Software uses ____________________________ to continuously monitor for suspicious activity and identify cyber attacks. This is known as the science of getting computers to make their own predictions based on past data.(2 points)

Responses

bandwidth
bandwidth

protocol
protocol

machine learning

1 answer

Software uses machine learning to continuously monitor for suspicious activity and identify cyber attacks. This is known as the science of getting computers to make their own predictions based on past data.