1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
10

What is Machine Learning (ML)?​

Computers and Technology
1 answer:
Mademuasel [1]3 years ago
4 0

Answer:

its where you learn about machines

You might be interested in
Which of the following is NOT a characteristic developed by New Journalism?
balu736 [363]

Explanation:

I think it's d.

Hope this help

7 0
3 years ago
Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
chubhunter [2.5K]
It would cause us to deplete the oceans fish population faster and it would be harder to repopulate the rapidly declining population leading to eventual extinction of fish species
8 0
3 years ago
Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
monitta

Answer:

Page view and outline view available in "View" Tab.

Explanation:

<u>Page View:</u>

<u>There are four types of page views available in word.</u>

<u>1. Normal: </u>(Useful  when we need to write more text in word)

<u>2. Web layout: </u>(Use only when we are creating a website)

<u>3. Print layout: </u>(It is used to show the left, right, top and bottom margin for printing)

<u>4. Outline View:</u> (Used to make outline of whole document)

5 0
4 years ago
is a virtue by which you need to secure information by limiting computer access to authorized personnel only.
Eva8 [605]

Answer:

ummmmmmmmm

Explanation:

Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.

Keeping confidential data is crucial especially if your business deals with very important information about a person and his security.

Trust is built between a company and a client. The client trusts the company to keep his information secure and confidential from outside parties. Once the confidentiality of the company is compromised, the business will suffer because clients will no longer trust the company to keep their data secure.

7 0
2 years ago
List at least three kinds of harms that a company could encounter from lost of service, that is, failure of availability. List t
WINSTONCH [101]

Answer:PART A

(1) Virus attack

(2) Fraud achieved by manipulating records by hackers

(3) Intellectual property theft.

PART B

COMPUTER SYSTEM

PART C

It will hurt the company in the following ways

(1) Loss business opportunities

(2) Increase in cost of operation as it will result in making certain expenses for it to be restored

(3) Loss of work time.

Explanation: Harm is any unanticipated eventualities that are capable of adversely affecting a person or an organisation. Harm can be as a result of theft or loss of certain resources which includes the COMPUTER SYSTEM.

When this loss takes place it can lead to Virus attack,fraud can be achieved by harkers through the manipulation of records, intellectual property theft.

THROUGH THIS HARM THE COMPANY WILL LOSS WORK TIME, LOSS SOME AMOUNT OF MONEY AND SOME BUSINESS OPPORTUNITIES.

5 0
3 years ago
Other questions:
  • Thomas is getting ready for a presentation. His slides are set, and he's
    12·2 answers
  • The _________ file system supports encryption and compression and is the native file system for Windows 7 and Windows 8
    12·1 answer
  • Which functions return a logical value (TRUE or FALSE)?
    10·1 answer
  • Create a class called Toddler that inherits from a class called Parent. (Note that Parent has already been defined elsewhere, so
    8·2 answers
  • Which rule should be followed to stay safe online
    5·1 answer
  • Write code that generates a random odd integer (not divisible by 2) between 50 and 99 inclusive.
    10·1 answer
  • Periodic Table Question 2:
    9·1 answer
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
  • Explain how you would set up a Demilitarized Zone on. You have 25 workstations and a server on your site. Explain what additiona
    5·1 answer
  • What does a theme contain?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!