Define what is a software agent, Computer Networking

Assignment Help:

QUESTION

(a) Define what is a software agent?

(b) An intelligent agent is known to exhibit several characteristics or properties that distinguish it from another piece of software. List and describe five of these characteristics or properties apart from reactiveness and proactiveness

(c) A key issue in agent architectures is balancing reactiveness and proactiveness. Explain why balancing these two above-mentioned properties is an important issue

(d) Explain the difference between agents and objects

(e) Explain the difference between agents and expert systems

(f) Give two applications of agent technology


Related Discussions:- Define what is a software agent

What is ping utility, PING - Packet Internet Gopher A utility that shows...

PING - Packet Internet Gopher A utility that shows connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to verify whether

Subnetting, Calculate the Network Address, the broadcast address and the ho...

Calculate the Network Address, the broadcast address and the host range, for the following host address i. 192.168.180.94/27 ii. 172.23.8.19 /21 iii. 147.252.238.20 255.255.240.0 b

Network layer - computer network, Network Layer The  internet  network...

Network Layer The  internet  network  layer is  responsible  for moving  network  layer  packets  known data grams  from one host to another. The internet transport  layer pro

What is cross over cable, Q. What is Cross over cable? - Cross the crit...

Q. What is Cross over cable? - Cross the critical pair to properly transmit, align and receive signals on devices with like connections. - Pin 1 connected to pin 3 as well a

State synchronous FDDI, Synchronous Synchronous traffic is able to cons...

Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

Determine theoretical data capacity of the wireless channel, Consider a sim...

Consider a simple wireless data link using channel bandwidth of 40 kHz. The transmit power level is 20 dBm, the link attenuation is 40 dB and the SNRdB at the receiver is 20 dB.

The functions of the typical server program, What are the functions of the ...

What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.

Explain semantic web , What the Semantic Web is? Ans) The Semantic Web ...

What the Semantic Web is? Ans) The Semantic Web is a vision, that thinks to join together dispersed bits of data on the internet, very much like web pages are presently joined

Types of ends in wan, There are two types of ends in WAN (1)DTE (DATA TE...

There are two types of ends in WAN (1)DTE (DATA TERMINAL EQUIPMENT) (2)DCE(DATA COMMUNICATION EQUIPMENT)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd