to encounter store negative signed integers in a form known as two's complement. Another important way of storing negative signed numbers is called one's complement. The one's complement of an N-bit number x is basically defined as x with all bits inverted.

<h3>What is encoding method?</h3>

An encoding technique is the application of established industry conventions to a coded character set to create a coded character scheme. Such rules determine the number of bits required to store the numeric representation of a given character and its code position in the encoding.

Learn more about two complement technique encoding :

brainly.com/question/26668609

#SPJ4

5 0
1 year ago
What is the database used for
ELEN [110]
Sometimes referred to as database management systems<span>, database software tools are primarily used for storing, modifying, extracting, and searching for information within a database. </span>
7 0
3 years ago
_______ is the type of vision useful in sensing motion and objects outside normal vision.
Likurg_2 [28]

The answer is peripheral vision, also known as side vision.

3 0
3 years ago
Toby wants to gain experience in child development. Toby chooses to enter a month-long certificate program after high school and
Stolb23 [73]

the answer is short term goal

4 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Other questions:
  • The following declaration appears in a program: short totalPay, basePay = 500, bonus = 1000; The following statement appears in
    9·1 answer
  • When using powershell, an administrator can use the ____________ cmdlet to create a new dc in a new forest.??
    14·1 answer
  • before donating a computer you should use a program to wipe the hardest to remove all of his data true or false
    6·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • Hard drives have the largest capacity of any storage device. <br> a. True <br> b. False
    6·2 answers
  • An internal control system is used to do all of the following: (You may select more than one answer. Single click the box with t
    11·1 answer
  • Works for a major manufacturer of computer processors. As a part of Susan's job, she is expected to run a series of diagnostic t
    9·1 answer
  • 1.Two robots start out at 426c cm. apart and drive towards each other. The first robot drives at 5 cm per second and the second
    15·1 answer
  • Is data science the sexiest job in 21st century according to Harvard business review?
    13·1 answer
  • What is the purpose of secondary<br> memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!