1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
2 years ago
13

How do programmers recognise patterns, generalise and abstract information

Computers and Technology
1 answer:
Dima020 [189]2 years ago
4 0

Answer:

Pattern recognition is the process of recognizing patterns by using machine learning algorithm. ... In a typical pattern recognition application, the raw data is processed and converted into a form that is amenable for a machine to use. Pattern recognition involves classification and cluster of patterns

Explanation:

You might be interested in
Using 2 bytes, how many different characters can Unicode represent?
Dahasolnce [82]

Answer:

64

Explanation:

6 0
3 years ago
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
Varvara68 [4.7K]

Answer: True

Explanation:

An hacking activity usually deal with the unauthorized access to ones system.

Similarly this technique of Drive by hacking by which the attacker release wireless networks. Then a computer user of an organization finding a wireless network tries to connect to the open network and it is this process when the computer or system user falls easy prey to the hacker. The attacker uses the wireless network as a medium to  intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

It is often accompanied with the SqL injection packets into the network.

This attack is also popular by the name hotspot attack.

5 0
3 years ago
Help PLEASE (in attachment)
bekas [8.4K]
Oxygen, Glucose, Chemical Energy

ACB I think ( not giving my word on this part)

They are essential to all ecosystems
7 0
3 years ago
Which of the following is a term used for the permanent record of activities performed on the Internet?
Rasek [7]

Answer:   Your history and you can check everything using a MAC or IP password

6 0
3 years ago
The protocol that enables computers on the Internet to communicate with each other is called _____.
dybincka [34]
"C" is the correct answer, if its correct please mark me brainliest.
5 0
3 years ago
Other questions:
  • What does utp stand for?
    11·2 answers
  • ____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs
    6·2 answers
  • Grace whistles while tickling Camille with a feather. Eventually, Camille starts to squirm and giggle every time Grace whistles,
    10·1 answer
  • Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
    8·1 answer
  • How would you convert an integer value to a float value in Python?
    10·1 answer
  • Types of data processing
    5·1 answer
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
  • The goal of this problem is to cover all roads with cameras. A camera placed at a station can cover all the roads connected to i
    9·1 answer
  • What are the routes through with Virus transmitted into computer<br>system?​
    15·1 answer
  • _______________________ variables do not need to be declared inside the function definition body, they get declared when the fun
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!