1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
14

A(n) ______ network is a system that attempts to imitate the behavior of the human brain. Group of answer choices advanced neura

l intelligent cerebral
Computers and Technology
1 answer:
larisa [96]3 years ago
6 0

Answer:

Neural Networks

Explanation:

Neural networks are networks that mimic the behaviour of the human brain in which they tend to perform a task without been programmed with the task rule, although the neural network are artificial in nature and they often recognize patterns.

Neutral network have cell that enable them to carry out task together in order to produce a desired result and the cell can only solve a little part of tasks.

You might be interested in
Which way do you swipe in ios to get to the control center
Korvikt [17]

Answer:

Swipe down in the right corner or for older versions swipe from bottom

Explanation:

6 0
2 years ago
Estoy haciendo codificación en este momento es tan confuso y no estar en la escuela es más difícil
Katarina [22]

Answer:

Misma

Explanation:

6 0
3 years ago
Read 2 more answers
Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she instal
melamori03 [73]

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

<h3>What are some ways to handle against email phishing attacks?</h3>

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

  • Be on guard towards the  handing of sensitive information.
  • Never click on alarming messages.
  • Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

brainly.com/question/2537406

8 0
2 years ago
Your license can be canceled if you __________
Elena L [17]
Its B i think hope this helps ! 
8 0
3 years ago
Read 2 more answers
The way a particular application views the data from the database that the application uses is a.
masha68 [24]

The way a particular application views the data from the database that the application uses is a sub-schema.

<h3>What is Database?</h3>

A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.

The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.

Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.

To learn more about Database, refer to the link:

brainly.com/question/26096799

#SPJ4

4 0
2 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • If you enjoy working with livestock, the best cluster in which to research careers would be: A. Health Science. B. Agriculture,
    11·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    10·2 answers
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • Information is best described as
    10·1 answer
  • State differences between title bar and menu bar​
    5·1 answer
  • Help pweaseee!! Lloyd has created a validation script for a data entry form. What property should he use to test for a selected
    10·1 answer
  • 1. What is hydrolics?​
    6·1 answer
  • Which steps of the management science process can either be a recommended decision or information that helps a manager a decisio
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!