1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
12

Will economists be replaced by artificial intelligence?

Computers and Technology
1 answer:
Ratling [72]3 years ago
7 0
Possibly, it is a very high chance. I think we use a lot of AI in that field right now. I think their job will change to presenting it.
You might be interested in
An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
nalin [4]

Answer:

RADIUS

Explanation:

RADIUS is the networking protocol that is used for the purpose of authentication to access the network resources. The full form of RADIUS is Remote Authentication Dial In User Service. It is used by different organizations, which setup their own network that can be accessible through VPN, DSL or modems through different networks. The purpose of this protocol is to establish the security and authentication mechanism by organization itself.

So, If an administrator needs to set up an authentication server for users connecting to a network through a VPN, he should establsih the RADIUS based Server.

3 0
3 years ago
Help. serious help. the acc im using right now cant be ridded of by myself from being unable to have a pass. i need to contact a
anzhelika [568]

Answer:

Can't really help you... But you can try emailing support.

7 0
2 years ago
Divide the difference of 47 and 23 by the difference of 25 &13​
OleMash [197]

Answer:

The answer is 2

Explanation:

3 0
3 years ago
Which of the following tasks are suitable for creating an algorithm? Choose all that apply.
Nookie1986 [14]

Answer:

All except saving time writing a computer program.

3 0
3 years ago
Which category best represents: a student sends harassing emails to another student. The receiving student retaliates with a "fl
Dima020 [189]
It is considered C. cyber bullying
3 0
3 years ago
Read 2 more answers
Other questions:
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • Effective character encoding requires:
    8·1 answer
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • Select the correct answer
    11·2 answers
  • Who invented the machine known as colossus?
    9·2 answers
  • Johnathan was assigned to complete a project with three other people. What benefit will he get from working with the team?
    15·1 answer
  • What key value does Accenture’s myConcerto bring to clients looking for automated solutions?
    6·1 answer
  • Which of the following is true of functions?
    10·1 answer
  • What what do these two parts of the lift do ​
    14·1 answer
  • What is a circular network.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!