1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
13

Example of AI in online shopping​

Computers and Technology
1 answer:
Doss [256]3 years ago
8 0

Answer:

hope it's help you ok have a good day

You might be interested in
Interruption attacks are also called ___ attacks:
Lelu [443]

Answer:

Interruption attack are also referred to as Denial Of Service(DOS) attack.

Explanation:

Interruption attack are also called denial of service.The main aim of  interruption attack or Denial Of Srvice attack is to make resources unavailable.

For example:- wordpress.com had an DOS attack that took down their servers hence the service was unavailable for it's users.

Hence we conclude that the answer to this question is Denail of Service (DOS).

4 0
3 years ago
An algorithm is:
Rus_ich [418]
A set of steps used to complete a specific task.
5 0
3 years ago
Drag each tile to the correct box.
My name is Ann [436]

Click Accept or Reject steps involved in accepting all the changes in a document

Click Accept or Reject.

<u>Explanation:</u>

When end user drags and drop title in correct box in an open document. He has accept changes to all. Normally   end user is prompted for accept and reject based on his or her selection documents changes are happened.

End user has to by click on review menu in the open document and he or she has to click on go to first tracked change. Once clicked end user is prompter for to accept the changes. Once changes is accepted next tracked changes is prompted for open document.

4 0
3 years ago
Write its features:features of computer ​
Digiron [165]

Answer:

There are different characteristics of a computer is the following below.

Speed.

Accuracy.

Diligence.

Reliability.

Versatility.

Storage Capacity.

Automatic.

Quick Decision.

Explanation:

Sorse  

System https://quicklearncomputer.com

Mark brainlist if you want ¯\_(ツ)_/¯

5 0
3 years ago
A field whose data type is ____ can store text that can be used as a hyperlink address
olya-2409 [2.1K]
A field whose data type is URL address data can store text that can be used as a hyperlink address.
8 0
4 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • What is anatomy of software house?
    10·1 answer
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • What's the main piece of information you look for in an e-mail message you're investigating??
    14·2 answers
  • Which questions should you ask yourself when performing research online?
    9·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • What are the purposes of a good web page design?
    9·2 answers
  • Calculate the ERA
    6·1 answer
  • Anyone want to play mine mincraft w/ me?
    9·1 answer
  • Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!