Which of the following are examples where AI is now used in daily life? Select all that apply.
Group of answer choices
professional wrestling
video game development
banking and financial services
postal and shipping services
customer service industry
Yoga
Answer:
Video game development .
Banking and financial services.
Postal and shipping services.
Customer service industry.
Explanation:
Artificial Intelligence is called the set of computer programs that, inserted in certain objects or systems, automate processes in such a way that they carry out certain actions in an "intelligent" way, that is, processing different variables through algorithms to respond correctly to the user need.
A clear example of artificial intelligence occurs in the case of homebanking, where a person can transfer money from their bank account through a mobile application that manages their bank account remotely.
What is the most common representation of a distribution?
Pie Chart
Table
Histogram
Bar Chart
What is the difference between internal hardware and software?
Internal hardware is the physical parts of a computer that you see on the outside; software is the physical parts of a computer that you see on the inside.
Internal hardware is the physical parts of a computer that you see inside the computer; software is the physical parts of a computer that you see on the outside.
Internal hardware is the programs and applications that make the computer work; software is the physical parts that help the computer work.
Internal hardware is physical parts that help the computer work; software is the programs and applications that make the computer work.
Answer:
software are the tangible parts of a computer which you can see and touch and hardware are the intangible parts of a computer like the programs and files
Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and each cache block contains 8 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache; that is, what are the size of the tag, set, and offset fields
Answer:
Following are the responses to these question:
Explanation:
The cache size is 2n words whenever the address bit number is n then So, because cache size is 216 words, its number of address bits required for that cache is 16 because the recollection is relational 2, there is 2 type for each set. Its cache has 32 blocks, so overall sets are as follows:
[tex]\text{Total Number of sets raluired}= \frac{\text{Number of blocks}}{Associativity}[/tex]
[tex]=\frac{32}{2}\\\\ =16\\\\= 2^4 \ sets[/tex]
The set bits required also are 4. Therefore.
Every other block has 8 words, 23 words, so the field of the word requires 3 bits.
For both the tag field, the remaining portion bits are essential. The bytes in the tag field are calculated as follows:
Bits number in the field tag =Address Bits Total number-Set bits number number-Number of bits of words
=16-4-3
= 9 bit
The number of bits inside the individual fields is therefore as follows:
Tag field: 8 bits Tag field
Fieldset: 4 bits
Field Word:3 bits
the device that store data and program for current purpose
Answer:
A computer, what you are using. smh.
Answer:
Podría ser el teléfono porque puedes almacenar imágenes de datos depende del almacenamiento interno que pueda contener el dispositivo no.
Explanation:
Por ejemplo en este tiempo depende mío puede almacenar la clases miércoles y 3 cosas de aprendizaje y la formación de nuevas personas con valores y virtudes en el ámbito social político y económico.
Gracias.
#cuidemonosdesdecasa.
Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integer that has been read so far and outputs the largest integer when the (first) negative integer is encountered. (See subsection Example: Finding the max value of section 4.1 Loops (general) to practice the algorithm).
Answer:
In Python:
num = int(input("Enter number: "))
maxn = num
while num >=0:
if num>maxn:
maxn = num
num = int(input("Enter number: "))
print("Largest: "+str(maxn))
Explanation:
Get input from the user
num = int(input("Enter number: "))
Initialize the largest to the first input
maxn = num
This loop is repeated until a negative input is recorded
while num >=0:
If the current input is greater than the previous largest
if num>maxn:
Set largest to the current input
maxn = num
Get another input from the user
num = int(input("Enter number: "))
Print the largest
print("Largest: "+str(maxn))
Synchronization barriers are a common paradigm in many parallel applications.
a. True
b. False
Answer:
I am not sure on this one I am guessing it is True
Explanation:
Based on the description below which website is more appropriate
A. a site that asks you to send $10 to help schoolchildren in Uganda
B. a site that describe violent behavior
C. a site that asks for your personal information to win a contest for a new bike
D. a site sponsored by a government agency that gives you factual information
Answer:
D
Explanation:
Answer:
The answer is d
Explanation:
because asking for 10 dollars is the first website is not normal and in the second describing violent behavior is not ok and the third asking for personal information for a free bike is not good but d a site sponsored giving you factual information that made by the government is trustworthy
The Painting Company has determined that for every 112 square feet of wall space:
One gallon of paint at $9.53 per gallon is required if total square feet is 2000 or less. If square footage is greater than 2000, paint is $10.50 per gallon.
