1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
1 year ago
6

Mention and discuss specific professional ethics related to augmented reality, artificial intelligence, and the internet of thin

gs?
Computers and Technology
1 answer:
Nezavi [6.7K]1 year ago
5 0

Specific professional ethics related to augmented reality, artificial intelligence, and the internet of things are:

  • Opacity
  • Bias
  • Employment
  • Privacy
  • Singularity
  • Autonomous systems

<h3>What are the professional ethics of AI systems?</h3>

Artificial intelligence often has some dilemma that confronts people who are in this field of duty. Some of the daily challenges that they must face are the ones mentioned above. Opacity is a challenge that even the end-users must face. Often, there is the challenge of not knowing how the program came about.

There is a worry about end-users participating in the process of developing some of these systems. People want to be more involved but since machine learning is not easy, many might not know how the results are generated.

Bias is another problem that augmented reality and the other mentioned fields face. Since the output is predictive in nature, there is often the worry that the machine might generate data that impede human freedom.

Learn more about the professional ethics of AI systems here:

brainly.com/question/28158916

#SPJ1

You might be interested in
Business Risks are ​
blondinia [14]
Business risk is the exposure a company or organization has to factor(s) that will lower its profits or lead it to fail.
8 0
3 years ago
Task manager is showing an application as “not responding.” what can you do?
34kurt
I think it's b because "end application" would make the most sence
8 0
3 years ago
Which magazie can help the public determine the best technology to use
wariber [46]
Well you can read about technology in maybe tec company magazines like apple magazines or samsung magazines on which are best to buy Hope this helps:)
3 0
4 years ago
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
katrin2010 [14]

Answer: Pseudocode represents a language like solution

Explanation:

Pseudocode can be defined as one of the informal ways of programming whose description doesn't require any strict programming language syntax or even underlying technological considerations because it's evident that, it's not actually a real programming language . It is used major for an outline/rough draft of a required program. It also summarizes the flow of program, excluding underlying details. Designers usually write pseudocode in order for programmers to fathom the project's requirements of the software and align code appropriately.

5 0
4 years ago
Read 2 more answers
You have just started an internship on a graphic design team and you are learning about graphic formats used on the web. Which o
Aneli [31]

Answer:

Portable Network Graphics is the correct answer of this question.

Explanation:

Portable Network Graphics i is the graphics formats which we use for comic-style drawing Portable Network Graphics is a media structure that is used to compress digital video objects. Portable Network Graphics almost completely overtaken the Graphics Merge Standard (GIF),which has been commonly used during the history.

<u>For example</u>:- Portable Network Graphics images use lossless compression      like GIF files.

  • It has an indexed color raster image and is optimized with a data compression comparable to a GIF file.
  • Portable Network Graphics files are widely used to store opaque background Web graphics, digital photographs and images.

6 0
3 years ago
Other questions:
  • Imagine a situation where two developers are simultaneously modifying three different software components. what difficulties mig
    11·1 answer
  • When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?
    12·1 answer
  • What are the advantages of homogenation
    5·1 answer
  • i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
    12·1 answer
  • . Use of communications and information systems that are familiar to users is a part of which key principle? A. Security
    14·2 answers
  • ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
    14·1 answer
  • Which fund classification would a focus on only stocks of technology companies match?
    10·1 answer
  • // This program assigns values to two variables // and performs mathematical operations with them public class DebugFour1 { publ
    7·1 answer
  • In what situation is a read receipt notification not sent when an email is opened or previewed bya recipient?
    8·2 answers
  • ((Sorry for the self promo btw) Can you guys help me try and get affiliate on twitch? I am currently at 20 followers and it woul
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!