Answer:
Deep Learning
Explanation:
The kind of artificial neural network (ann) that includes many layers to deal with complex problems that may have very large data sets is called a Deep neural network.
What is an artificial neural network?Artificial neural networks, more commonly referred to as neural networks or neural nets, are computer architectures that draw inspiration from the biological neural networks seen in animal brains.
Artificial neurons, which are a set of interconnected units or nodes that loosely resemble the neurons in a biological brain, are the foundation of an ANN.
Deep Learning is a type of artificial neural network (ann) that has several layers to handle complicated issues that may have very big data sets. Deep neural networks use advanced math modeling to interpret input in complicated ways.
Learn more about artificial neural networks here:
https://brainly.com/question/19537503
#SPJ2
What is the primary method by which robots (crawlers, spiders) discover new web pages?
The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.
What are web page?A web page (or webpage) is known to be a kind of an hypertext document that is known to be seen or found on the World Wide Web.
Note that the Web pages are said to be often delivered by the use of a web server to the person who is using the system and it is one that is often shown or displayed in a web browser.
Note that a website is made up of many web pages connected together under what we see as common domain name and as such, The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.
Learn more about robots from
https://brainly.com/question/13515748
#SPJ1
Ethernet provides... Group of answer choices no error detection or correction error detection and correction via CRC check error detection via CRC check error detection and correction via parity checks
Ethernet provides:
check error detection via CRC check error detection and correction via parity checksWhat is an Ethernet?This refers to the wire connection that is used to connect to network terminals to connect to the world wide web.
Hence, we can see that based on the answer choices, we can see that the ethernet has many uses and this involves checking error detection via CRC and checking error detection and correction via parity checks
Read more about ethernets here:
https://brainly.com/question/26956118
#SPJ1
What two documents describe the purpose of the optask link?
The two documents describe the purpose of the optask link are:
MTAMTNWhat is responsible for promulgating the Optask link message?The agency that is known to be assigned the role to promulgate the OPTASK LINK is known to be MTA which is said to be the physical configuration.
The MTA is known to be one that contains the physical configuration, functional organization, and also all of the operational methods used in the set up , establishment, changes, and operation of Multi-TDL Networks. The MTA is said to be the physical linkages and equipment of the MTN.
Hence, the two documents describe the purpose of the optask link are:
The MTAThe MTNLearn more about MTA from
https://brainly.com/question/24131225
#SPJ1
explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”
Answer:
Binary is made up of only 2 digits: a one and a zero. 1011 is eleven in our counting system.
So 10 in binary = 2 in our counting system.
Read the joke as follows. There are 2 types of people in the world: those who understand binary and those who do not.
I guess it's not really that funny, but computer programmers like it.
____ is a temporary holding area for data, application program instructions, and the operating system.
One of the key advantages the soviet union held over the united states on a global scale was america's continuing issue of:________
Explanation:
The Americans had a greater nuclear power with more than 300 land based intercontinental ballistic missiles (ICBMs) and a fleet of Polaris submarines. The Soviet Union had only 4 to 6 land based ICBMs and around 100 short range primitive V1 type cruise missiles that could only be launched from surfaced submarines.
What are the advantages of cloud computing over computing on premises?
Answer:
answer my question
Explanation:
open my account. i need help.what is the full form of BD in computer
Answer:
the full form of BD binary digits
Answer:
I hope this answers help you
Explanation:
Bd fullform in computer is Blu-ray disc
JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and smallest values entered. The solution must use at least these following variables:
counter -a counter to count how many integers were entered
number -the integer most recently input by the user
smallest -the smallest number entered so far
largest -the largest number entered so far
Write three separate programs in JAVA , the first using a while construct, the second using a for construct, and the third using a do while construct. Thank you so much!
Using the knowledge in computational language in JAVA it is possible to write a code that enter a series of 10 integers and then determines and displays the largest and smallest values entered.
Writting the code in JAVA:public class OddEvenSum { // Save as "OddEvenSum.java"
public static void main(String[] args) {
// Declare variables
final int LOWERBOUND = 1;
final int UPPERBOUND = 1000; // Define the bounds
int sumOdd = 0; // For accumulating odd numbers, init to 0
int sumEven = 0; // For accumulating even numbers, init to 0
int absDiff; // Absolute difference between the two sums
// Use a while loop to accumulate the sums from LOWERBOUND to UPPERBOUND
int number = LOWERBOUND; // loop init
while (number <= UPPERBOUND) { // loop test
// number = LOWERBOUND, LOWERBOUND+1, LOWERBOUND+1, ..., UPPERBOUND
// A if-then-else decision
if (number % 2 == 0) { // Even number
sumEven += number; // Same as sumEven = sumEven + number
} else { // Odd number
sumOdd += number; // Same as sumOdd = sumOdd + number
}
++number; // loop update for next number
}
// Another if-then-else Decision
if (sumOdd > sumEven) {
absDiff = sumOdd - sumEven;
} else {
absDiff = sumEven - sumOdd;
}
// OR using one liner conditional expression
//absDiff = (sumOdd > sumEven) ? sumOdd - sumEven : sumEven - sumOdd;
// Print the results
System.out.println("The sum of odd numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumOdd);
System.out.println("The sum of even numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumEven);
System.out.println("The absolute difference between the two sums is: " + absDiff);
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Which of the following is a group of computer systems and computing hardware devices linked together through various communication channels?
