1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
12

Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants

to begin taking advantage of a technology that can analyze some of the information for her and learn from that data analysis to make decisions rather than relying on explicit programming for the analysis. Which of the following describes this technique?
a. Systematic processing
b. Machine learning
c. Cumulative wisdom
d. S.M.A.R.T.
Computers and Technology
1 answer:
GalinKa [24]3 years ago
5 0

Answer:

b. Machine learning

Explanation:

The technique that is being described in this situation is known as Machine Learning. This is a fairly new technology that has become popular over the last decade. Machine learning uses artificial intelligence to analyze data and learn from it. Every time the system analyzes the data it learns something new, saves it, and implements it to its processes. Therefore, the more times it repeats the more it learns. These systems are continuously getting better and learning more, which makes them incredibly efficient.

You might be interested in
A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
morpeh [17]

Answer: C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints

Explanation:

Option A is incorrect. There's no information on the speed and analysis of the fingerprint.

Option B is incorrect. No information regarding computer installation was given in the passage.

Option C is correct. With the information, it can be concluded that it is impossible for a top hacker to have access to the protected computer.

Option D is Incorrect. Information regarding time and investment costs that were incurred during the software development wasn't given in the passage

Option E is Incorrect. The passage didn't give information on the errors that the software produced.

8 0
3 years ago
TRUE OR FALSE - SQL language is used to query data in a Relational Database?
Gelneren [198K]

Answer:

Yes I agree with the other person who answered that

5 0
3 years ago
Which tag denotes the end of an element in HTML? A. / B. * C. > D. ) E. _
Lilit [14]

C. ">" denotes the end of an element. For instance <b>Hello!</b> or <hr />

6 0
3 years ago
You send a report to your boss for feedback and she returns it to you with her edits noted in the electronic file. This Word fea
Lesechka [4]
Edits in the document are called, C. Track changes
3 0
3 years ago
Read 2 more answers
Lisa and her husband would like to buy a house soon. She continuously pays bills late. How do her actions affect her and others?
stiks02 [169]
Well actually it affects her credit. Home owners would not want to sell a house to someone who doesn't pay bills on time. It shows he/she is unreliable

3 0
3 years ago
Read 2 more answers
Other questions:
  • Airbags only absorb the _____ impact in a crash. initial final mid-stage smallest
    13·1 answer
  • How to connect to my wireless printer for dummies?
    12·1 answer
  • On an Android device, where can a user find the correct app to use to sync contacts and apps among devices?
    10·1 answer
  • If you're unsure of what chart to use for a set of data, what feature does Excel include that will help you to decide?
    7·1 answer
  • Robert works in a call center and receives a call from Kathy. Kathy says she can no longer access the online reporting applicati
    13·1 answer
  • Write a method that determines the total number of chars in each string of an array.
    12·1 answer
  • Which of the following bit patterns represents the value -9 in two’s complement notation?
    15·1 answer
  • Using a third-party package of your choice, write a program that reads the contents of a csv file and saves it to an Excel file.
    10·1 answer
  • What is 3x10? PLZZZZZ
    11·1 answer
  • Which file formats have relatively small file size and are therefore the most widely used formats for sharing and
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!