1. Review and write summary report on Artificial Intelligence (AI), your report should include from starting point of Al to the future of AI in brief and short way.​

Answers

Answer 1

Summary report on Artificial Intelligence (AI):

The term artificial intelligence broadly refers to the application of technology to perform tasks that resemble human cognitive functioning, and is typically defined as "the ability of a machine to imitate intelligent human behaviour." Artificial intelligence typically involves "the theory and development of artificial intelligence systems capable of performing tasks that normally require human intelligence, such as visual perception, speech recognition, decision making, and  between languages." John McCarthy, one of the founders of the study of artificial intelligence, "defined the field of using computers to do things that are said to be intelligent when people do them."

Artificial intelligence is used as an umbrella term to cover a wide range of different technologies and applications, some of which are mentioned below.

Machine Learning (ML) Natural Language Processing (NLP) Computer vision (CV) Robotics Process Automation (RPA)

AI applications typically involve the use of data, algorithms and human feedback. Ensuring that all these components are properly structured and validated is essential to developing and deploying AI applications.

What is Machine Learning ?

Machine learning is a branch of computer science that uses algorithms to process and learn from large amounts of data. Unlike traditional rule-based programming, ML models10 learn from input data to predict or identify meaningful patterns without being specifically programmed to do so. There are different types of ML models depending on their intended task and structure:

Supervised Machine Learning: In supervised ML, a model is trained with labeled input data that correlates with a specified output. Reinforcement learning: In reinforcement learning, the model learns. dynamically to achieve the desired output through trial and error Unsupervised Machine Learning: In unsupervised ML, the input data is unlabelled and the output is undefined Deep Learning: A deep learning model is built on an artificial neural network where algorithms process large amounts of unlabelled or unstructured data through multiple learning layers  in a way inspired by how neural networks work in the brain

To learn more about machine learning, visit;

https://brainly.com/question/29386217

#SPJ9


Related Questions

What is output by the following code? Select all that apply.

c = 0
while (c < 11):
c = c + 6
print (c)

Answers

When the above code is entered into the Python online compilers and run, the output is 12.

What is an online compiler?

An online compiler is a technology that allows you to build and run source code in a variety of computer languages online. For program execution, an online compiler is required. It translates the text-based source code into an executable form known as object code.

The print() function sends the specified message to the screen or another output device. The message can be a string or another object that is converted to a string before being shown on the screen.

Hence, where:

c = 0

while (c < 11):

 c = c + 6

print (c)

Output = 12

Learn more about compilers:
https://brainly.com/question/27882492
#SPJ1

1. Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, such as Sun for Sunday. The program should be able to perform the following operations on an object of type dayType:

a. Set the day.
b. Print the day.
c. Return the day.
d. Return the next day.
e. Return the previous day.
f. Calculate and return the day by adding certain days to the current day. For example, if the current day is Monday and we add 4 days, the day to be returned is Friday. Similarly, if today is Tuesday and we add 13 days, the day to be returned is Monday.
Add the appropriate constructors.

2. Also, write a program to test various operations on this class .

Answers

Using the knowledge in computational language in C++ it is possible to write the code that design and implement a class dayType that implements the day of the week in a program.

Writting the code:

#include "stdafx.h"

#include<iostream>

#include<cmath>

sing namespace std;

class dayType

{

public: int presday;

int prevday;

int nextday;

dayType()

presday = 0;

nextday = 0;

prevday = 0;

}

void set(int day); //function declarations

void print(int day);

int Next_day(int day);

int day();

int prev_day(int pres);

};

void dayType::set(int day) //member functions

{

presday = day;

}

/* modify here*/

int dayType::prev_day(int day)

{

prevday = presday - day;// =abs(presday-day);

if (prevday<0)prevday += 7;

return prevday;

}

int dayType::day()

{

return presday;

}

int dayType::Next_day(int day)

{

nextday = presday + day;

if (nextday>7)

{

nextday = nextday % 7;