Digital network
Data linking
File sharing
Intranet
You're interested in using the services of a vendor company. How would you assess their security capabilities?
If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to ask them to give you or perform any penetration testing or a kind of security assessment reports.
What is the report about?For a person to be assured of the security capabilities of any company, it is good that one ask them to fill a a questionnaire.
Note that the security assessment questionnaire is one that can assure you to quickly and efficiently have a broad understanding of what security measures that the vendor company has in store.
Note that If available, any reports that has the detailing penetration testing results is available or the security assessments is one that can be required from them.
Hence, If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to ask them to give you or perform any penetration testing or a kind of security assessment reports.
Learn more about vendor company from
https://brainly.com/question/15104782
#SPJ1
The critical components of the operating that remain in memory as long as the computer is running are commonly known as the:______.
Answer:
Kernel
Explanation:
The answer is Kernel.
Hope this helps!
What is the term that describes when the amount of goods produced is abou
the same as the number of consumers who are willing to buy the product?
A. Risk
B. Equilibrium point
C. Supply
D. Demand
the answer is equilibrium point (I think so,)
What are the different elements of a window?
Answer: title bar, menu bar, the workspace
Explanation:
Kourtney is searching for a software package that provides many resources for software developers all in one place. What should Kourtney search for?
The thing or factor that Kourtney need to search for is said to be an integrated development environment.
What is software package?This is known to be a composition or a set of related programs that is said to be made for a specific type of task such as word processing, sold and it is one that a user can be able to use as a single unit.
Since Kourtney is searching for a software package that provides many resources for software developers all in one place, an integrated development environment is the best option for her.
Learn more about software package from
https://brainly.com/question/1538272
#SPJ1
When working with a spreadsheet, data analysts can use the _____ function to locate specific characters in a string.
When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.
What is the CLEAN Function?The CLEAN Function is known to be a tool that is often categorized in the Excel Text functions.
Note that this function tends to delete or remove any kind of non-printable characters from any specified or given text.
Note that As financial analysts, people tend to often import data from a lot of sources and the CLEAN function can help to delete nonprintable characters.
Hence, When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.
Learn more about spreadsheet from
https://brainly.com/question/4965119
#SPJ1
In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical section c) exit section
Which example best describes an unethical use of computers? A. Sidney uses a computer to create a website that allows them to share personal writing and art. B. Jill leaves her computer on during lunch. Her supervisor opens and reads an email addressed to her. C. Trang uses a computer to collaborate with friends on a group project for school. O D. Sanjay uses a computer to order groceries online and have them delivered to his home.
Answer:
B
Explanation:
enumerate five features of Microsoft excel 2016
Answer:
Smarter Autocorrect, Improved Functions of Excel Workbook, New Funnel charts, and Smarter insertion of pictures.
Explanation:
For 8 features of Microsoft excel 2016, check out this website:
https://www.educba.com/features-of-2016-excel-workbook/
Hope this helps!
Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered:
Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered To be very Essential for any computer.
What is password Essential for any computer?The use of the Passwords is known to be a tool that can help to give or provide the first kind of defense that a person can often use against unauthorized access to one's computer and personal information.
Note that the stronger a password is, the more protected one can say that your system or computer will be from any kind of hackers and malicious software.
Therefore, Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered To be very Essential for any computer.
See full question below
Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered: Essential for any computer. Necessary to consider, because physical security is always something that must be evaluated.
Learn more about password from
https://brainly.com/question/17174600
#SPJ1
void printInfo()
{
string newList[] = {'ITP100', 'ITD110', 'ITP140'};
newList[1] = 'ITP226';
cout << newList[1] <
}
printInfo();
What is the output of the code?
The output that would be produced by tis code that we have here is going to be ITP226.
What is the output of a code?This is the term that is used to refer to the message that the particular line of code wants to be displayed. It is what gets to be done and displayed when the code has finished running at the end of everything if it is properly written following the rule of syntax for the particular language in question.
This piece of code that has been written here wants the new list 1 to be displayed. What is contained in this list are the values ITP226.
Hence after it has finished running, the solution that would be displayed in the console would be ITP226.
Read more on code output here: https://brainly.com/question/5451281
#SPJ1
Write any two uses of the paint program
Image reformatting - For instance, modifying a GIF to a JPEG. Drawing shapes. Resize and rotate images. Basic image editing such as red eye and difference
A paintbrush is utilized for drawing, coloring, and editing the pictures. We can use Paint Brush like a digital sketchpad to make straightforward pictures. Files created in Paint Brush are saved as bitmap files.
