1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
2 years ago
5

A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si

mplified form.
Computers and Technology
1 answer:
zhuklara [117]2 years ago
7 0

By definition, a neutral network is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly simplified form.

A neutral network processor is a CPU that takes the modeled operation of how a human brain works on a single chip.

Neutral network processors reduce the requirements for brain-like computational processing of entire computer networks that excel in complex applications such as artificial intelligence, machine learning, or computer vision down to a multi-core chip.

In other words, astificial neutral networks are a computational model that consists of a set of units, called artificial neurons, connected to each other to transmit signals. The input information traverses the neutral network (where it undergoes various operations) producing output values. Its name and structure are inspired by the human brain, mimicking the way biological neurons signal each other.

So the goal of the neutral network is to solve problems in the same way as the human brain, although neural networks are more abstract.

In summary, a neutral network is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly simplified form.

Learn more:

  • brainly.com/question/474553?referrer=searchResults

You might be interested in
Being nice take the points​
MArishka [77]

Answer:

Sure!!! and thank you very much

4 0
2 years ago
What key should you press and hold to select and open multiple files at one time? Enter Alt Control Esc
Yuliya22 [10]

Press and hold down the CTRL key while you drag the file to another folder. Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

3 0
3 years ago
Read 2 more answers
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
6. Which of the following is malware? (1 point)
marusya05 [52]
Software to damage computers
5 0
3 years ago
Read 2 more answers
Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
lora16 [44]

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.

The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.

In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • Your friend Kayla is starting her own business and asks you whether she should set it up as a P2P network or as a client-server
    13·1 answer
  • This type of peripheral is used to interact with, or send data to, the computer.
    12·2 answers
  • When we put 10+ points for when we ask a question, do we loose the points we have?
    12·1 answer
  • Fortnite anyone? i just started tdy so dont be judgiee lol
    6·2 answers
  • How are traditional technology and modern technology related to each<br>other? ​
    9·2 answers
  • Suppose that x = 1565.683, y = 85.78, and z = 123.982. What is the output of the following statements? cout &lt;&lt; fixed &lt;&
    8·1 answer
  • In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP
    10·2 answers
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!