1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
2 years ago
14

A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh

at are these functions example of?
Computers and Technology
1 answer:
rodikova [14]2 years ago
3 0

The example in which the alarm of the house could be set up, time should be set out should show the example of artificial intelligence.

The information related to artificial intelligence is given below:

  • It means the human intelligence in which the machines should be terms as humans and as per this, the actions must be mimic.
  • It should be applied for any machine type in which the traits must be associated with the human mind such as for learning & problem-solving motives.

Therefore we can conclude that The example in which the alarm of the house could be set up, time should be set out should show the example of artificial intelligence.

Learn more about the machine here: brainly.com/question/2555822

You might be interested in
If you want to present slides to fellow students or co-workers,which productivity software should you use to create them?
Tamiku [17]
Just use prezi.com hope that helps.
6 0
3 years ago
Read 2 more answers
Suggest why people might not want the government to carry out Internet surveillance?​
Vadim26 [7]
Suggest why people might not want the government to carry out Internet surveillance?
To see your history all that p o r n ya watch
Pls mark me brainliest;p
3 0
2 years ago
Read 2 more answers
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
Earning wise scope of web and mobile app development
lubasha [3.4K]

Answer:

Mobile are build in a specific platform such as Android, iOS ect and they use application such as apple store and have access to the system such as GPS and the camera. Mobile apps live and run on mobiles as on they are their own thing controlled by a developer on the other end

Explanation:

3 0
3 years ago
webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an onlin
azamat

The statement that webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so is false.

<h3>What is webrooming?</h3>

It should be noted that webrooming simply means the consumer practice for researching products online before buying theme in stores.

In this case, the main idea of webrooming isn't to buy it at stores because it's cheaper. Therefore, it's false.

Learn more about webrooming on:

brainly.com/question/14988432

#SPJ12

3 0
2 years ago
Other questions:
  • A powerful computer that acts as a hub for other computers is a called a ______.
    6·2 answers
  • Enter a formula using a database function to calculate the total value in the Cost column for expenses that meet the criteria in
    12·1 answer
  • __________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
    9·1 answer
  • Name two ways you can identify the pid number of the login shell.
    13·1 answer
  • Please hurry Arrange the steps of the engineering design process in the correct sequence.
    10·1 answer
  • Application of computer in insurance​
    14·1 answer
  • Which statement is true? Select 3 options.
    5·2 answers
  • Changing how information is represented so that it can be read by a computer is called
    7·1 answer
  • WHATS 5X750 i really dont even know that questiob
    7·2 answers
  • What year did apple computer introduce the first ipod?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!