8 hours of labor at $35 per hour is required.
A hazardous material disposal fee of 7.5% of the total paint cost is required.
Create a function called paintJobCost which allows the user to provide the total number of square feet for the paint job and produces an itemized list of charges that includes:
Number of gallons of paint required.
Total Cost of the Paint (Paint Cost x Gallons Required)
Hours of labor required to paint (8 hrs per 112 sq ft)
Total Cost of the Labor.
The hazardous material fee.
The total cost of the paint job. (Paint Cost + Labor Cost + Hazardous Material fee)
Your function, when called, must display all the above information exactly as shown below.
Expected Output
Call the paintJobCost function where the total square footage of the paint job is 1800. Square Footage Paint Required Paint Cost 16.07 gal $153.16 Labor Hours 128.57 hrs Labor Cost $4,500.00 Hazard Fee $11.49 TOTAL COST OF PAINT JOB $4,664.65 Call the paintjobCost function where the total square footage of the paint job is 2700. Square Footage Paint Required 2700 24.11 gal Paint Cost $253.12 Labor Hours 192.86 hrs Labor Cost $6,750.00 Hazard Fee $18.98 TOTAL COST OF PAINT JOB $7,022.11 Call the paintJobCost function where the total square footage of the paint job is 3200. Square Footage Paint Required Paint Cost 3200 28.57 gal $300.00 Labor Hours 228.57 hrs Labor Cost $8,000.00 Hazard Fee $22.50 TOTAL COST OF PAINT JOB $8,322.50
Answer:
Answered below
Explanation:
#Program is written in Python.
sq_feet = int(input ("Enter paint area by square feet: ")
gallons = float(input (" Enter number of gallons: ")
paint_job_cost(sq_ft, gallons)
#Function
def paint_job_cost(sq_ft, gal){
gallon_cost = 0
cost_per_hour = 35
if sq_ft <= 2000:
gallon_cost = 9.53
else:
gallon_cost = 10.50
paint_cost = gal * gallon_cost
labour_hours = 8 * (sq_ft/112)
total_labour_cost = labour_hours * cost_per_hour
hazard_fee = 0.075 * paint_cost
total_cost = paint_cost + total_labour_cost + hazard fee
print (paint_cost)
print(labour_hours)
print (total_labour_cost)
print (hazard_fee)
print(total_cost)
}
ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP
Answer:
10.b
11.c
12.c
13.a
14.d
15.b
16.c
Explanation:
please brainleist please ♨️❤☺️☻
For a single CPU core system equipped wiith addditional hardware modes (besides user and kernel), choose those items that are examples of the possible usage of the additional modes.
1. Data parallelism
2. Enhanced user security policy, such as user groups, so that group members may execute other group members' programs
3. Task parallelism
4. USB device driver support outside of kernel mode
Answer:
Task parallelism
Explanation:
The Task parallelism is most popularly known as the function parallelism and the control parallelism. In the computer codes, it is the form of a parallelism across the multiple processors in a parallel computing environments. It focusses on distributing the task that are concurrently performed by the threads or the processors.
For the single CPU core system that is equipped with an additional hardware modes, the task parallelism is one of the example of the usage oh a additional modes.
how can you hack on a cumputer witch one chrome hp
Answer:
http://www.hackshop.org/levels/basic-arduino/hack-the-chromebook
Explanation:
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
Log onto the Internet and use a search engine to find three Web sites that can be models for the new site. (At least one should sell sporting goods.) For each site you selected, list the URLs in your document. Tell why you chose them. Navigate to the three sites you choose and take notes about at least three things you like and don’t like about the sites.
Please see the following file for your required answer, thank you.
If you were able to earn interest at 3% and you started with $100, how much would you have after 3 years?
109
A= Amount+ interest *sb
interest=P×r×t/100
100×3×3/100
100 cancel 100=3×3=$9
100+9=109
You have been hired by The Mandarin Inn, a local Chinese restaurant that has adapted to the new shelter-in-place environment by expanding to online restaurant orders, and also offering a new pantry service to local customers. Your first project is to conduct basic data analysis for the restaurant to determine how well a social media post is contributing to the Mandarin Inn's current strategic goal of acquiring new customers for its online pantry service offering. Which of the following metrics for the advertisement is the best candidate for a KPI relative to the strategic goal?
A. Views of the advertisement over time.
B. Shares of the post over time.
C. Likes of the post over time.
D. Clicks to the pantry signup page from the post over time.
Answer:
The answer is "Choice D".
