1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
14

List 5 ways by which Artificial intelligence (AI) can be used to drive our business.​

Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
5 0

Answer:

start a website

Explanation:

true

You might be interested in
Why do we need to use logical addressing while we can directly use physical addressing in
Galina-37 [17]

Answer:

it gives gives the Operating System a way to securely manage memory.

Explanation:

the user never directly deals with the physical address but can access by its corresponding logical address.

hope this helps :)

8 0
3 years ago
Pedro is at a conference for computer programmers and wants to attend a session on new features in software that help write code
Natasha_Volkova [10]

Answer:

1) Variable Management for Beginers

6 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
A cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills. For example, 19 yields
posledela

Answer:

The correct program to this question as follows:

Program:

//header file

#include <stdio.h> //include header file for using basic function

int main() //defining main method

{

int amountToChange=19,numFives,numOnes; //defining variable

numFives = amountToChange/5; //holding Quotient  

numOnes = amountToChange%5; //holding Remainder

printf("numFives: %d\n", numFives); //print value

printf("numOnes: %d\n", numOnes); //print value

return 0;

}

Output:

numFives: 3  

numOnes: 4  

Explanation:

In the above program first, a header file is included then the main method is declared inside the main method three integer variable is defined that are "amountToChange, numFives, and numOnes", in which amountToChange variable a value that is "19" is assigned.

  • Then we use the numFives and the numOnes variable that is used to calculate the number of 5 and 1 , that is available in the amountToChange variable.
  • To check this condition we use (/ and %) operators the / operator is used to hold Quotient value and the % is used to hold Remainder values and after calculation prints its value.

6 0
3 years ago
What does the MLA style not require that both the APA and Turabian do
snow_lady [41]

Dunno if this helps but here goes nothin

An APA-formatted paper includes the author's last name and year of publication in parenthesis after the cited text. An MLA-formatted paper includes the author's last name and page number in parenthesis after the text.

3 0
4 years ago
Other questions:
  • The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track
    14·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • Typically , how do people earn income
    11·2 answers
  • How do you screen shot and copy paste the screenshot from chrome book
    11·2 answers
  • Privacy settings allow account owners to decide who can ........
    12·2 answers
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • Saved
    5·1 answer
  • Inserting merge fields in the letter<br>steps required <br>plz ​
    11·2 answers
  • HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s
    9·1 answer
  • What is the difference between PowerPoint and Outlook?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!