}

return nextday;

}

void dayType::print(int d)

{

if (d == 1)

cout << "Monday" << endl;

if (d == 2)

cout << "Tuesday" << endl;

if (d == 3)

cout << "Wednesday" << endl;

if (d == 4)

cout << "Thursday" << endl;

if (d == 5)

cout << "Friday" << endl;

if (d == 6)

cout << "Saturday" << endl;

if (d == 7)

cout << "Sunday" << endl;

}

/* here modify change void to int type */

int main()

{

int d, p, n;

dayType obj;

cout << "1-Mon" << endl << "2-Tue" << endl << "3-Wed" << endl << "4-Thur" << endl << "5-Fri" << endl << "6-Sat" << endl << "7-sun" << endl;

cout << "Enter Day";

cin >> d;

obj.set(d);

cout << "Present day is";

obj.print(d);

cout << "Enter number of days next";

cin >> d;

n = obj.Next_day(d);

cout << "Next day is";

obj.print(n);

cout << "Enter number of days previous";

cin >> d;

p = obj.prev_day(d);

cout << "previous day is";

obj.print(p);

system("Pause");

return 0;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

A research scholar has to work as a judge and derive the truth and not as a pleader who is only eager
to prove his case in favour of his plaintiff. Discuss the statement pointing out the objectives of
research.

Answers

A research scholar is a person who focuses primarily and is practical to affect changes in the world, not a judge in which he proves something.

Who is a researcher?

Someone who conducts research is a researcher. This signifies that the person conducts one type of research on a certain topic, which also suggests that only some previously acquired knowledge may be further examined.

The responsibilities of a scholar include: assisting freshmen in learning various cutting-edge approaches to keep graduates current with the area. it is to take control of the group's research, production, and statistical activities. to examine their research and make sure it is original and free of plagiarism.

Learn more about researcher, here:

https://brainly.com/question/14693819

#SPJ1

PLEASE answer me quick its due tomorrow so please answer


- What is a Computer Network?

- What is the concept of Internet of things (IOT)?

- What are the elements of a Smart Object?

- Explain the the concept of Micro-Controller.

Answers

A computer network is a collection of computers that share resources that are located on or provided by network nodes. To interact with one another, the computers employ standard communication protocols across digital linkages.

The Internet of Things refers to physical items equipped with sensors, processing power, software, and other technologies that communicate and share information with other devices and processes over the Internet or other network infrastructure.

Sensors, microprocessors, storage systems, controls, programming, and embedded system software with enhanced user interface make up a smart object.

A microcontroller is a small integrated circuit that controls a single function in an embedded system. On a single chip, a typical microcontroller has a CPU, memory, and input/output (I/O) peripherals.

All the above are part of computer architecture.

What is computer architecture?

Computer architecture is a collection of principles and procedures used in computer engineering to explain the functioning, structure, and deployment of computer systems. A system's architecture refers to its structure in terms of individually stated components and their interrelationships.

The hardware, system software, and user layers comprise computer architecture.

Learn more about computer networks:
https://brainly.com/question/14276789
#SPJ1

What does it mean to say,"we are in a post-PC world?"

Answers

Answer:

The use of mobile devices rather than only desktop computers for games, Internet access, general computing and as a terminal to the corporate network. We are in the post-PC era today.

17 Can you determine Lack of Encryption and Security Misconfiguration in an organisation?

Answers

It is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

What do you mean by Security misconfiguration?

Security misconfiguration may be defined as a type of security control that is significantly configured or left insecure inaccurately by putting your systems and data at risk. It may arise when essential security settings are either not implemented or implemented with errors.  

A lack of encryption and security misconfiguration is easily determined by the employees of an organization. It may cause a potential threat to the organization by stealing all its personal and confidential information that harms the whole institution or organization.

Therefore, it is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

To learn more about Security misconfiguration, refer to the link:

https://brainly.com/question/29095078

#SPJ1

When purchasing software or downloading music and games online, how can you make legal choices? Use details to support your answer.

