1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexus [3.1K]
3 years ago
11

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines th

at can simulate human intelligence processes including learning, reasoning, and self-correction.
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
6 0

Answer:

artificial intelligence system

Explanation:

Artificial intelligence system can be defined as the People, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can stimulate human intelligence processes, including learning, reasoning, and self-correction.

An Artificial intelligence system is modelled to reason just the same way a man reasons, hence the term Artificial intelligence.

It's examples are, Smart assistants,(like Siri and Alexa), Disease mapping and prediction tools, prediction tools and manufacturing tools, etc.

These machines adopt human intelligence to carry out human-like tasks.

You might be interested in
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
yarga [219]

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

7 0
3 years ago
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
Katyanochek1 [597]

Answer:

Option C i.e., Hub.

Explanation:

When network technician helps the support team with processing a few of the data. The support team needs to occupy both congestion between the router and the core switch over an individual subnet. To use it, the members must make sure there's only an individual collision as well as they broadcast IP address between both the router and the switch through which the congestion is received.

So, the technician installs the Hub to meet the following goal because It captures all the traffic on an individual subnet between them.

4 0
3 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
3 years ago
Over the past year alone, more than _________ have been stolen from Target.
jasenka [17]
40 million (google said so)
6 0
3 years ago
Read 2 more answers
Which option can be used to access more settings than are available in the Backstage view?
Bumek [7]

Answer:

orientation settings

Explanation:

so u can now more about whta u doing

6 0
3 years ago
Other questions:
  • Demonstrate your grasp of the Unix file system by constructing a directory structure as follows: In your home ( ~ ) directory, c
    11·1 answer
  • In this story, the reader is strongly encouraged to believe that Skidmore is guilty of poisoning his brother Manchester. Explain
    6·1 answer
  • Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t
    14·1 answer
  • Which windows tools would you use to browse the files system on a hard drive?
    6·2 answers
  • Rate is how fast a screen updates the information being displayed.
    6·2 answers
  • The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
    7·1 answer
  • Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
    15·1 answer
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
  • To delete unnecessary files on a hard disk use software
    5·2 answers
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!