1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
10

You are asked to add speech to a robotic receptionist that sits at the front desk of a large organization. The robot has an anim

ated face and can track users with a laser range finder. The system already has been used with type-in and print out information. Explain what their requirements and restrictions would be. How would these components interact with the existing dialog component? How would you evaluate it?
Computers and Technology
2 answers:
Firlakuza [10]3 years ago
7 0

Explanation:

The requirements would be that the receptionist robot detects the incoming person and speak;

<em>Good morning (based on time), Welcome to XYZ organization. How can i help you. Do you need to visit HR, finance, marketing, sales, engineering etc representative or other function?</em>

Now based on that a visitee information is printed out.

Limitation

A person comes who does not understand what robot speaks

Interaction with existing dialogue would be made possible through speech recognition system

The system will work well as speech recognition has now been used in many functions and robots have also now become quite advanced

Maru [420]3 years ago
4 0

Answer:

Refer below for the explanation.

Explanation:

Requirements:

Robot that is installed with the laser range finder detects when the person is coming and ask him the basic questions.

Hello, how are you. Welcome to the company. Where do you want to go?

Restrictions:

As there is speech recognition and text-to-speech components so it will help the user if the robot is unable to answer his questions.

You might be interested in
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
Comment if u wanna text me on behance
kow [346]

Answer:

what is behance? :)

Explanation:

4 0
3 years ago
A_______VPN connection is a private network that uses a public
goldfiish [28.3K]

Answer:

letter c. point to site po sagot diyan

3 0
3 years ago
The process of using the new
IRINA_888 [86]

Answer:

The process of using the new

information system and doing away

with the old system is known as

system <u>development</u>

7 0
3 years ago
21
n200080 [17]

Answer:

slide sorter view

Explanation:

Explanation: while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

8 0
3 years ago
Other questions:
  • How many 16ths are in 3/8 of an inch
    12·1 answer
  • Referential integrity states that:______.
    15·1 answer
  • Courses that enable students to begin jobs that require course completion certificates are know as
    8·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Which of the following behaviors does not harm a company if your employment is terminated?
    9·1 answer
  • Explain why interrupt times and dispatch delays must be limited to a hard real-time system?
    8·1 answer
  • What term is used to describe our connection with eachother through technology
    6·1 answer
  • What is missing in the following program in order to have the output shown?
    15·2 answers
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    6·1 answer
  • Difference between centralized and decentralized processing in computer
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!