1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
3 years ago
5

When you see an ad on social media that relates to your profile or something

Computers and Technology
2 answers:
Butoxors [25]3 years ago
6 0

Answer:

C. Social Media Stalkers

Explanation:

I majored in Computer & Technology

sesenic [268]3 years ago
5 0

Answer:

Tritium BF

Explanation:

You might be interested in
How many bit make a byte .​
Sauron [17]

Answer:

It is easy .8 bits.You have to note this

7 0
3 years ago
Read 2 more answers
A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. Th
Sphinxa [80]

Answer: Machine learning

Explanation:

The technology that could be combined with the current solution to do this is the machine learning.

Machine learning refers to the use and development of the computer systems which can learn and adapt without them following explicit instructions. This is done through the use of statistical models and algorithms in order to analyse inferences from the patterns in data.

Since the bank wants to streamline their operations for the receiving and processing checks while also enhancing the solution to recognize signs of potential check fraud, then the machine learning can be used.

3 0
3 years ago
Consider the following code snippet: int count = 0; int[][] numarray = new int[2][3]; for (int i = 0; i < 3; i++) { for (int
inna [77]
I have never seen this in my life sorry
7 0
3 years ago
Select the correct answer.
goblinko [34]

Answer:

b

Explanation:

8 0
3 years ago
Can You do this to help me plz 50 points
MakcuM [25]
The doc is blank but thanks for the points!!
6 0
3 years ago
Read 2 more answers
Other questions:
  • What do computer viruses eat for snacks?
    7·2 answers
  • __________ has become a widely accepted evaluation standard for training and education related to the security of information sy
    5·1 answer
  • What happens if the ratio of cache hit is more than cache miss in a system?
    9·1 answer
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • Given input of a number, display that number of spaces followed by an asterisk. (1 point) Write your solution within the existin
    15·1 answer
  • Pop3 allows users to fetch and download e-mails from a remote mailbox. does this mean that the internal format of the mailboxes
    14·1 answer
  • Write an algorithm to sum all numbers between 0 and 1000 that are divisible by ,7​
    8·1 answer
  • Nd the errors in the following sentences. Underline with a red colour for
    9·1 answer
  • 15. It is the process of capturing data or translating information to recording format
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!