Explanation:
The registration program enables users and organizations to log in independently and also to access your system. The user registration sites are popular as per the types of people and associations that you can choose to register.
It is called Click By Rate. It tells you good this video is When they want to push your audience on following your video, the click-through rate measure is perhaps the most critical.
"Why do the linked stack and queue implementations not include iterators, as in the linked list classes of Chapter 16? Are there cases in which a stack or queue might need to be traversed privately, even if access cannot be provided publicly? If so, should an iterator be used for these cases?"
Answer:
Explanation:
A linked stack is a LIFO (last in, first out) while a queue is a FIFO (first in, first out) data structure. This means that you can only access and modify the first or last elements of the stack or queue repectively. Therefore, there is no use for iterators in such a data structure which is why they do not exist. Iterators are mainly for traversing sequential access or random access within the given data structure which is not possible with these data structures, but is possible with lists. A stack or queue would either be made automatic so that it is completely private or simply made public so that it can be accessed by other methods and classes, regardless iterators would not be used.
State and explain five misused of science and technology
Answer:
1. Perpetration of violence
2. Breach of privacies
3. Replacement of human labor
4. National threats
5. Devotion of excessive time to technologies
Explanation:
The advent of science and technology have come with lots of benefits to man. Some of these benefits include, the invention of phones, electricity, the internet and social media, satellites, drones, etc. However, science and technology have been misused in the following ways;
1. Perpetration of violence: Weapons of war have caused the mass destruction of more people than was obtainable before. To aid these activities the fast means of communication and transportation cause seamless operations.
2. Breach of privacies: People with technical knowledge have the ability to intrude into the privacies of others. They can obtain information that was not originally meant for them.
3. Replacement of human labor: Machines and equipment have reduced the number of humans that were gainfully employed prior to the advent of these technologies.
4. National threats: Nations and governments now threaten their counterparts with the deployment of missiles. These attitudes aid international conflicts.
5. Devotion of excessive time to technologies: Teenagers most especially have developed an overdependence on technologies. A lot of time is now spent on phones, thus causing the neglect of social relationships.
What is the codebook?
Python dictionary of code shortcuts
Standard survey shorthand codes
Documentation of the survey questions, the design of the study and the encoding of the responses
General term for development code books
Answer:
Option C
Explanation:
A codebook gives following information
a) Content
b) Structure of the codebook
c) Layout of the data collected
In general it is a document that contain information about the purpose and format of the codebook along with the methodological details.
Hence, Option C is correct
An integrated circuit RAM chip has a capacity of 512 words of 8 bits each where the words are organized using a one-dimensional layout.a) How many address lines are there on the chip?b) How many such chips would be needed to construct a 4Kx16 memory?c) How many address and data lines needed for a 4Kx16 memory?#addresss lines = #data lines =
Answer:
A. 9
B. 16
C. Number of addresses = 12 number of data lines = 16
Explanation:
The capacity of this chip is 512 x 8
That is 512 words and these words have 8 bits
A. The number of the address lines would be
log2(512) = 2⁹
So the answer is 9
B. The total number of chips required
= 512 x 8 = 4096
(4096 x 2)/ 512 = 16
C. Number of address = log4092 = 2¹²
= 12
The number of data lines = 8x2 = 16
Thank you!
what will you recommend to HP Mini 5103 Notebook?
Dexter is trying to draw a rhombus and play the pop sound at the same time in his program. How should he correct the error in this algorithm? When space key pressed, draw rhombus, play pop sound.
a- Add another when space key pressed event and move play pop sound to that event.
b- Change the draw rhombus command to a draw triangle command.
c- Put the code inside a loop block with two iterations.
d- Use a conditional block so that the code is if draw rhombus, then play pop sound.
Answer:
Option A makes the most sense
Explanation:
Add another when space key pressed event and move play pop sound to that event. The correct option is A.
What is algorithm?A set of instructions designed to perform a specific task or solve a specific problem is referred to as an algorithm.
It is a step-by-step procedure that defines a sequence of actions or operations that, when carried out, result in the solution of a problem or the completion of a task.
Dexter is attempting to draw a rhombus while also playing the pop sound in his program.
She should add another when space key is pressed event and move the play pop sound to that event to correct the error in this algorithm.
Thus, the correct option is A.
For more details regarding algorithm, visit:
https://brainly.com/question/22984934
#SPJ3
which benefit does the cloud provide to star-up companies without access to large funding?
