1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
9

a __________ uses software and/or hardware to prevent unwanted access to a computer or computer system.

Computers and Technology
1 answer:
Crank3 years ago
6 0
Anti virus software
You might be interested in
Question 16 (2 points) Question 16 Unsaved
strojnjashka [21]
I will help with as many as I can! :)
-
16. Slogans
17. Website Design and Development Process
18. Planning
19. (This question is the same as question 18 so I am at a loss here, sorry)
20. Confuse users, believing it is a hyperlink.

I apologize for the wait. I was trying to double check my sources. Also, I apologize in advance if something is wrong.
3 0
3 years ago
To find the bottom 10 items of a list we need to click on Filter option
avanturin [10]

Answer:

I think it's false

I hope it helps you

4 0
3 years ago
Could Anyone Please Explain To Me What Is Supervised Learning In Machine Learning? I encourage that you explain it in simple wor
nadya68 [22]

Answer:

Kindly check Explanation.

Explanation:

Machine Learning refers to a concept of teaching or empowering systems with the ability to learn without explicit programming.

Supervised machine learning refers to a Machine learning concept whereby the system is provided with both features and label or target data to learn from. The target or label refers to the actual prediction which is provided alongside the learning features. This means that the output, target or label of the features used in training is provided to the system. this is where the word supervised comes in, the target or label provided during training or teaching the system ensures that the system can evaluate the correctness of what is she's being taught. The actual prediction provided ensures that the predictions made by the system can be monitored and accuracy evaluated.

Hence the main difference between supervised and unsupervised machine learning is the fact that one is provided with label or target data( supervised learning) and unsupervised learning isn't provided with target data, hence, it finds pattern in the data on it's own.

A to B mapping or input to output refers to the feature to target mapping.

Where A or input represents the feature parameters and B or output means the target or label parameter.

4 0
4 years ago
Which 3 file formats can be used for importing lists directly into quickbooks online?.
Natali5045456 [20]

Answer:

Explanation:

QBO

IIF

QBJ

8 0
2 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Other questions:
  • What is Blender's default save directory for movie AVI files?
    9·2 answers
  • Who is the primary audience for demonstrations of game prototypes made by the developer?
    8·1 answer
  • Outsourcing is an alternative systems building approach that may involve subscribing to an application service provider or hirin
    8·1 answer
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • What is the output of the second println statement in the main method? public class Foo { int i; static int s; public static voi
    14·1 answer
  • What are the five resources paid for by local taxes
    15·1 answer
  • Anyone wanna play roblox?? My user is Tsvetok_luis
    11·2 answers
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!