1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
3 years ago
7

What does “human-like” mean when we are talking about a machine?

Computers and Technology
1 answer:
pav-90 [236]3 years ago
8 0
When talking about a machine and describing it as “human-like” it is suggesting that it had human like characteristics for the inanimate object.
You might be interested in
A public Wi-Fi risk that can be minimized by only visiting
lord [1]

Answer

it is B

Explanation:

because i had the test and i picked that

6 0
3 years ago
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
What policy definition can help remind employees in the User Domain about what constitutes suitable use and improper use of corp
Helga [31]

Answer:

so so sorry I don't know

Explanation:

hope fully you'll get the answer

4 0
3 years ago
Which strategy should individuals working in a diverse workplace adopt?
yawa3891 [41]
B.Interact more with people from different backgrounds. this is correct because that would help people get to know each other better.

Hope this helps:)
4 0
3 years ago
Read 2 more answers
A programming language is used to tell a computer what to do to solve a problem?
goldfiish [28.3K]
As far as humans are concerned. What's written in the programming language needs to interpreted or compiled into something that the machine can actually deal with.
5 0
3 years ago
Other questions:
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • If your vehicle catches fire while you are driving, you should:
    5·2 answers
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • Assume that LO and HI have already been assigned as constants with LO < HI, and x has been declared as DWORD in the data segm
    7·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • Communications that take the form of electronic junk mail or unsolicited e-mail are referred to as
    13·2 answers
  • Is it safe to tape down cords such as internet cables to the floor?
    14·1 answer
  • 22. A<br> allows one computer to input data into another computer.
    6·1 answer
  • What kind of skill is persuasion?
    7·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!