1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
3 years ago
9

How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra

ndmaster?
Computers and Technology
1 answer:
Elis [28]3 years ago
5 0
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
You might be interested in
In your own words! Give me an example of Digital Literacy? (50 words
iVinArrow [24]

Answer: See explanation

Explanation:

Digital literacy is when an individual can compose, find, and evaluate, a clear and composed information on digital platforms.

It involves possessing the skills that one need to live, and learn, through the use of digital platforms such as social media, mobile

Example of digits literacy is the use of search engines, understanding how web browser can be used or sending of emails. etc

3 0
2 years ago
Why do we need to update database regularly
sergiy2304 [10]
To protect from attackers gaining access by sitting on a certain configuration too long. 
7 0
3 years ago
Which retouching action is unethical?
e-lub [12.9K]

Answer:

B.) removing the saturation in a photograph intended as a magazine cover page

7 0
2 years ago
Yielding in traffic means
Katen [24]
Yielding means to slow down or stop and let other cars go ahead of u . Hope i helped ya :)
7 0
3 years ago
A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
bija089 [108]

Answer:

Principle of least privilege

Explanation:

The principle of least privilege means the user has only access to that data which is required to complete the task

Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base

So as per the given situation, the first option should be violated

Hence, the same is to be considered

5 0
2 years ago
Other questions:
  • Tiffany is an instructor at a college that is run on student tuition and not state taxes. Which statement best describes her emp
    6·2 answers
  • How to drive more website traffic?
    11·1 answer
  • Game design is iterative. What does this mean?
    9·1 answer
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • Need help ASAP Examples of utilities that make it possible for people to create and share multimedia files include _____. audio
    9·2 answers
  • Choose all items that represent HTML characteristics.
    5·2 answers
  • A college student needs a laptop that can be used while committing on the train and sitting in a lecture
    13·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • Evaluate if the following function is a good candidate to be placed in a library. Why or why not?
    10·2 answers
  • Arrange these steps of creating a presentation in the correct order. (notice that the given order is incorrect other than the ba
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!