Answers

When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that  depending on the place  you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it  is said to be illegal.

Is it legal to download music for personal use?

The majority of music and film content found on download or file-sharing websites is copyrighted. Downloading any copyrighted music or films is prohibited. A lawsuit for financial damages that might cost you hundreds or even thousands of dollars could be brought against you if you download or share a copyrighted song or movie.

Note that copyright statute guards that music, making it illegal to duplicate and distribute it without the consent of individuals who have an interest in it. In other words, if someone downloads a song without paying for it, they have probably engaged in copyright infringement.

Learn more about downloading music from

https://brainly.com/question/28358289
#SPJ1

Answer:

When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that  depending on the place  you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it  is said to be illegal.

Explanation:

Secure websites use technology that scrambles the information you send. This is known as
A. hacking.
B. encryption.
C. padlocking.
D. digital media.

Answers

Answer:

B. Encryption.

Explanation:

Encryption encrypts data so that it can not be understood if/when it is intercepted by a third party between the sender and the recipient.

For example, if you're encrypting via the keyword vanilla, and then sending an email to Bob saying "Hi Bob", it would get encrypted as something like Vjh D5xx. The recipient would then use the keyword vanilla to decrypt this message so they can read it as Hi Bob. Anyone who intercepts this wouldn't have the keyword, and would just see incoherent letters, numbers, and symbols that they couldn't make heads or tails of.

Secure websites use technology that scrambles the information you send. This is known as, Encryption. So, the correct option is B.

Given that,

Secure websites use technology that scrambles the information you send.

Since, Secure websites use encryption technology to scramble the information you send, ensuring that it remains secure and protected during transmission.

Encryption involves the use of mathematical algorithms to transform data into an unreadable format, making it extremely difficult for unauthorized parties to access or understand the information.

This is a fundamental method used to safeguard sensitive data on the internet.

So, Option B is true.

To learn more about Encryption visit:

https://brainly.com/question/30408255

#SPJ6

What are the architectural features of the data storage system in each proposal

Answers

Answer:

Network storage architecture refers to the physical and conceptual organization of a network that enables data transfer between storage devices and servers. It provides the backend for most enterprise-level operations and allows users to get what they need

Explanation:

Below you can see stringSize, which is implemented in Java

Answers

It will return correct values as it will iterate until the length is met (and therefore i is not less than s.length() but is equal to s.length). It is poorly designed as s.length() can be used directly to obtain the number of characters in a string. This function likely has a Big O notation greater than O(n) because - due to the unnecessary loop - it has to iterate again. It also increments size multiple times instead of mutating it once when the for loop is finished to reduce on read/write time

Identification where Information Technology is not present to support business processes

Answers

Identification where Information Technology is not present to support business processes is one that   Lacking an IT implementation Plan.

What is the importance of information technology planning?

The accomplishment of the organization's strategic goals and objectives can be helped by this planning.

Note that  the strategic IT plan should include changes that will be required to the organization's information and communications infrastructure as well as the relevance of technology to each of the organization's strategic business goals.

Therefore,  business process would find it difficult to run efficiently without fully functional computers and access to emails and data.

Learn more about business processes from

https://brainly.com/question/14476382
#SPJ1

The sequence [tex]x_{n}[/tex] is defined, for n > 2, by the recursive formula

[tex]x_{n}[/tex] = [tex]2x_{n - 1}[/tex] + [tex]x_{n - 2}[/tex] where [tex]x_{1}[/tex] = 2 and [tex]x_{2}[/tex] = 3.

Write a program that first invites the user to input a natural number n. Then compute the n-th number in the sequence [tex]x_{n}[/tex] and display it appropriately to the user.

(The solution has to be in the Python programming language!)

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a program that first invites the user to input a natural number n.

