1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
5

Which of the following technologies allows computer systems to make predictions and decisions based off large amounts of data se

ts through a process called machine learning? facial recognition robotics drones artificial intelligence
Computers and Technology
1 answer:
____ [38]3 years ago
6 0

The technologies allows computer systems to make predictions and decisions based off large amounts of data sets through a process called machine learning is ARTIFICIAL INTELLIGENCE.

Explanation:

  • Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans.
  • Some of the activities computers with artificial intelligence are designed for include ; Speech recognition. Learning. Planning
  • Specific applications of AI include expert systems, natural language processing (NLP), speech recognition and machine vision.
  • Predictive modeling is a form of artificial intelligence that uses data mining and probability to forecast or estimate more granular, specific outcomes. For example, predictive modeling could help identify customers who are likely to purchase our new One AI software over the next 90 days.
  • Predictive analytics is making assumptions and testing based on past data to predict future what/ifs. AI machine learning analyzes data, makes assumptions, learns and provides predictions at a scale and depth of detail impossible for individual human analysts.

You might be interested in
A computer connected to the internet that asks for data is a ________. aggregator surrogate server client
Tems11 [23]
The answer to this question would be client.

Client is the computer that most people use. When you browsing a web using the internet, your computer will ask for data from the web server and the data will be arranged into graphical picture or words what you see on your monitor. Server is the computer that gives data the client ask for.
3 0
3 years ago
Which of the following is the 1's complement of 10?
OverLord2011 [107]
Flip 10 and you get 01 then you add 1 to it:
1
01
+ 1
-----
1 1

So, C. 11
6 0
3 years ago
Read 2 more answers
1. Select two forms of case designed suitable for ATX power supply and
jekas [21]
The answer should be c
4 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
What is the first computer company​
katovenus [111]

Answer:

Electronic controls company founded in 1949

3 0
3 years ago
Read 2 more answers
Other questions:
  • When data are normalized, attributes in the table depend only on the secondary key?
    5·1 answer
  • One suggested means of gaining eye contact before reversing is to:____.
    12·1 answer
  • 2. Write a program with a function that accepts a string as an argument and returns a copy of the string with the first characte
    11·1 answer
  • In MMF2, what does the * symbol mean?
    5·1 answer
  • Does trend in computing important for organization management?​
    8·1 answer
  • Mathematics and modern technology​
    14·1 answer
  • How do i delete peoples comments
    14·2 answers
  • You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
    14·1 answer
  • What purpose does encryption on the internet serve? Why is it so important?
    14·1 answer
  • Data becomes _____ when it is presented in a context so that it can answer a question or support decision makin
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!