A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer 1

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion


Related Questions

Define Artificial Intelligence(AI) in 5 sentence​

Answers

Answer:

Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. ... The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that have the best chance of achieving a specific goal.

Explain What Peer to Peer Networking is.

Answers

Answer:

peer to peer networking is like when joining together works

which of the following would not transmit signals from one point to another? a. telephone line. b. modem. c. fibre optics. d. coaxial cable​

Answers

Answer:

b

modem

Explanation:

modem is used to receive signals not transmit

When media is used to communicate with a very large audience, it is referred to as media.

Answers

Answer:

mass media

Explanation:

Answer:Mass media communication

Explanation:

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

What contains programming statement written in VB?​

Answers

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use

Answers

Server and network is 2 different things, just put the server on a different network.  ;) duh

Explanation:

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.

Answers

Answer:

memo

Explanation:

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing

Answers

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM

express in Qbasic assignment statement
[tex]v = \ \sqrt{t} ^{2} - 4s \div {d}^{4} [/tex]

[tex]K = {8}{x} ^{3} - {2}{y}^{ 6} \div {5}{d}+ {e}^{4} [/tex]

Answers

Answer:

v = sqr(t^(1/2)) - 4 * s / d^4

K = 8 * x^3 - 2 * y^6 / 5 * d + e^4

Explanation:

Given

[tex]v = \ \sqrt{t} ^{2} - 4s \div {d}^{4}[/tex]

[tex]K = {8}{x}^{3} - {2}{y}^{ 6} \div {5}{d}+ {e}^{4}[/tex]

Required

The equivalent in Q Basic

To solve this, we use the following rules:

+ , - and * are written as + , - and *

[tex]\div[/tex] is written as /

^ stands for raise to power

SQR is used for square

^(1/2) stands for square root.

So, the equivalents of the above statements are:

v = SQR(t^(1/2)) - 4 * s / d^4

K = 8 * x^3 - 2 * y^6 / 5 * d + e^4

if ur computer is runing slowly what is most likey to slove the problem

Answers

One way to solve this problem is if you clear up some storage space. On my computer things were running very slowly and I checked my storage and it was beyond full. Another way would be to clean up your hard drive, run some virus and malware scans as your computer may have some viruses that would be slowing it down. Some others ideas are to download more memory on your computer, install a faster hard drive, and reinstall or upgrade your operating system. I hope this helps!!
Reboot the device or clear your cache. Maybe it may need to go to a shop as well and get a few parts switched out

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

tiền tệ ra đời là kết quả

Answers

bruuh, wht is this man saying

Money was born as a result?

Select the best answer for the ques
12. A business has a goal of communicating frequently with its customers to offer specials and increase sales. What element should it consider adding to its website
O A. Database
O B. Payment system
O C. Calendar
O D. Mailing list opt-in

Answers

The element that should consider adding to its website is Mailing list opt-in. Option D is the correct answer.

Adding a mailing list opt-in to the website would allow the business to collect email addresses from customers who are interested in receiving updates, specials, and promotions.

By building a mailing list, the business can communicate frequently and directly with its customers, informing them about new products, exclusive offers, and other relevant information.

Having a mailing list opt-in provides several advantages. Firstly, it gives the business a direct channel of communication with customers, allowing them to reach a targeted audience interested in their products or services.

Secondly, it helps to increase sales by sending promotional emails and offers to the subscribers, which can encourage them to make purchases. Lastly, it enhances customer engagement and loyalty as customers feel connected to the business and stay informed about its latest offerings. Option D is the correct answer.

For such more question on element:

https://brainly.com/question/4966688

#SPJ8

Laser printer use a special powdered ink called?

Answers

If i am correct it is called toner!

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

The number of swappings needed to sort the number 8, 22, 7, 9, 31 in ascending order, using bubble sort is

Answers

Answer:

3

Explanation:

swap the 7 with the 22

swap the 7 with the 8

swap the 9 with the 22

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

hardware and software are........... to each other​

Answers

Answer:

Hardware and software are interconnected to each other​

Hope this is what you´re looking for!

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future

Answers

Answer:

The organization could make it so that specific websutes that seem fake/unsafe are not accessible to the users. For example, downloading an extension into all the devices, that blocks these malicious websites (uBlock Origin)

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

You are working as a Solutions Architect in a large healthcare organization. You have many Auto Scaling Groups that you need to create. One requirement is that you need to reuse some software licenses and therefore need to use dedicated hosts on EC2 instances in your Auto Scaling Groups. What step must you take to meet this requirement

Answers

Answer:use launch template with your ASG

Explanation:

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

Which of the following are characteristics of centralized version control systems? Select 3 options.

A full copy of all project files is stored on each developer's computer.

Changes to the project are stored in a log file on each developer’s computer.

It allows many developers to work on the same project from anywhere at the same time.

Project files are maintained in a central repository.

The process may require file locking, depending on file type.

Answers

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Answer:c d e

Explanation:

What does RoHS stand for and why is RoHS compliance important?