Writting the code:

def func(n):

   

   # Base cases:

   # When n reaches 1 then return 2 as X1 = 2.

   if(n == 1):

       return 2

   

   # When n reaches 2 then return 3 as X2 = 3.

   if(n == 2):

       return 3

     

   ans = 2 * func(n-1) + func(n-2)

      return ans

n = int(input("Enter a natural number: "))

print("The" ,n,"-th number of the sequence is: " ,func(n))

See more about python at brainly.com/question/18502436

#SPJ1

Many documents use a specific format for a person's name. Write a program that reads a person's name in the following format:

firstName middleName lastName (in one line)

and outputs the person's name in the following format:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the following format:

firstName lastName (in one line)

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that write a program whose input is: firstName middleName lastName, and whose output is: lastName, firstName middleInitial.

Writting the code:

import java.util.Scanner;

import java.lang.*;

public class LabProgram{

public static void main(String[] args) {

String name;

String lastName="";

String firstName="";

char firstInitial=' ',middleInitial=' ';

int counter = 0;

Scanner input = new Scanner(System.in);

name = input.nextLine(); //read full name with spaces

int i;

for(i = name.length()-1;i>=0;i--){

if(name.charAt(i)==' '){

lastName = name.substring(i+1,name.length()); // find last name

break;

}

}

for(i = 0;i<name.length()-1;i++){

if(name.charAt(i)==' '){

firstName = name.substring(0, i); // find firstName

break;

}

}

for(i = 0 ;i<name.length();i++){

if(name.charAt(i)==' '){

counter++; //count entered names(first,middle,last or first last only)

}

}

if(counter == 2){

for(i = 0 ;i<name.length();i++){

if(Character.toUpperCase(name.charAt(i)) == ' '){

middleInitial = Character.toUpperCase(name.charAt(i+1));//find the middle name initial character

break;

}

}

}

firstInitial = Character.toUpperCase(name.charAt(0)); //the first name initial character

if(counter == 2){

System.out.print(lastName+", "+firstName+" "+middleInitial+".");

}else{

System.out.print(lastName+", "+firstName);

}

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Ask the user to think of a number between zero and one hundred. Your goal is to guess the number in as few guesses as possible. The user will inform you if you guessed too high, low or correct. Start by always guessing the middle number 50. If the user informs you it’s too low, then try 75. If 50 was too high, then try 25. Always guess the middle of the range of numbers left. In doing so, the range of numbers will be cut in half after each guess. If done correctly, no more than 7 guesses are needed. Print out “you cheated” if you reach 7 guesses and are still wrong.

Answers

A program in Python that asks the user to think of a number between zero and one hundred and tries to guess the number in as few guesses as possible is given below:

The Program

import random

import math

# Taking Inputs

lower = int(input("Enter Lower bound:- "))

# Taking Inputs

upper = int(input("Enter Upper bound:- "))

# generating random number between

# the lower and upper

x = random.randint(lower, upper)

print("\n\tYou've only ",

round(math.log(upper - lower + 1, 2)),

" chances to guess the integer!\n")

# Initializing the number of guesses.

count = 0

# for calculation of minimum number of

# guesses depends upon range

while count < math.log(upper - lower + 1, 2):

count += 1

# taking guessing number as input

guess = int(input("Guess a number:- "))

# Condition testing

if x == guess:

 print("Congratulations you did it in ",

  count, " try")

 # Once guessed, loop will break

 break

elif x > guess:

 print("You guessed too small!")

elif x < guess:

 print("You Guessed too high!")

# If Guessing is more than required guesses,

# shows this output.

if count >= math.log(upper - lower + 1, 2):

print("\nThe number is %d" % x)

print("\tBetter Luck Next time!")

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

how do you think the internet and social media will impact global communities in the next five years?

Answers

I do think that the internet and social media will impact global communities in the next five years as it will bring about huge growth in the nations economy and also more improvement in the healthcare system.

What is social media, and how does it affect the neighborhood?

In actuality, social media can be advantageous for society. People may connect and their relationships may become deeper as a result. Student learning and development are also encouraged by social media. Additionally, it can help firms grow their clientele and increase their revenue.

