1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
5

15 points: Which type of system is used to capture and leverage the decision-making abilities of human experts?

Computers and Technology
1 answer:
salantis [7]3 years ago
4 0

Answer:

A

Explanation:

You might be interested in
My internet works but my router won't let any devices connect to it unless you use a cat. 5 cable :\
katovenus [111]
You would need to get a CAT5 cable, these usually dont cost much, as the manufacturing of these cables is cheaper and more common.

If you mean wireless connectivity, this could be due to your router not supporting wireless, meaning you would have to get a Wireless Access Point
5 0
3 years ago
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
xz_007 [3.2K]

Answer:

access control list (ACL)

Explanation:

An access control list (ACL) is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a file.

3 0
3 years ago
I really need this right now i just cant understand
Ilia_Sergeevich [38]

what part of it dont you understand?

maybe you learned about formulas and you are supposed to put today and now formula


7 0
3 years ago
3. Run the C-LOOK algorithm (requests can only be serviced when the head is moving toward higher numbered tracks); the head is c
o-na [289]

Answer:

See explaination.

Explanation:

An algorithm is specifically defined as the step by step method or process of achieving any type of result.

Please kindly see the attached file for the C algorithm that fulfils the answer of the given problem.

3 0
3 years ago
I hate these homework it's very hard and I need help
liubo4ka [24]
Ethics is the answer I believe
8 0
3 years ago
Other questions:
  • If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
    9·2 answers
  • Given a link with a maximum transmission rate of 18 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0 s
    14·1 answer
  • UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 0111010
    13·1 answer
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, A3 contains 7. You enter in cell A4 the followi
    8·1 answer
  • A free open source audio editing software program is
    5·1 answer
  • Java Eclipse homework. I need help coding this|
    10·1 answer
  • - A blacksmith is shoeing a miser's horse. The blacksmith charges ten dollars for his work. The miser refuses to pay. "Very well
    6·1 answer
  • WILL GIVE A BRAINLIEST!!! PLS HELP!!!
    9·1 answer
  • What defines the scope of a project?
    5·1 answer
  • what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!