1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
2 years ago
14

Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning

Computers and Technology
1 answer:
Karo-lina-s [1.5K]2 years ago
4 0

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

You might be interested in
B =(-21) (0) + (-50) ÷ (-5)​
Irina-Kira [14]

Answer:

B=10

Explanation:

(-21) x 0=0 and (-50)÷(-5)=10

0+10=10

8 0
2 years ago
What is the name of the first practical asymmetric cryptosystem that was created?
victus00 [196]

Answer:

I think the name is RSA

4 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
What are some other features of sending attachments in Outlook 2016? Check all that apply.
Elis [28]

Answer:

the answer is a, b,d on edg.

Explanation:

8 0
2 years ago
Read 2 more answers
To drive defensively, you should _______________.
Keith_Richards [23]
The answer is B, look ahead and keep your eyes moving
7 0
3 years ago
Other questions:
  • 1.Context clues can be used to determine the ________of an unfamiliar word
    5·2 answers
  • Please Help!
    14·2 answers
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • Which Tab contains the font style attributes?<br><br> Home<br> Insert<br> Review<br> View
    8·2 answers
  • -Which of the following is true about Web services?
    10·1 answer
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
  • Please answer me <br> in Assignment - Algorithms
    10·1 answer
  • An online bank wants you to create a program that shows prospective
    12·1 answer
  • Message queues allow for programs to synchronize their operations as well as transfer data. How much data can be sent in a singl
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!