Therefore, Future communication will be based on the framework established by what is currently referred to as social media, but it will look very different. By 2033, the amount of data that will be accessible to everyone as well as its ability to influence decisions will have undergone the most significant change.

Learn more about social media  from

https://brainly.com/question/3653791

#SPJ1

What is a privacy data breach

Answers

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

Write and test the “digit” function: Function Prototype: int digit(int n,int k) This function returns the kth digit of the positive integer n. For example, if n is the integer 85,419, then the call digit(n,0) would return the digit 8, and the call digit(n,2) would return the digit 4. Examples: 1. Input: n = 25419 , k = 1 output: 5 2. Input: n = 2 , k = 0 output: 2 3. Input: n = 2 , k = 1 output: index out of bound (return -1) Note: • The digits are numbered from left to right beginning with the “zeroth” digit. • Take input and display output in main function. • Do not use array or string etc.

Answers

Explanation:

You have to just take a number n and after that you just reverse the number after that when the number is reversed you simply apply mod of 10 at  that reversed number and then divide it by 10.

Note:

you have to use while loops when finding reversed number and the place of number to be found

Answer:

fastian broh its call plagrism

Explanation:

Carlos is studying human skin cells under a microscope during science class. He asks his teacher why cells are small. Which response does his teacher give him?

Answers

Since Carlos is studying human skin cells and he asks his teacher why cells are small. The response that his teacher give him will be: Larger cells could not efficiently transport nutrients.

Why are big cells not productive?

The plasma membrane won't have enough surface area if the cell enlarges too much to support the rate of diffusion needed to accommodate the larger volume. In other words, a cell gets less effective as it develops.

Any of the four major cell types that make up the epidermis may be referred to as "skin cells." These are the Langerhans cells, Merkel cells, keratinocytes, and melanocytes.

Note that Because there is less plasma membrane and a longer distance for molecules to travel, a large cell has more volume and is less effective at moving items into, out of, and through the cell. The cell needs its supplies to be received and transferred in a timely manner for many of its organelles.

Learn more about human skin cells from

https://brainly.com/question/27132976
#SPJ1

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

An  idea to increase this title for the thesis is the role of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in the GDP of a country.

What is a research thesis?

It is a position or assertion that will be supported by your study. A compelling thesis statement outlines the subject to be covered, condenses the important points, and persuades the reader to keep reading.

Note that the essential points that will be discussed in the essay should be indicated in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument that will be presented. This gives the reader a "road map" so they can follow the thought the author is developing.

Learn more about thesis formation from

https://brainly.com/question/2094985
#SPJ1

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?
CIA Traid -
explain

Answers

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. The type of breach that this downloading of malware is  called option B: integrity.

What is CIA Traid about?

The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently referred to as the AIC triad (availability, integrity, and confidentiality).

Note that In the event of a cyber breach, the CIA triad offers organizations a clear and thorough checklist to assess their incident response strategy. The CIA trio is particularly crucial for identifying vulnerability sources and aiding in the investigation of what went wrong once a network has been infiltrated.

Learn more about malware from

https://brainly.com/question/399317
#SPJ1

See full question below

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?

answer choices

Confidentiality

Integrity

SMCS School has hired you to set up an Internet connection within the school premises. The Internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. Which of the following types of networks will you install in this scenario?

Answers

The network that will be install in the school premises and will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus is CAN (Campus Area Network).

Different Type of Networks:

Option 1 : MAN

Metropolitan Area Network is used to set up an Internet connection within the city.

So, this is the wrong option.

Option 2: WAN

Wide Area Network is used to setup an internet connection over a state, province or country.

So, this is the wrong option.

Option 3: CAN

Campus area network is used to setup internet connection within a limited geographical area like school campus, university campus etc. Given scenario is, the Internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. When internet connection is to be used within the campus i.e., between two or three buildings then campus Area Network must be used there.

