1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aev [14]
3 years ago
12

IBM’s system that is built on the middle ground approach to AI.

Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
6 0

Answer:

IBM Watson is AI for business. Watson helps organizations predict future outcomes, automate complex processes, and optimize employees' time.

Explanation:

You might be interested in
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
1 year ago
Select the steps for adding artwork into a placeholder on a presentation slide
Sloan [31]

Answer:

   Open the presentation that you want to add a slide to.

   In the pane that contains the Outline and Slides tabs, click Slides, and then click where you want to add a slide.

Explanation:

6 0
3 years ago
When a device or service causes the system to hang during a normal boot, boot into __________ and disable the device or service
Olenka [21]

You should boot into <u>safe mode</u> and disable the device or service when it causes the computer system to hang during a normal boot.

<h3>What is safe mood?</h3>

Safe mood can be defined as a boot option in which the operating system (OS) of a computer system starts in <u>diagnostic mode</u> rather than in a normal operating mode, so as to enable the user correct any problems preventing the computer system to have a normal boot.

This ultimately implies that, safe mood is a diagnostic mode of the operating system (OS) of a computer system that is designed and developed to fix most problems within an operating system (OS) and for the removal of rogue software applications.

Read more on safe mood here: brainly.com/question/13026618

5 0
2 years ago
how do i create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be
valentina_108 [34]

Create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be displayed in the search results (starting in cell K10).

Explanation:

  • In cell B2, enter the value from A7.
  • Insert a function in D2 that will return the arrival date of any vehicle based on  which VIN is entered in B2 (Hint: Start with an INDEX function. Before you use a  nested MATCH function, specify which column number you will be returning.)
  • Insert a function in F2 that will return the Special Notes of any vehicle based on  which VIN is entered in B2 (Use the same hint from the previous step.)
  • Enter the following values for the advanced search criteria in the range K3S3:
  1. Year = 2018
  2. Type = Sedan
  3. GPS = Yes
  • Create an advanced filter using the search criteria in the range K2:S3 and the  inventory data where the results will be displayed in the search results (starting in  K10).
  • Verify results populate as expected.
6 0
3 years ago
Why is it important to recognize web address endings? to know the type of information on a site to determine if the site’s infor
seraphim [82]

Answer: To know the type of information on a site.

Website address endings are known as domain extensions. In our current society, the domain extensions or website endings are indicators of what information or content the website will contain. By recognizing these domain extensions, you will have a clear understanding of what to expect from the website.

Some examples of these domain extensions are:

.edu

- The .edu extension indicates that the website is related to educational content.

.org

- The .org extensions indicates that the website is related to free organizations.

.com

- The ever famous .com extension is an indicator of a commercial type of website.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Please help i really need to turn this in already
    6·1 answer
  • what is the restaurant with the black pom tree and yellow backround three letter name from hi guess the restaurant
    14·2 answers
  • Why are high-quality transformers wound with large diameter wire?
    8·1 answer
  • The shell that is used by default in linux is the _____ shell.
    12·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • Write a parent program to fork(2) n processes where n is passed tothe program on the command line, and n can be from 1 to 10. Al
    12·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • 1. Do our shared social experiences lead us to think<br><br> communication is a cure-all?
    13·1 answer
  • Can someone write me a design brief about a stadium​
    12·2 answers
  • Why does a crane need to rotate/swivel​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!