1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
4 years ago
14

Convert 11/10 to Decimal​

Computers and Technology
1 answer:
kherson [118]4 years ago
3 0
1.1 is the decimal.....
You might be interested in
What does ascii stand for?
tamaranim1 [39]
ASCII—American Standard Code for Information Interchange
7 0
3 years ago
Read 2 more answers
What is an example of value created through the use of Deep Learning?
Leya [2.2K]

Answer:

B. reducing multi-language communication friction in a company through automatic language translation.

Explanation:

Deep learning is a branch of artifical intelligence whereby computer systems are programmed to operate in such a way they imitates tbe functioning of the human brain. Hence, emplyins network of neurons structures to learn, gain insight and make predictions. Using layers of network architectures, deep learning in predictive, including facial recognition, virtual assistants, language translation and many more. Deep learning is able to create value not by abrogating humans from the work fold but by enhancing and bridging the gap in areas which need the leverage of technology such as language translation as it enables individuals with different language prowee to be able to communicate through automatic translation.

5 0
3 years ago
When a new user visits your proprietary site, what is typically the first method of interaction with them
Olin [163]

Answer:

Log file entry notifying you of new user activity

Explanation:

Log files are records of the timeline of activities in a computer system. These files contain information about new users of a site as well as the activities they performed on the site.

The internet protocol address of the visitor, the time of visit, as well as the features clicked on, or accessed by him, example, videos or images are all registered in the log file. The owner of the site can use the information sourced from the log files to perform site analytics.

5 0
3 years ago
Which of these is one of the primary concerns for protecting your family when online?
stepan [7]
<span>A. Sharing personal information </span>
5 0
3 years ago
Read 2 more answers
During your lifetime, you will produce enough saliva to fill two swimming pools ‍♀️
dedylja [7]

Answer:

Yep, it’s weird tho lol how do we make so much while we’re alive

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • What do file extensions tell you about a particular file? Why can a file have only one type of file extension?
    12·1 answer
  • Dialogue is not a characteristic of functional text because
    9·1 answer
  • Which of the following technologies uses the results of a scientific discovery?
    10·2 answers
  • For businesses and organizations under recent compliance laws, data classification standards typically include private, confiden
    11·1 answer
  • Climax Medical Technology, a fast-growing global research firm, has accumulated so much client information that conventional dat
    15·1 answer
  • What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB
    11·1 answer
  • Write a c++ program which has array in fifteen element sort the array by selection the search for in element using binary search
    14·1 answer
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
  • When documenting one author in reference in a text, which is correct?.
    7·1 answer
  • Graph the functions 8n, 4nlogn, 2n
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!