So, this is the Correct answer.

Option 4: LAN

Local Area Network is used to setup internet connection over the smallest area such as one school building, college buliding but not within the overall campus.

So, this is the wrong option.

To know more about network, visit: https://brainly.com/question/1167985

#SPJ1

MYSQL Workbench question
Using a function, display the customer who has the highest credit limit.
. Display the customer number, customer name and credit limit.
I need my answer checked over for the question.
#Show me a list of customers who have the highest credit limit
use premier_products;
select count(*) customer_num, customer_name, credit_limit
from customers
Where credit_limit=
(Select AVG (credit_limit)
from customers)

Answers

A function that displays the customer who has the highest credit limit is given below:

The nested query to display the customer names and credit limit with a lower credit limit than the customer in Sunnyvale

SELECT Name,CREDITLIMIT FROM  CUSTOMERS

WHERE CREDITLIMIT < (SELECT CREDITLIMIT FROM CUSTOMERS

                    WHERE CITY = 'Sunnyvale')

ORDER BY CREDITLIMIT

For Multiple Customers

SELECT Name,CREDITLIMIT FROM  CUSTOMERS

WHERE CREDITLIMIT < (SELECT MAX(CREDITLIMIT) FROM CUSTOMERS

                    WHERE CITY = 'Sunnyvale')

ORDER BY CREDITLIMIT

Read more about SQL here:

https://brainly.com/question/27851066

#SPJ1


Create a loop to display all even numbers from 0 to 100. Describe the three elements that must be included in order for a loop to
perform correctly. What will happen if these statements are not included? Provide examples.
The three elements that must be included in order for a loop to perform correctly. What will happen if these statements are not included? Provide examples

Answers

A loop to display all even numbers from 0 to 100:

for(i= 0;i<= 100; i++) {  

       if(counter%2 == 0) {

           printf("%d ",i);

The loop consists of three important parts:

the initialization: the keyword that starts the loopthe condition: the condition being testedthe update: for each iteration.

By missing a condition statement in a for loop, it would loop forever.

Example:

void main() {  

int i = 10;

for( ; ;) {

printf("%d\n",i); }

}

As in the above code, the for loop is running for infinite times and printing the i value that is 10 infinitely.

What is a for loop used for?

A "For" Loop is used to repeat a specific block of code a known number of times.

What are the main types of loops?

There are two types of loops, “while loops” and “for loops”. While loops will repeat while a condition is true, and for loops will repeat a certain number of times.

What are the elements of a loop?

Loop statements usually have three components: initialization, condition, and update step, and it contains a loop body.

To know more about loop:

https://brainly.com/question/16922594

#SPJ1

What hardware component is the main brain of the computer system that is responsible for all the activities of the processor stage of the IPOS cycle

Answers

Answer:

It is the Central Processing Unit (CPU)

the proper use of safety equipment in your vehicle has the potential to ___.

Answers

The proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

Why safety equipment is required?

Safety equipment may be defined as a type of equipment that delivers a sense of protection that is significantly used by workers in order to avoid injuries, casualties, life-threatening situations, etc.

Safety equipment may include a set of numerous objects and things like gloves, safety glasses and shoes, earplugs or muffs, hard hats, respirators, coveralls, vests, and full-body suits. All these pieces of equipment possess a common intention behind the safety of an individual.

Therefore, the proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

To learn more about Safety equipment, refer to the link:

https://brainly.com/question/28389789

#SPJ1

uses of computer in communication​

Answers

Uses of computers in communication:

1) Transfer of data

2)Transfer of information

3) Wireless message communication

4)Video service

5)E-mail

6) Internet and Fax

What is the use of computers in communication?

The mainstay of information technology, computers are essential for communication. Early in the 1990s, the first homes began to utilize the Internet, which eventually led to the widespread use of email, websites, blogs, social networking, and Voice-Over-Internet Protocol.

Above listed ones are the uses of computers in communication.

