1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
15

•Should other states wait to see if the high-speed rail system works well before starting their own plans for similar systems?

Computers and Technology
1 answer:
solmaris [256]3 years ago
7 0
Other states should see how well the system works and also understand how much money it requires for the state to build a high-speed rail system.
You might be interested in
9. Which of the following is the most popular eSport game ever?
Mice21 [21]

Answer:

B) League of Legends

Explanation:

Why wouldn't it

5 0
3 years ago
For a loop counter, the appropriate data type would be:
BigorU [14]

Answer:a) int

Explanation: Loop counter is the kind of program that has the major function of counting the start value to the destination value in the form of integer.The integer is used for counting the values in a particular loop is known as the loop control variable.Therefore the accurate datatype for the loop counter to count the values should be of int type.

8 0
3 years ago
Click cell C6 in the Data worksheet and insert a column. Type Series Name in cell C6. Click cell C7 in the Data worksheet and in
Rudiy27

Answer:

right click cell C6 then insert entire column.

Type "Series Name"

Insert function to C7 = VLOOKUP (B7,$A$2:$B$4,2,FALSE)

Copy through C22

Select the range then select format and column width to change the width to 18.

7 0
3 years ago
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
even if we reach that state where an AI can behave as human does,how do we measure if AI is acting like a human?
xxTIMURxx [149]

A person can be able to measure if AI is acting like a human by the use of   Turing test.

<h3>How do we measure of artificial intelligence is acting like a human?</h3>

One can measure if AI is  Acting humanly via the use of a human who is said to interrogates the program and also the use of another person through the use of a terminal simultaneously.

Note that If after some amount of time or period, the interrogator is said to be unable to tell which is which, the program is said to have passed. To pass this test it is one that needs natural language processing.

Hence, A person can be able to measure if AI is acting like a human by the use of Turing test.

Learn more about AI from

brainly.com/question/25523571

#SPJ1

4 0
1 year ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • What lie does E.D. tell to keep the musical from being canceled? There is a television crew coming to do a story on it. Jake wil
    6·1 answer
  • An OR function nested in an IF function results in
    11·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and
    6·1 answer
  • Write a Python program that prompts the user for the cost of two items to be purchased. Then prompt the user for payment. If the
    11·1 answer
  • Use the drop-down tool to select the word or phrase that completes each sentence.
    7·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • What is the answer in music class
    6·1 answer
  • Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!