Answers

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

Other Questions
jenny with two dogs.......walking in the park now. Question 2 of 10If a reader wants to evaluate a text, which is the best question to ask whilereading it?O A. How does this text affect me and what I want to say to the world?O B. What elements do I find interesting, and do I care about theauthor's purpose?O C. What elements are used, and do they help the author's purpose?D. How many hours of research did the author put into writing thistext? Help me please!! JavaFX application for the Sublime Sandwich Shop. The user can order sandwiches by using list boxes and the application displays the price. Each sandwich should allow a choice of at least three main ingredients (chicken, for example) at three different prices. The user should also be able to choose between three different bread types. Use CheckBoxes for additional ingredients - lettuce, tomato, etc.Create an ArrayList to hold all of the sandwiches associated with an order. Display information about all the sandwiches that were ordered. Ilang litro ng tubig ang kailangang isalin sa timba na naglalaman ng 10 000 mililitro How do liberals and conservatives differ in their view of the causes ofsocial problems? *A.Liberals believe social problems are caused by high taxes; conservatives believethey are caused by bad government.B.Liberals believe immigration is the cause of social problems; conservatives blamegovernment interference.C.Liberals believe social ills are caused by poverty; conservatives believe they arecaused by character and morality.D.Liberals believe that social problems can be solved by governmental police powers;conservatives disagree. ; (b) A uniform beam 150cm long weighs 3.5kg andsupported on knife-edges at its ends. The beamsupports a weight 7kg at a distance 30cm fromone end. Find the reactions of the supports. A sample of Radon-222 has a half-life of 3.82 days. After 11.46 days, there is 5 grams of Radon-222 remaining. How much Radon-222 was in the original sample?30 grams2 grams15 grams40 grams Instructions: In this section, use complete sentences. (It is understood that you want to learn to debate.) Elaborate using at least 10 sentences. Prompt: What are your expectations of this class? What is it that you want to learn? Additionally, you may tell me anything else you feel I need to know how is the frictional force produced? Make a substitution to express the integrand as a rational function and then evaluate the integral. (Remember to use absolute values where appropriate. Use C for the constant of integration.) 2 sec^2(t)/tan^2(t) + 14 tan(t) + 48 dt What volume of each solution contains 0.14 mol of KCl? Express your answer using two significant figures.1.8 M KCl At the beginning of the year, Sigma Company's balance sheet reported Total Assets of $267,000 and Total Liabilities of $103,000. During the year, the company reported total revenues of $314,000 and expenses of $243,000. Also, owner withdrawals during the year totaled $64,000. Assuming no other changes to owner's capital, the balance in the owner's capital account at the end of the year would be: Which one of the following physical quantities is formed after dividing mass of volume?I} WeightII} VelocityIII} DensityIV}Work The population of a city is currently 45,000 and is declining at a rate of 2% each year. Give a formula for determining the total population after a period of t years.Question 4 options:A) A = (45,000)e0.02tB) A = 45,000 + e0.02tC) A = (45,000)e0.02tD) A = 45,000 + e0.02t identify specific features or landmarks The graph below shows how solubility changes with temperature.A graph with the horizontal axis showing temperature ranging from 0 to 10 in units of 10 and the vertical axis solubility in grams of salt per 100 grams of water. Several compounds are shown. All data are approximate. The substances and their coordinates are as follows: upper N a upper C l: 0, 38; 10, 38; 20, 38; 30, 38; 40, 39; 50, 39; 60, 39; 70, 40; 80, 40; 90, 40; 100, 40. Upper N a subscript 2 upper H upper A s upper O subscript 4: 0, 5; 10, 18; 20, 28; 30, 39; 40, 49; 60, 65; 80, 82. Upper B a (upper N upper O subscript 3) subscript 2: 0, 5; 10, 8; 30, 12; 40, 15; 50, 18; 60, 20; 80, 28; 100, 33. Upper N a subscript 2 upper S upper O subscript 4: 0, 5; 5, 8; 10, 10; 15, 15; 20, 20; 25, 20; 28, 35; 30, 40; 32, 49; 33, 50; 35, 50; 40, 48; 50, 47; 60, 46; 70, 45; 80, 43; 90, 32; 100, 40. Upper C 3 subscript 2 (upper S upper O subscript 4) subscript 3 dot 9 upper H subscript 2 upper O: 0, 18; 20, 10; 30, 8; 50, 5; 60, 3; 80, 1; 100, 0.How many grams of NaCl will be needed to form 600 mL of a saturated solution at 100C?15 g24 g40 g240 g answer 240g If x+y=8 and xy =15 find the value of x+y. Which of the following quantities is measured by the area under the velocity time graph? (a) Magnitude of velocity (b) Magnitude of acceleration (c) Magnitude of displacement (d) Average Speed forward i'm heavy, backward i'm full. what am i? The temperature in Kansas City varies greatly some days. One day in January, the temperature was 16 degrees but then the temperature decreased by 23 degrees by midnight. What was the temperature at midnight?