To know more about the information about computers in communication

https://brainly.com/question/26152499

#SPJ1


Cloud computing is an example of a social networking site

Answers

Answer: no

Explanation:

cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet

No, cloud computing is not an example of a social networking site. Cloud computing refers to the delivery of computing services, including storage, databases, software, and networking, over the internet.

It involves the use of remote servers hosted on the internet to store, manage, and process data, rather than relying on local servers or personal devices.

On the other hand, social networking sites are web platforms that enable users to create profiles, connect with others, and share content, ideas, and interests.

While both cloud computing and social networking sites are technology-related concepts, they serve different purposes.

Cloud computing focuses on the delivery of computing services, while social networking sites focus on facilitating social interactions and content sharing among users.

Thus, the given statement is false.

For more details regarding cloud computing, visit:

https://brainly.com/question/30122755

#SPJ6

Consider this program on the picture attached:
(a) In what programming language is this program implemented?
(b) Why is this program correct? In other words, how does it work?
(c) In what way is the program poorly designed?

Answers

a) javascript (or Ecmascript if you’re fancy like that)

b) the program assigns the immutable variable “arr” to an array of intagers. It then iterates over the items of the array starting at index zero. The current value is declared as “item”. It will then print item cast as a string to the console.

c) this program is poorly designed due to the use of “SetTimeout”. During each iteration, the program will await item milliseconds before printing the item to the console. This affects the speed of the program due to thread sleeps every iteration

Insert the following records into the Airports table, using subqueries where appropriate:
-- | Name | City | Country | IATA | ICAO | Latitude | Longitude | Altitude | TimeZone & TzDatabaseTimeZone |
-- |-----------------------|---------------|---------|------|------|--------------|----------------|----------|---------------------------------------------------------------------|
-- | Fort McMurray Airport | Fort Mcmurray | Canada | YMM | CYMM | 56.653301239 | -111.222000122 | 1211 | The same time zone as used for the `Edmonton International Airport` |

Answers

Using the knowledge of the computational language in python it is possible to write a code that Insert the following records into the Airports table, using subqueries where appropriate.

Writting the code:

select A.Name, A.City+', '+ A.Country as 'Serving City', A.TimeZone

from Airports A

where A.AirportCode=1028;

select A.FlightCode, A.ConfirmationNumber, Count(B.CustomerID) aa NumberOfPassengers

from Bookings A

join Passengers B on (A.ConfirmationCode=B.ConfirmationCode)

group by A.FlightCode, A.ConfirmationNumber;

select AVG(Amount) as AverageAmount

from Payments;

select A.FlightCode, sum(B.Amount) as TotalPayment

from Bookings A

join Payments B on (A.CustomerNumber=B.CustomerNumber)

group by A.FlightCode

having sum(B.Amount) > 10000;

select A.FlightCode, B.Date, C.FirstName+' '+C.MiddleName+' '+'C.LastName as FullName,

f

select AirportCode, Name

from Airports

where Name not like '%international%';

select Name

from Airlines

where AirlineCode not in (select AirlineCode

from Flights);

See more about python at brainly.com/question/18502436

#SPJ1

Identify the type of error and correction in the following statement. double 4th3. where is the error ​

Answers

They use the knowledge of computational language in C++ it is possible to write a code Identify the type of error and correction in the following statement.

Writting the code:

#include <stdio.h>  

int main()  

{  

  int sum=0; // variable initialization  

  int k=1;  

  for(int i=1;i<=10;i++); // logical error, as we put the semicolon after loop  

  {  

      sum=sum+k;  

      k++;  

  }  

printf("The  value of sum is %d", sum);  

   return 0;  

