Surface modification techniques are used in order to modify the surface properties of materials. There are two types of surface modification techniques, line-of-sight, and non-line-of-sight processes.
The two surface modification techniques that are considered line-of-sight and non-line-of-sight processes are explained below: Line-of-Sight Processes: Physical Vapor Deposition (PVD): PVD is a line-of-sight process in which a material vaporizes into the gas phase and condenses onto the surface to be coated. Sputter deposition, evaporation, and ion plating are all examples of PVD techniques. Chemical Vapor Deposition (CVD): CVD is another line-of-sight process that involves heating the substrate to a high temperature in the presence of a gas that contains the desired coating material. The reaction causes a layer of material to deposit on the substrate. Non-Line-of-Sight Processes: Electroplating: Electroplating is a non-line-of-sight process that uses a power source to deposit a metal coating onto a substrate. The substrate is placed in an electrolyte solution containing the desired metal ions, and an electric current is applied, causing the metal ions to be deposited onto the substrate. This method is commonly used for decorative coatings on jewellery and metal objects. Chemical Etching: Chemical etching is another non-line-of-sight process that is used to selectively remove layers of material from a substrate. A mask is placed on the surface of the substrate to protect areas that do not need to be removed, and the substrate is then exposed to a chemical solution that dissolves the exposed material. This process is used in the manufacture of microelectronic devices. In conclusion, line-of-sight processes such as Physical Vapor Deposition and Chemical Vapor Deposition involve a material vaporizing into the gas phase and condensing onto the surface to be coated while non-line-of-sight processes such as Electroplating and Chemical Etching involve other mechanisms for coating and modifying surfaces.
To learn more about Surface modification, visit:
https://brainly.com/question/31973864
#SPJ11
What are like arms surrounding all the other code blocks?
A. chevrons
B. curly braces
C. square braces
D. parentheses
Answer:
Parenthesis
Explanation:
I code
Answer:
Its curly braces.
Your welcome!
difference between data bus and address bus and control bus
Answer: The address bus carries the information about the device with which the CPU is communicating and the data bus carries the actual data being processed, the control bus carries commands from the CPU and returns status signals from the devices.
elect the most accurate statement about Push and Pull methods, or indicate if they re all false.
a. A push approach is reactive to market demands Push systems require a lot of flexibility to replenish and respond quickly to real demand.
b. None of these; they are all false.
c. Pull systems require a signaling mechanism or other way to have visibility of the demand.
d. The forecast for the next few weeks shows that inventory should fall to nearly zero at the end of the month. We decide to produce 100 units now. This is a pull system.
The most accurate statement about Push and Pull methods is:c. Pull systems require a signaling mechanism or other way to have visibility of the demand.
In a pull system, production and replenishment are triggered based on the actual demand signals. This means that the system waits for a signal from downstream processes or customers before initiating production or replenishing inventory. This signaling mechanism provides visibility of the demand and helps prevent overproduction or excessive inventory buildup.
The other statements are either inaccurate or do not provide a clear description of push and pull systems. Statement a is incorrect because push systems are typically not reactive to market demands, as they rely on forecasts or production schedules. Statement d describes a scenario but doesn't provide a clear indication of whether it's a push or pull system without additional context. Therefore, the most accurate statement is c.
To know more about systems click the link below:
brainly.com/question/29532405
#SPJ11
______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.
Safety stock inventory management refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.
What is Safety stock inventory?Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.
Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.
Learn more about Safety stock inventory form
https://brainly.com/question/26954616
Angie is using a device that transmits information to a specific destination instead of to the entire network. what is this device?
The device Angie is using to transmits information to a specific destination is called a router.
A router is a networking device in computer networks that forwards data packets. Data is sent to a specific place rather than the entire network using it to connect networked devices.
The best path for data packets to take is determined by routers using routing tables and protocols. They can also be configured with security tools like firewalls to prevent unauthorized access to the network.
In both home networks and commercial networks, routers are widely used to link devices to the internet and to one another. Additionally, they can be used to move data across networks in larger networks, such those accessed by internet service providers.
To know more about transmits information kindly visit
brainly.com/question/9940557
#SPJ4
Use the drop-down menus to select the answer that best completes each statement.
A person who finds a way to watch a recent movie online without paying for it is violating
A student who posts an inappropriate comment about a person via social media is violating
A student who visits a school-banned website that contains offensive content is violating school rules on
A person who finds a way to watch a recent movie online without paying for it is violating movie copyright.
A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.
A student who visits a school-banned website that contains offensive content is violating school rules on censorship.
What is Movie Piracy?This refers to the illegal copying and selling of DVDs and CDs without the permission of the owner.
Hence, we can see that a person who finds a way to watch a recent movie online without paying for it is violating movie copyright.
A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.
A student who visits a school-banned website that contains offensive content is violating school rules on censorship.
Read more about movie piracy here:
https://brainly.com/question/8042416
#SPJ1
Answer: all the answers are here
Explanation:
To create a new document using a template, navigate to the _____ tab.
File
Home
New
Page Layout
Answer:
uhh...
Explanation:
i think it might be the new tab.
Which of the following statements best describes hard drives typically found in laptops?
A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktop PCs.
B. They are 3.5-inch ATA drives just like those found in desktop PCs, but they usually require "cable select" settings rather than master or slave.
C. They are 3.5-inch SATA drives that hold more data than the 2.5-inch hard drives found in desktop PCs.
D. They are 2.5-inch PCMCIA drives, while desktops usually have 3.5-inch SCSI drives.
The correct option is A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktop PCs.Hard drives are one of the most important components of a laptop. Without it, the laptop will not have an operating system or user data storage.
In laptops, hard drives are similar to those used in desktop computers, with the exception that they are smaller and lighter, as well as less powerful and have a smaller storage capacity. The 2.5-inch SATA drive is the most typical type of hard drive found in a laptop.
SATA, which stands for Serial Advanced Technology Attachment, is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. The SATA interface has been used in laptop hard drives since the late 1990s and early 2000s due to its fast data transfer speed, ease of installation, and low cost. The 3.5-inch hard drives found in desktop PCs are larger than the 2.5-inch SATA drives found in laptops and therefore have more storage capacity. These are also typically faster and more powerful. However, the size difference makes it impossible to install these on the laptop.
To know more about Serial Advanced Technology Attachment,
https://brainly.com/question/29661435
#SPJ11
Which of the following reasons for writing a formal business document would
lead you to write a proposal?
OA. To tell your manager a project is on budget and on schedule
OB. To describe what tasks you completed during the week
OC. To summarize what happened during a meeting
OD. To convince your manager to use a new meeting organization tool
SUBMIT
Answer:
C. To summarize what happened during a meeting
Explanation:
because it would be a lot easier if u told him the truth...
Give atleast 5 criteria for testing electronic components based on skills f computer hardware technician which you like the mosy and define each criterion you have chosen
The criteria for testing electronic components based on skills are:
The predetermined desired values.The tolerance ranges for voltages found in the electronic component, Know the specific forward voltages and/or currents. Know the specific reverse currents.Test Instruments.What are the criteria for testing electronic components?The test criteria that can be done so as to predetermined values for input voltages and/or input currents to be used in terms of the electronic component are:
The predetermined desired values.The tolerance ranges for voltages found in the electronic component, etc.Hardware parts.Memory and storage information, etc.By knowing the above, one can be able to know all the criteria for testing electronic components based on skills of the computer hardware technician.
Learn more about electronic components from
#SPJ1
1. what are the steps for transforming a data model into a database design?
The process of transforming a data model into a database design involves include identifying entities and relationships, defining attributes and data types, establishing primary and foreign keys, normalizing the data, and considering performance and optimization factors.
The first step in transforming a data model into a database design is to identify entities and their relationships. This involves analyzing the requirements and determining the main entities and their associations. Entities represent real-world objects or concepts, while relationships define the connections between these entities.
The next step is to define attributes and data types for each entity. Attributes represent specific properties or characteristics of an entity, and data types determine the format and range of values for these attributes. This step helps in structuring the data properly and ensuring its integrity and consistency.
Once attributes are defined, the third step involves establishing primary and foreign keys. A primary key is a unique identifier for each entity instance, while foreign keys create relationships between entities. Primary and foreign keys help maintain data integrity and enable efficient querying and retrieval of information.
After defining keys, the next step is to normalize the data. Normalization is the process of organizing data into tables to eliminate redundancy and ensure data consistency. This step involves applying normalization rules to identify dependencies and create tables that minimize data duplication and update anomalies.
Lastly, during the transformation process, it is important to consider performance and optimization factors. This involves optimizing the database design for efficient storage, retrieval, and manipulation of data. Techniques such as indexing, partitioning, and denormalization may be employed to enhance performance based on the specific requirements of the application.
By following these steps, a data model can be effectively transformed into a well-designed and efficient database structure that meets the requirements of the intended application.
Learn more about database here:
https://brainly.com/question/30163202
#SPJ11
Mass, unsolicited email messages, called ________, are the result of a malicious script scam
Mass, unsolicited email messages, called spam, are the result of a malicious script scam. Spam is a major issue for both email users and internet service providers (ISPs) around the world.
There are several types of spam, including viruses, phishing scams, and scams that attempt to trick users into downloading malicious software. Some spammers use fraudulent methods to obtain email addresses, while others use lists purchased from third-party vendors. ISPs and email providers use filters to try to detect and block spam messages.
It is crucial to never click on any suspicious links or attachments in spam emails. These may lead to malicious websites that can steal private information or download malware onto the user's computer. Users can also protect themselves by using strong passwords and antivirus software, and by avoiding using their primary email address for online purchases or social media sites.
To know more about malicious visit:
https://brainly.com/question/32063805
#SPJ11
Python
Write a function that calculates a cell phone bill
First screenshot of rules and such
Second screenshot is example of outcome
print("welcome to the bill calculator")
minutes = float(input("number of minutes you used: "))
data = float(input("the amount of data you used in GB: "))
print("your basic plan costs $39.99 per month")
mcost = (minutes - 450) * .45
print("you will be charged " + str(mcost) + " for the minutes you used")
print("the monthly data fee is $30.00")
dcost = (data - 3) * 10
print("you will be charged " + str(dcost) + " for the extra data you used")
total = mcost + dcost + 69.99
print("your total bill is " + str(total))
the 20 value your teacher gave may be incorrect, bc 4.2-3*10 = 12 not 20, making the total 109.89
What is/are the correct increasing order of downlink of satellite bands? Select one or more: □ a. L < Ku
The correct increasing order of downlink satellite bands is - L < S < C < Ku < Ka (Option B).
How is this so?It is to be noted that the order of downlink satellite bands is based on their frequencies,with lower frequencies being assigned to longer wavelengths.
In this case, L-band has lower frequency thanS -band, C-band has lower frequency than both L-band and S-band, and so on, resulting in the order L < S < C < Ku < Ka.
The downlink satellite bands,in increasing order of frequency are:
L-bandS-bandC-bandKu-band and Ka-band.Learn more about Satellite bands:
https://brainly.com/question/31384183
#SPJ1
What is ABC computer?
Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.
Explanation:
Which of the following is not a benefit that can be provided by using IP telephony. A. Decrease network utilization. B.increase user productivity
Reduced network use cannot be achieved by using IP telephony. Technologies that exchange voice, fax, and other sorts of information via a multitude of protocols are known as "IP telephony" (Internet Protocol telephony).
WHAT IS IP telephony?Technologies that exchange voice, fax, and other sorts of information via a multitude of protocols are known as "IP telephony" (Internet Protocol telephony). Typically, these technologies use the Public Switched Telephone Network (PSTN).
The call is sent as a sequence of packets over a LAN or the Internet to avoid PSTN fees.
In the middle to late 1990s, changes in the telephone and communications sectors were first influenced by the Internet and the TCP/IP protocol.
The Internet Protocol has essentially replaced all other data communication methods.
Today, all providers of communication services, whether fully or in part, employ IP infrastructure for their voice services. The bulk of firms have already switched from PSTN to VoIP for internal communications (Voice over IP).
Hence, Reduced network use cannot be achieved by using IP telephony.
learn more about IP TELEPHONY click here:
https://brainly.com/question/14255125
#SPJ4
suppose packet switching is used. what is the probability that one user (any one among the 11 users) is transmitting, and the remaining users are not transmitting?
The probability that one user is transmitting and the remaining users are not transmitting is approximately 0.000488 or 0.0488%.
In a packet switching system with 11 users, the probability that one user is transmitting while the remaining users are not transmitting can be calculated using the concept of independent events.
To find this probability, we need to consider the number of users who are transmitting and the number of users who are not transmitting.
Since only one user is transmitting, there are 10 users who are not transmitting.
The probability of one user transmitting can be calculated as the probability of success for that user, multiplied by the probability of failure for the remaining users.
Let's assume that the probability of any user transmitting is p, and the probability of a user not transmitting is (1-p).
To find the probability that one user is transmitting and the remaining users are not transmitting, we can use the formula for calculating the probability of independent events:
P(1 user transmitting and 10 users not transmitting) = P(transmitting) * P(not transmitting)^10
Substituting the values into the formula, we get:
P(1 user transmitting and 10 users not transmitting) = p * (1-p)^10
Now, let's assume p = 0.5, meaning each user has a 50% chance of transmitting and a 50% chance of not transmitting. Substituting this value into the formula, we have:
P(1 user transmitting and 10 users not transmitting) = 0.5 * (1-0.5)^10
Simplifying the equation, we get:
P(1 user transmitting and 10 users not transmitting) = 0.5 * 0.5^10
Calculating this expression, we find:
P(1 user transmitting and 10 users not transmitting) = 0.5 * 0.0009765625 = 0.00048828125
Therefore, the probability that one user is transmitting and the remaining users are not transmitting is approximately 0.000488 or 0.0488%.
To know more about probability visit :
https://brainly.com/question/33317440
#SPJ11
If it is 12 am on January 7 in Reykjavík, Iceland (location B), what date and time is it in Galápago Islands,
Ecuador (location E)?
Answer:
Since the time zone of the Galapagos Islands is UTC -06: 00, while the time zone of Iceland (including its capital, Reykjavik) is UTC 00:00, the time difference between both territories is 6 hours behind in the Islands Galapagos with respect to Iceland.
Thus, since 12:00 AM implies 00:00 hours or the beginning of the day, if it were 12:00 AM on January 7 in Reykjavik, it would be 06:00 PM on January 6 in the Galapagos Islands.
How a Programmatic NEPA Review (for our purposes this will be a
Programmatic EIS) differs from an EIS (referred to as a project
level EIS)?
A Programmatic NEPA Review, or Programmatic Environmental Impact Statement (PEIS), differs from a project-level Environmental Impact Statement (EIS) in several ways. The main differences include the scope and level of detail involved in each type of analysis.
The key differences between a Programmatic NEPA Review (Programmatic EIS) and a project-level EIS are as follows:
1. Scope: A Programmatic NEPA Review (Programmatic EIS) examines the impacts of an entire program, policy, or regulatory decision and covers a wide range of potential future actions, while a project-level EIS is site-specific and focuses on the impacts of a specific project.
2. Level of Detail: A Programmatic NEPA Review (Programmatic EIS) provides a broader analysis of environmental impacts .
3. Timeframe: A Programmatic NEPA Review (Programmatic EIS) covers a longer time frame and is typically completed before any specific projects are proposed .
4. Decision-Making: A Programmatic NEPA Review (Programmatic EIS) can help inform decision-making at a higher level .
5. Flexibility: A Programmatic NEPA Review (Programmatic EIS) provides greater flexibility in the implementation of future projects .
To know more about Programmatic visit:-
https://brainly.com/question/30778084
#SPJ11
Besides the tool bar panel, where else can you change the stroke and fill colors of selected objects?
O timeline
O properties panel
O on the stage
O library panel
Which of the following types of traffic is not exchange by Remote Desktop clients and servers using the Remote Desktop Protocol (RDP)?a. Keystrokesb. Mouse movementsc. Display informationd. Application data
The types of traffic that are not exchange by using Remote Desktop Protocol (RDP) is d. Application data.
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft to provide a graphical interface for remote access to another computer over a network connection. When a user connects to a remote desktop using RDP, they can interact with the remote computer as if they were physically present at that computer.
RDP exchanges various types of traffic between the client and server, including keystrokes, mouse movements, and display information. Keystrokes and mouse movements allow the user to interact with the remote desktop environment, while display information is used to send visual data from the remote desktop to the client computer.
Learn more about Remote Desktop Protocol here:
brainly.com/question/28903876
#SPJ11
Electronic access control systems are comprised of field equipment, decision modules, communication networks, databases, and one or more ? .
Electronic access control systems typically comprises field equipment, databases, decision modules, communication networks, and one or more computer workstations (human interface interfaces).
What is access control?An access control can be defined as a security technique that is designed and developed to enable a computer workstation determine whether or not an end user has the minimum requirement, permissions and credentials to access, use or view the file(s) and folder resources that are stored on a computer.
What is a workstation?A workstation is also referred to as a computer system and it can be defined as an electronic device that is designed and developed to receive data in its raw form as an input, and processes these data into an output (information) that could be used by an end user.
In this context, we can infer and logically deduce that electronic access control systems typically comprises field equipment, databases, decision modules, communication networks, and one or more computer workstations (human interface interfaces).
Read more on access control here: brainly.com/question/3521353
#SPJ4
Which of the following statements a), b) or c) is false?
A) The preferred mechanism for accessing an element's index and value is the built-in function enumerate, which receives an iterable and creates an iterator that, for each element, returns a tuple containing the element's index and value.
B) The following code uses the built-in function list to create a list of tuples containing enumerate's results: colors = ['red', 'orange', 'yellow']
Colors_list = list(enumerate(colors))
C) The following for loop unpacks each tuple returned by enumerate into the variables index and value and displays them: for index, value in enumerate(colors):
Print(f'{index}: {value}')
D) All of the above statements are true.
Statement (C) "The following for loop unpacks each tuple returned by enumerate into the variables index and value and displays them: for index, value in enumerate(colors): Print(f'{index}: {value}')" is false.
The correct syntax for the print function is lowercase "print," not uppercase "Print." So, the correct code would be:
for index, value in enumerate(colors):
print(f'{index}: {value}')
Statement A) is true. The preferred mechanism for accessing an element's index and value is the built-in function enumerate. It creates an iterator that, for each element, returns a tuple containing the element's index and value.
Statement B) is true. The given code uses the built-in function list to create a list of tuples containing the results of enumerate applied to the colors list.
Option C is answer.
You can learn more about loop at
https://brainly.com/question/26568485
#SPJ11
It is estimated what percentage of jobs are filled through networking?
The correct answer is Networking has become a crucial aspect of the job search process, with many employers preferring to hire candidates who are referred by someone they know or trust. While exact figures are difficult to come by, it is estimated that between 60% and 85% of jobs are filled through networking.
According to a survey by LinkedIn, 85% of jobs are filled through networking to some extent. This includes not only direct referrals but also recruiters who source candidates through their networks. Another study by the Adler Group found that 85% of jobs are filled through networking, with 70% of job seekers finding their next job through personal connections. However, other studies have suggested lower percentages. A survey by Jobvite found that 60% of jobs were filled through networking, while a study by CareerXRoads found that employee referrals accounted for 28.5% of all hires. Overall, while the exact percentage may vary depending on the study and industry, it is clear that networking plays a significant role in the job search process. Therefore, it is essential to cultivate and maintain professional relationships to increase your chances of landing your dream job.
To learn more about Networking click on the link below:
brainly.com/question/14276789
#SPJ4
Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?
Answer:
Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.
which firewall rule group must be enabled to allow for the remote use of the task scheduler snap-in?
To allow for remote use of the task scheduler snap-in, the firewall rule group "Remote Scheduled Tasks Management" must be enabled.
Which two actions are available for antivirus security profiles? (Choose two.)
A. continue
B. allow
C. block IP
D. alert
The two actions available for antivirus security profiles are "block IP" and "alert".
When a security profile is created for antivirus, it is important to determine how it will respond to potential threats. Blocking the IP of a known malicious source can prevent any potential attacks from that source. Additionally, setting up alerts can notify administrators of potential threats so they can investigate further and take necessary actions to protect the network. It is important to regularly review and update antivirus security profiles to ensure that they are effective in protecting against evolving threats.
learn more about antivirus security here:
https://brainly.com/question/31545521
#SPJ11
Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store the document with a different name and makes changes in the new document?
Answer:
she can use Ctrl S then open it again
Explanation:
i hope this helps and please mark as brainliest
11.
Mona is confused about finite loop and infinite loop, explain her with the help of
example.
Answer:
The basic difference between finite and infinite is the number of times it runs and ends. The loop is basically a set of instructions that keeps repeating itself.
The finite loop ends after running for a finite times. This body of finite loop will stop executing after certain condition is reached. Hence the finite loop body keeps executing itself finite number of times.
An infinite loop keeps running and repeating itself endlessly.This loop never ends. This loop can be the result of an error in a program. For example when no stopping or exit condition is specified in the program.
Explanation:
Example of finite loop:
Lets take for loop as an example:
for(int i =0; i<=5; i++)
{ cout<<i<<endl; }
Now the loop starts from i=0
Next it enters the body of loop to execute the statement: cout<<i; which means that the value of i is displayed on the output screen.
This loop keeps executing until the value of i exceeds 5.
At first iteration 0 is printed on the output screen, at second iteration 1, at third iteration 2, at fourth iteration 3, fifth iteration 4, sixth iteration 5. After each of these iterations, the value of i is incremented by 1.
When 5 is printed, then at the next iteration the specified condition i.e. i<=5 gets false as the value of i now becomes 6 after incremented by 1.
So the loop stops running. So this means that loop ran for finite times and stopped after the a certain condition is reached. The output is:
0
1
2
3
4
5
Example of infinite loop:
Lets take while loop:
int i = 6;
while (i >=5)
{ cout<< i;
i++; }
In the above example, the loop will run infinite times. Here the value of i is initialized to 6. Then while loop is used which checks the condition which is the value of i is greater than or equal to 5. If the condition is true, the body of the loop starts executing which prints the value of i. Lets see what happens at each iteration:
1st iteration: i>=5 is True because i=6 and 6 is greater than 5. The program control enters the body of loop. The statement cout<<i prints 6. Next the value of i is incremented by 1 and it becomes 7.
2nd iteration: i>=5 is True because i=7 and 7 is greater than 5. The program control enters the body of loop. The statement cout<<i prints 7. Next the value of i is incremented by 1 and it becomes 8.
This loop will repeat itself infinite times and never stops as i will always have value greater than 5. So this is the example of infinite loop.
When a condition constantly evaluates to true, the loop control does not travel outside of that loop, resulting in an infinite loop.
Infinite loop and example:When a condition never turns false, the program enters a loop, which keeps repeating the same block of code over and over, with no end in sight.
An endless loop is demonstrated in the following example: b = input("what's your name?") while a==1 ", Welcome to Intellipaat!" print("Hi", b, ",
Find out more information about 'Loop'.
https://brainly.com/question/2081668?referrer=searchResults
What are three machine-intelligible message structures that group strings of bits for network transmission? (choose three.)
The three machine-intelligible message structures that group strings of bits for network transmission are:
SegmentsFramesPacketsWhat is machine-intelligible?Machines may exhibit intelligence, as opposed to animals and people who can do so naturally. This is known as artificial intelligence.
Artificial intelligence (AI) is a tool that "intelligent" computers use to think and act independently. A computer system's intelligence is built through machine learning. Use of a neural network, which is a collection of algorithms designed after the human brain, is one method for teaching a computer to imitate human reasoning.
What is network transmission?Transferring data between two devices is known as transmission mode. A communication mode is another name for it. The purpose of networks and buses is to enable communication between separate, interconnected devices.
To know more about artificial intelligence visit:
https://brainly.com/question/23824028
#SPJ4