1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
1 year ago
14

Ethics related to all artificial intelligence?

Computers and Technology
1 answer:
slava [35]1 year ago
3 0

Answer: autonomous systems (transportation, weapons), machine bias in law, privacy and surveillance,  AI governance, confirming the moral and legal status of intelligent machines (artificial moral agents), human-machine interaction, mass automation; (3) long-term (starting with the 2100s): technological singularity, mass unemployment, space colonization. etc

You might be interested in
Complete the code to create a new file.
Mila [183]

The code segments are illustrations of file manipulations

  • The character that completes the code to create a new file is W
  • The character that completes the code to add to a new file is A.

<h3>Creating a new file</h3>

When a new file is created, the default file mode is the write mode.

This in other words means that, we are writing to a file.

So, the character that completes the code to create a new file is W

<h3>Adding to a new file</h3>

To add texts to a file, is to append texts to the file.

This means that, the file is an existing file that needs to be updated.

So, the character that completes the code to add to a new file is A.

Read more about file manipulations at:

brainly.com/question/25324400

3 0
3 years ago
Name:
Elanso [62]
1 6gb of ram
inteel
500gb
500gb
4 0
3 years ago
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobi
artcher [175]

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

6 0
3 years ago
All windows on the desktop have width and height (as well as numerous other attributes). However the actual contents of the wind
Cerrena [4.2K]

Answer:

The abstract class Window:

public abstract class Window

Two integer instance variables, width and height:

private int width, height;

Two accessor methods, getWidth and getHeight:

public int getWidth()

public int getHeight()

A constructor that accepts two integers and uses them to initialize the two instance variables:

public Window(int var1, int var2) {width =var1; height = var2;}

An abstract void-returning method named paint that accepts no parameters

public abstract void paint();

Explanation:

Abstract keyword is used with Windows class to make this class an abstract class which means no object can be created using this class.

Two private instance variable width and height. Private means they are not accessible outside this class.

Then getWidth and getHeight methods are used to return width and height.

The constructor takes two integer type variables var1 and var2. These two variable are used to initialize the variables width and height. Constructor has the same name as that of the class.

Method paint() is an abstract method with the return type void which has no parameters.  

So here is what the class with all its methods and instance variables looks.

public abstract class Window {

private int width, height;

public Window(int a, int b) {width = a; height = b;}

public int getWidth(){ return width; }

public int getHeight(){ return height; }

public abstract void paint();

}

6 0
3 years ago
Floating point numbers?
blondinia [14]

Answer:

Thank you so much!!!

God bless you!!!

You the best!!!

Explanation:

4 0
3 years ago
Other questions:
  • What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
    11·1 answer
  • Which of the following is a preferable method to secure wireless access in a SOHO?
    6·1 answer
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • If a suspect is not read his or her Miranda rights, then nothing the suspect says can be used at trial, even if the suspect volu
    11·1 answer
  • Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hi
    7·1 answer
  • A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to mul
    8·1 answer
  • Look at the following program and answer the question that follows it. 1 // This program displays my gross wages. 2 // I worked
    8·1 answer
  • The following is a mock-up of a Battleship game board. The square with a X marks the position of a battleship.
    13·1 answer
  • You have searched a database to locate US cities with population counts above 1 million people. You need to present the results
    6·2 answers
  • Digital Print Project
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!