What are the main features of the paint program?
Features contained in the paint are pencil, brush and airbrush tool. The capability to add text, lines and shapes. Also contained are an eraser, magnifier, and fill colour tools.
What is the use of paint program?
A paint program is a software pictures program that allows the user to draw, color, or paint bitmapped images on a computer. Though most are finished, examples include: KolourPaint, XPaint, Deluxe Paint, MacPaint, and Microsoft Paint, which is displayed in the picture
To learn more about paint program, refer
https://brainly.com/question/1407666
#SPJ9
5 The following text is stored as a text file:
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure. Explain how lossless compression would compress this file.
Lossless compression decreases file size without removing any bits of information. Instead, this format works by removing sameness within data to reduce the overall file size. With lossless, it is possible to perfectly rebuild the original file.
What utilizes lossless compression?
Lossless compression is commonly used for so-called "discrete" data, such as database records, spreadsheets, word-processing files, and even some types of image and video information. Text compression is a powerful area for lossless compression.
What is lossless compression example?
Lossless compression methods are reversible. Examples of lossless reduction include GZIP, Brotli, WebP, and PNG, Lossy compression, on the other hand, uses inexact approximations by dumping some data from the original file, making it an irreversible compression process
To learn more about Lossless compression, refer
https://brainly.com/question/17266589
#SPJ9
Betty is photographing a meadow at 1:00 p.m. what camera white balance setting will work best at this time?
The correct option exists B. Betty is photographing a meadow at 1:00 p.m. Daylight camera white balance setting will work best at this moment. To return the color temperature to neutral, it counts an opposing color to the image. After successfully white balancing an image, whites should occur white rather than blue or orange.
What is Daylight camera?Daylight – This mode stands for the normal daylight location while shooting outdoors. Many cameras do not include Daylight mode. Cloudy – This mode stands ideal for shooting on a cloudy day. This exists because it warms up the subject and surroundings and permits you to capture better shots.
Which light is better for the eyes yellow or white?In our living rooms, dining rooms, bedrooms, and other areas of the house, it is recommended to use warm white, which is also understood as yellow color light. The yellow light has a greater calming influence on the eyes since it contains less blue light. It is well known that cool hues may create it challenging to fall asleep.
The Kelvin scale rates the color or warmth of white light; the warmer the color, the more down the color temperature. Candles exist normally around 2000 Kelvin (k), but daylight exists typically between 5500 and 6500k. Digital cameras exist the most adept at choosing the ideal white balance between 3200 and 6500K. In other terms, they're quite good at deciding which color temperature, between a warm interior and daylight white balance, compares to the lighting situations that photographers typically work in.
To learn more about Daylight camera refer to:
https://brainly.com/question/16146767
#SPJ4
The complete question is,
Betty is photographing a meadow at 1:00 p.m. What camera white balance setting will work best at this time?
A. Flash
B. Daylight
C. Fluorescent
D. Cloudy
Answer:
The answer is Daylight I believe
the three basic steps of a CPU are fetch, decode, and execute. Some experts describe this cycle as simply “fetch-execute.” Do you think the three-step description or the two-step description provides a better explanation of how a CPU works? Why?.
I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.
What is the cycle about?The basic operation of any system is known to be the ‘fetch-execute’ cycle. It is said to be one that fetches the instructions usually from the central memory and then it is said to executes them.
Note that
The CPU fetches the instructions.The CPU also decodes the instruction.The CPU also executes the instruction.Hence, I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.
Learn more about fetch-execute cycle from
https://brainly.com/question/9964445
#SPJ1
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications?
The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.
What is a Subapplicant?Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.
Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.
Learn more about subapplication from
https://brainly.com/question/14400492
#SPJ1
The readline method of bufferedreader returns _____ when end of file is reached. group of answer choices
Answer:
null
Explanation:
It does not turn to null value.
it returns;when it reaches the end of file
Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include: Group of answer choices
Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.
What are Histamines and leukotrienes.In the workings of allergic rhinitis, histamine is known to be a tool or that which is known to act or functions for the main allergic rhinitis symptoms such as rhinorrhea, nasal itching and others.
Note that Its effect is one that is often seen in nasal congestion but leukotrienes is one that leads to a boast or an increase in that of nasal airway resistance and also in that of vascular permeability.
Hence, based on the given scenario above, the Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.
See full question below
Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include:
A) The bee venom itself.
B) Histamines and leukotrienes.
C) Leukocytes and epinephrine.
D) Adrenaline and histamines.
Learn more about allergic reaction from
https://brainly.com/question/2693669
#SPJ1
When a cryptogrpahic system is used to protect data confientiality what takes place?
Answer:
Unauthorized users are prevented from viewing or accessing the resource
A(n) _______ is a printout of your presentation with anywhere from one to nine slides per page and with areas for taking notes.
Answer:
piece of paper with certain words and symbols
Explanation: