1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
12

In 2011 a program named Watson running on an IBM supercomputer

Computers and Technology
1 answer:
lora16 [44]3 years ago
8 0

Answer:C)Defeated the two most successful human Jeopardy! champions in a three-game match.

Explanation:  Watson emerged from the IBM supercomputer made by Thomas Watson .It is made from the two main component analytical software and the artificial intelligence which made it a optimal for the question-answer feature.

Watson defeated Ken Jennings and Brad Rutter(earlier successful contestants) in the program named Jeopardy by answering questions correctly and quickly in 2011.Other options are incorrect because it did not worked as the software engineer,humane genome or won crossword puzzle.Thus the correct option is option (c).

You might be interested in
An equation that performs a calculation is a formula. True or false quest
Natali5045456 [20]
This is a TRUE statements
6 0
3 years ago
Rounding up and down for 389,422
elena-14-01-66 [18.8K]

Answer:

389420

389430

Explanation:

the up is for 389430

the down is for 389420

4 0
3 years ago
Prominent is another word for stands out. True False
earnstyle [38]
The answer is TRUE.

There you go.
6 0
3 years ago
A ___________ variable is used to add up a set of values. fill in the blank
TEA [102]

Answer:

dependent variable -- As it depends on the other variables, changes when they change

3 0
3 years ago
1.The hardware that allows data to be transmitted from a computer along a telephone line to another computer at the other end is
valkas [14]

So this is called a modem we use it to send  and receive info over telephone lines

Hope this helps

-scav

4 0
3 years ago
Other questions:
  • What's the 16-bit hexadecimal representation of the signed decimal integer, -331? Answeers?
    14·1 answer
  • Are computer virus and human virus the same​
    6·1 answer
  • What are the differences in LAN and WAN and how they are used to Increase Cybersecurity
    7·1 answer
  • When a partition is formatted with a file system and assigned a drive letter it is called a volume?
    10·1 answer
  • why is the disk method a special case of the general slicing​ method? choose the correct answer below. a. the cross sections of
    7·1 answer
  • How are switches indirectly involved in ARP poisoning?
    6·1 answer
  • I will give brainliest!!!
    13·1 answer
  • "True or False? Software designers use layering and other techniques to organize large software systems."
    13·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!