1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
8

PleassseeeeI need help ASAP thank you!<3

Computers and Technology
1 answer:
OLga [1]3 years ago
6 0
The Maunder Minimum is the name given to a period of extreme solar in activity that occurred. between 1645 and 1710
You might be interested in
H&amp;R Block's stated purpose is: to be the leading global consumer tax company bringing tax and related solutions to clients y
jok3333 [9.3K]

Answer:

The correct answer is D.

Explanation:

In the given example, the task that the artificial intelligence system has to fulfill is to take control of an irregular task that is performed by humans. This requires a solution that depends on neural networks which work by evaluating given data sets and makes sense of them through the provided algorithms. They eventually come to a conclusion recognizing the relationships between the data points so that the system can decide what action to take. This procedure can be implemented to take control of the tax solution task that is performed by accountants.

I hope this answer helps.

5 0
3 years ago
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
4 years ago
Similarities between drawing toolbar and editing toolbar​
topjm [15]

Answer:

dk

Explanation:

3 0
3 years ago
Read 2 more answers
A 3-Tier computing environment is constructed of ....... servers ?
Inessa [10]

Answer:

B. Tow

Explanation:

Application server and database server

6 0
3 years ago
A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
Hatshy [7]
I am pretty sure it’s A
5 0
3 years ago
Other questions:
  • A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
    9·1 answer
  • What does limited access to a document mean?
    12·2 answers
  • Write the DML statement to query the database for the following: Output the fname, lname, total_amount_owed of the student with
    5·1 answer
  • Who is father of computer <br>​
    8·1 answer
  • Even if you cannot afford it you should donate at least 5 of your earnings to charity true or false
    8·1 answer
  • Demonstrate how to write each condition as an if-else in Java. If yes, then the computer should print “The answer is A,” “The an
    6·2 answers
  • What do u think a creative app must have? <br><br> Please answer the question ASAP!!
    5·1 answer
  • What is the best resource to learn python?
    14·2 answers
  • The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cyc
    13·1 answer
  • Explain why analogue to digital conversion is needed when computers are used in monitoring and measuring
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!