1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
4 years ago
13

Which model is designed to find a goodenough solution using rules?

Computers and Technology
1 answer:
olga2289 [7]4 years ago
4 0

Answer: Heuristic programming

Explanation:

  As, heuristic programming is defined as, in computer programming it is technique which is designed to solve the problem more quickly in classic method. Basically, it is branch of artificial intelligence which uses heuristics to solve the problems.  Heuristic programs usually produced a good result so, that is why many experts use heuristic programming.

Heuristic Programming is basically used to find out appropriate solutions using some Heuristic rules and functions.

You might be interested in
To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. TRUE
Elis [28]
I believe the statement is true. <span>To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. Hope this answers the question. Have a nice day. Feel free to ask more questions.</span>
6 0
3 years ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
4 years ago
What caused accident? into passive voice​
lozanna [386]
Accident was caused by what
6 0
3 years ago
Gathering information with your eyes is called
Ivahew [28]
Observing, Looking, Collecting, there are a few words for "gathering information with your eyes". 
4 0
3 years ago
Read 2 more answers
What is the storage of a modern hard disk drive?
Alinara [238K]

Answer:

80 gigs of storage

Explanation:

it gives a bunch of room because of the calculations the vomputer

3 0
4 years ago
Other questions:
  • What file formats can you safely use in a video presentation
    14·1 answer
  • Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
    11·2 answers
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    10·1 answer
  • Digital art is created by using __?
    5·1 answer
  • Which line is not a computer-generated forecast?Which line is not a computer-generated forecast?the black line representing 20th
    12·1 answer
  • Assuming 8-bit 2's complement notation, what is the result of subtracting 00001001 from 00001101?
    11·1 answer
  • What is Automation ? Please give an example ?
    14·1 answer
  • File names should be limited to 144 characters.<br><br> true or false
    12·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!