1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
12

Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma

chine-uptime management on their build sites. They would also like to improve worksite safety. Accenture is designing an Artificial Intelligence (AI) solution to address this scenario. What type of data should be used in the solution?
Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
8 0

Answer: d. past maintenance and performance records and worksite conditions.

Explanation:

When improvements need to be made on anything, it is important to know what is to be improved upon as the very first step.

The data required here therefore, is the past performance and maintenance records as well as worksite conditions. This will enable Accenture know what it is they need to improve upon and how much improvement is needed.

You might be interested in
Assume the user responds with a 3 for the first number and a 4 for the second number.
PolarNik [594]

Answer:

The result is 6.

Explanation:

number A is 3 and number B is 4.

4*3/2=6

7 0
3 years ago
Free brainliest hehehehehehehheheh
Burka [1]
Answer:

Omg tysm have a great day!
5 0
3 years ago
Read 2 more answers
1.) Florida has ____________ roads that are designated as part of the National Highway System.
salantis [7]
Answer to number two is b, 3 is b, those are the ones i know
3 0
3 years ago
What is the importance of Mathematical Modeling in the field of bioinformatics.
Paraphin [41]

Answer: mathematical modelling helps to look into the uncertainties in the calculations based on the observational data.

Explanation:

In bioinformatics for example in gene data expression there can millions of data obtained through various observatory experiments. however most of the data is inadequate to arrive at at a conclusion. So in order to solve this issue we have to apply mathematical modelling to consider those data which would help us to understand the models behavior and access its performance.

6 0
3 years ago
You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
BartSMP [9]

Answer:

a. Radom Access Memory (RAM).

Explanation:

If a computer user modifies a document that is saved on his or her computer. This changes are stored on the Radom Access Memory (RAM) until the computer user save the document.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

3 0
3 years ago
Other questions:
  • How does the use of modules provide flexibility in a structured programming design?
    14·2 answers
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met
    6·1 answer
  • What are the advantages of homogenation
    5·1 answer
  • "Once a business operations analysis is completed and change needs to
    7·2 answers
  • Why is it a good idea to leave an interview being courteous and polite?
    10·1 answer
  • Which sentence uses a pair of synonyms? Because there was so much shouting, many of the protestors began screaming in order to b
    6·2 answers
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • Which of the following lines of code is syntactically correct?
    14·1 answer
  • [This is on Edhesive (coding and programming)]
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!