1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
13

Example of AI in online shopping​

Computers and Technology
1 answer:
Doss [256]3 years ago
8 0

Answer:

hope it's help you ok have a good day

You might be interested in
Your friend want to make a copy of your new game you bought the previous day .
Lisa [10]

Answer:

It is copyright infringement

Explanation:

Required

Why you should prevent your friend from copying a software you bought

When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.

This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.

3 0
3 years ago
Task manager is showing an application as “not responding.” what can you do?
34kurt
I think it's b because "end application" would make the most sence
8 0
4 years ago
Select the four tactics that cyber criminals use for stealing information from the list below.
Snowcat [4.5K]
Baiting clickjacking pharming spamming
6 0
2 years ago
Write an SQL statement to display the WarehouseID and the sum of QuantityOn- Hand grouped by WarehouseID. Omit all SKU items tha
schepotkina [342]

Answer:

SELECT WarehouseID, SUM(QuantityOnHand) AS TotalItemsOnHandLT3

FROM INVENTORY

WHERE QuantityOnHand < 3

GROUP BY WarehouseID

ORDER BY TotalItemsOnHandLT3 DESC;

Explanation:

SELECT statement is used to select the columns from the table. Here the columns displayed by SELECT are WareHouseID, Sum of QuantityOnHand which is named as TotalItemsOnHandLT3  using AS which is called alias which is a temporary name to represent one or columns. WHERE clause here depicts a condition that omits all SKU items that have three or more items on hand from the sum. GROUP BY is used to group the resultant set by one or more columns like here it is grouped by WarehouseID. ORDER BY is used to display the result of TotalItemsOnHandLT3  column in descending order.

7 0
4 years ago
Which technologies allows multiple applications to execute in isolated user spaces, share the same operating system kernel, and
coldgirl [10]

Answer:

OS-level virtualization

Explanation:

OS-level virtualization in cloud infrastructure allows the division and full utilization of resources of one hardware allowing it to run more than one or multiple operating system. With this technology, each operating system is dedicated to one user space instance called a virtual machine, and each user space is independent of other operating systems or user space instances in the kernel such that the failure of one operating system does not affect others.

8 0
3 years ago
Other questions:
  • What is the only true way to wipe out every possibility of the virus?
    11·1 answer
  • Which of the following refers to a marketing metric that shows an event that occurs on a Web page met a predefined goal associat
    6·1 answer
  • Which file extension indicates a Microsoft Excel document?
    7·1 answer
  • WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
    8·1 answer
  • What best describes a firewall
    11·1 answer
  • Google's Chrome OS integrates with web servers using cloud computing and storage to run applications and to perform other functi
    10·1 answer
  • THIS IS FOR MY FINAL PLEASE HELP
    6·1 answer
  • Select the word or phrase from the drop-down menu to complete each sentence. File names consist of a ______ and a file extension
    10·1 answer
  • HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
    8·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!