Explanation:
Start-up companies can store, manage, process data and use programs through a web-based interface – something that greatly reduces costs. Data stored in the cloud can be accessed from anywhere through various devices with web connectivity, which is an advantage for small companies that don't have a huge IT budget.
Cloud provides storage access and management for files and information using a the cloud computing provider. This could help reduce the cost expended on physical content storage devices.
The cost of purchasing storage devices to habor information and data may be daunting for new startups with little capital. The cloud computing framework is a cheaper alternative, yet provides easier accessibility at all times.Hence, the cloud could in the cost expended on physical storage.
Learn more : https://brainly.com/question/22841107
with the aid of an example describe absolute file path as used in file management
Answer:
here's your answer
Explanation:
A path is either relative or absolute. An absolute path always contains the root element and the complete directory list required to locate the file. For example, /home/sally/statusReport is an absolute path.
I think it's helpful for you.....
Write a function header for the ZooAnimal class member function daysSinceLastWeighed. This function has a single integer parameter today and returns an integer number of days since the animal was last weighed. void ZooAnimal::Destroy () { delete [] name; } // -------- member function to return the animal's name char* ZooAnimal::reptName () { return name; } // -------- member function to return the number of days // -------- since the animal was last weighed { int startday, thisday; thisday
Answer:
Answered below
Explanation:
public int daysSinceLastWeighed(int today)
Method is public which means it is visible to other classes. It returns an integer which is indicated as int. Next is the method's name which clearly describes what the method does 'days since last weighed'. The opening and closing parentheses enclose the integer parameter named today. This is the function header.
Anna has a physical mobility difference, and she uses virtual reality to complete her exercises. To use virtual reality, Anna needs to follow a specific set of steps in the correct order. What is the list of steps Anna should follow to use virtual reality?
Put the virtual glasses around her neck, complete the exercises in the virtual world, take the glasses off
Put the virtual glasses over her eyes, complete the exercises in the virtual world, take the virtual glasses off
Put the virtual glasses on her forehead, go outside, complete the exercises
Put the virtual glasses over her eyes, go to the living room, complete the exercises
Answer:
Explanation:
The basic concept of virtual reality is that they are a pair of lenses in a headset that allows you to visualize a virtual 3D world and become immersed within it. To do the exercises correctly Anna would need to follow the following basic steps.
Put the virtual glasses over her eyes, complete the exercises in the virtual world, take the virtual glasses off
The headset/glasses need to fit comfortably on her eyes and around her head so that she can clearly see the image on the lenses and so that the headset/glasses do not fall off while she is completing her exercises. Once she is done with her exercises Anna can simply take off her virtual glasses and put them away.
Create a map using the Java map collection. The map should have 4 entries representing students. Each entry should have a unique student ID for the key and a student name for the element value. The map content can be coded in directly, you do not have to allow a user to enter the map data. Your program will display both the key and the value of each element.
Answer:
In Java:
import java.util.*;
public class Main{
public static void main(String[] args) {
Map<String, String> students = new HashMap<>();
students.put("STUD1", "Student 1 Name");
students.put("STUD2", "Student 2 Name");
students.put("STUD3", "Student 3 Name");
students.put("STUD4", "Student 4 Name");
for(Map.Entry m:students.entrySet()){
System.out.println(m.getKey()+" - "+m.getValue()); }
}}
Explanation:
This creates the map named students
Map<String, String> students = new HashMap<>();
The next four lines populates the map with the ID and name of the 4 students
students.put("STUD1", "Student 1 Name");
students.put("STUD2", "Student 2 Name");
students.put("STUD3", "Student 3 Name");
students.put("STUD4", "Student 4 Name");
This iterates through the map
for(Map.Entry m:students.entrySet()){
This prints the details of each student
System.out.println(m.getKey()+" - "+m.getValue()); }
Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language - Java. Complete the Avengers Registry class. Ex. if input is Steven Rogers Captain America 105 4 Then output should be: Name: Steven Rogers, Age: 105, Alias: Captain America, Security Clearance Level: 4 2892227722684 3z0y7 LAB ACTIVITY 11.6.1: miniLab: Avengers Initiative 0/10 Current file: Avengers Registry.java Load default template... 1 import java.util.Scanner; 2 Current file Avengers Registry.java Load de 1 import java.util.Scanner; 2 3 public class Avengers Registry { 4 5 6 7 8 public static Avenger createAvenger (Scanner scnr){ String name; int age; String alias, int clearance; 9 10 Avenger avenger = new Avenger(); name = scnr.nextLine(); alias = scnr.nextLine(); age = scnr.nextInt(); clearance = sonr.nextInt(); // your code here 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 return avenger; } public static void main(String[] args) { Scanner scnr = new Scanner(System.in); // your code here } File is marked as read only Current file: IndividualData.java 1 public class IndividualData { 2 private String name; 3 private int age; 4 5 public void setIndividualName(String individualName) { 6 name = individualName; 7 8 9 public String getIndividualName() { 10 return name; 11 } 12 13 14 public void setIndividualAge (int inYears) { 15 age = inYears; 16 } 17 18 public int getIndividualAge() { 19 return age; 20 } 21 22 public void printDetails() { 23 System.out.print("Name: + name); 24 System.out.print(", Age: + age) 25 } 26 H File is marked as read only Current file: Avenger.java 1 public class Avenger extends IndividualData { 2. private int securityClearance; 3 private String alias; 4 5 public void setSecurityClearance(int secLevel) { 6 securityClearance = secLevel; } 8 9 public int getSecurityClearance(){ 10 return securityClearance; 11 12 13 public void setAlias (String a) { 14 15 } 16 17 public String getAlias() { 18 return alias; 19 3 20 21 } alias = a;
eh I think yes I think. Maybe
jo.in Goo.gle meet the code/rhk-rvet-tdi
Answer:
nah
Explanation:
cuz ion wanna
Scenario
You are the IT administrator for a small corporate network. You're repairing the computer in the Support Office, which appears to have a failed power supply. After testing the power supply and confirming the failure, you removed it from the computer. Now you need to select a replacement power supply. In this lab, your task is to complete the following: Install a power supply based on the following requirements:
The power supply must have the appropriate power connectors for the motherboard and the CPU. Make sure the power supply you select will support adding a graphics card that requires its own power connector.
Make the following connections from the power supply:
Connect the motherboard power connector.
Connect the CPU power connector.
Connect the power connectors for the SATA hard drives.
Connect the power connector for the optical drive.
Plug the computer in using the existing cable plugged into the power strip.
Turn on the power supply. Start the computer and boot into Windows.
Answer:
Explanation:
The following connections will need to be done once the power supply is fully installed inside the case and make sure to discharge any built up electricity from you body by using an anti-static bracelet if available.
Connect the motherboard power connector: This requires a 20 pin + 4 pin connector and is usually located in the middle right side of the motherboard.
Connect the CPU power connector: This requires a 4-pin connector and is located in the top right corner on most motherboards
Connect the power connectors for the SATA hard drives: These require sata cables which are small thin and flat cables and whose motherboard connectors are usually located near the motherboard power connector.
Connect the power connector for the optical drive: The power connectors are thick flat and have 4 round entry pins inside, connect this to the back of the cd-drive which should be located in the drive bay of the pc-case.
Plug the computer in using the existing cable plugged into the power strip: simply plug the computer power connector into the case and then the powerstrip
Turn on the power supply. Start the computer and boot into Windows: turn on the pc by pressing the power button and then press the F8 key on the keyboard to enter the boot options. From here choose the drive that has Windows installed on it in order to enter the Windows OS.
100 POINTS PLUS BRAINLYEST TO WHOEVER ANSWERS CORRECTLY
Raul is starting a new desktop publishing business. He needs to communicate frequently with his clients to get approval for the work he is creating for them. He will use the decision-making process to help him figure out the best telecommunications technology to use to exchange information with his clients.
Match the steps of the process to Raul's analysis.
1. Gather data.
2. Determine the goals.
3. Analyze choices.
4. Evaluate the decision.
5. Make the decision.
Raul will send sample documents to his clients using e-mail.
Raul will survey his clients to determine how the approval process is working for them.
Fax machines are able to transmit copies of documents to other locations. E-mail can be used to send documents to clients.
He needs a way to quickly exchange information with his customers. He needs to send them his designs and provide a way for them to get back to him with their approval and/or comments.
His clients have access to e-mail, but not all have fax machines.
Answer:
1. Gather data
Raul will survey his clients to determine how the approval process is working for them.
2. Determine the goals
He needs a way to quickly exchange information with his customers. He needs to send them his designs and provide a way for them to get back to him with their approval and/or comments.
3. Analyze choices
His clients have access to e-mail, but not all have fax machines.
4. Evaluate the decision
Fax machines are able to transmit copies of documents to other locations. E-mail can be used to send documents to clients.
5. Make the decision
Raul will send sample documents to his clients using e-mail.