}  

See more about C++ at brainly.com/question/29225072

#SPJ1

Other Questions
No more than _____ gallons of a flammable liquid may be stored in a room outside of an approved cabinet. The ____ of 12 is -12. Y+4=2(x-7)In standard form Solid potassium (K) conducts an electric current, whereas solid potassium iodide (KI) does notbecause a. solid potassium is a nonmetalb. solid potassium has a delocalized sea of electrons and KI has its cations and anionstoo close togetherc. KI has covalent bondsd. Kl needs to be reacted with another compound first The British began to have interest in the Ohio Valley (land west of the Appalachian Mountains) because: the expected trend value of september sales for a firm is $900. assuming a september seasonal index of .91, what would be the seasonally adjusted forecast for september? multiple choice none of the options are correct. $819 $900 $950 $989 the angular velocity of a rotating rigid body increases from 500 to 1500 rev/min in 120 s. (a) what is the angular acceleration of the body? (b) through what angle does it turn in this 120 s? In general what centuries are associated with the European Renaissance? 100 POINT TO WHOEVER ANSWER THE FASTEST Wilson's 14 Points1. Read 1-5 and Describe what steps 1-5 were meant to prevent: A) on your own; B) after Class discussion2. Read 6-13. Describe what he recommended here? A) in your own mind; B) after Class discussion3. #14 Wilson felt his FOURTEENTH POINT was the most important. Read it and describe why he felt thisway.Weaknesses of the Treaty of VersaillesRead Module 7.4 Sub-section: "Debate over the Treaty of Versailles" and list the weaknesses and FLAWS ofthe treaty. assume that the currency-deposit ratio is 0.11, the required reserve ratio is 0.05, and the excess reserves to deposit ratio is 0.14. if the monetary base is $6 trillion, find (a) the amount of currency in circulation in trillions of dollars; (b) required reserves in trillions of dollars; (c) excess reserves in trillions of dollars; (d) simple deposit multiplier which ignores leakages; (e) actual money multiplier; and (f) money supply in trillions of dollars. (round all answers to one decimal point) Who was the carthaginian general that crossed the alps with elephants in the 2nd punic war?. sexual reproduction enhances the rate of evolution, allowing nature to select for novel combinations of alleles. two genes are present on the same chromosome. one homolog carries the dominant a and b alleles, while the other homolog carries the a and b alleles. which specific process of the meiotic cell cycle will result in a recombinant chromosome (for example, a with b)? group of answer choices the pre-meiotic s phase segregation of homologs, during meiosis ii crossing over, during meiosis ii crossing over, during meiosis i segregation of homologs, during meiosis i If you were camping in a rainforest for two days, your presence would cause many changes to thesurroundings. Describe two physical and two chemical changes that could occur as a result of yourexperience Find the total amount given the original price and tax rate. Round to the nearest cent if necessary. $31.69, 6% an old-model machine can stamp 1000 parts in four hours. a newmodel machine can stamp 1000 parts in just two hours. how long will it take one old-model and one new-model machine to stamp 1000 parts working together? sam has no job but keeps applying to get a job with a business that is unionized. he is qualified and he finds the pay attractive, but the firm is not hiring. sam is Katie Clean invited Messy Missy to her house to work on their biology project, but Katie Clean had no idea what a visit from Messy Missy entailed. First of all, it was raining and Messy Missy neither bothered to take her boots off nor thoroughly wiped them on the doormat. Then Messy Missy ate a bag of hot chips on Katie Cleans white bedspread without asking, and Messy Missy is a sloppy eater, so hot chip powder got all over the bedspread. Katie Clean tried to be polite and ignore Messy Missys sloppy behavior, but then Messy Missy threw her chip wrapper on the floor. Offended, Katie Clean pretended that she was sick and asked Messy Missy to leave. The next day Katie Clean asked the teacher if she could work by herself. After explaining her situation, the teacher allowed Katie to work alone. Messy Missy would have finished the assignment by herself, but she spilled grape soda all over her assignment. What is the theme of the story? What happens in the story that leads you to believe this? Even after a game has been released a game studio decides to update it on a regular basis why is this a good idea What does Charlemagne consider criminal? a major difference between a grand mal and a petit mal seizure is the presence or absence of: