1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
5

Can someone write a 5 sentence summary about Virtual Assistants. Please. I'm in a rush. Personal problems.

Computers and Technology
1 answer:
Lyrx [107]3 years ago
7 0
Virtual Assistants can be useful. Blind people can use them to be informed, browse the web, and learn new facts. They can make tasks quicker too. They can control things like your heater or air conditioner. But if one were to malfunction, it could take lives.
You might be interested in
Create a variable ‘temp’ and assign the value in Celsius. Display the message ‘It’s extremely hot day today!’ if the temperature
Svetlanka [38]

Answer:

temp = 47

if temp > 40:

   print("It’s extremely hot day today!")

else:

   print("It’s not too hot!")

Explanation:

*The code is in Python.

Create a variable called temp and set its value as 47

Check the temp using if-else structure. If the temp is greater than 40, print "It’s extremely hot day today!". Otherwise, print "It’s not too hot!".

8 0
4 years ago
Kelly is evaluating the following image. Which of the statements that she makes about the photograph is true?
Stells [14]

Photo not included

Plz add photo

7 0
3 years ago
20 points for ez question lol
slega [8]
I think it might be the third on not certain
5 0
3 years ago
Read 2 more answers
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
PLZ BEEN STUCK ON THIS
Gnoma [55]

Answer:

am not really sure but between TCP/IP and data link am sorry for not being precise .

6 0
3 years ago
Read 2 more answers
Other questions:
  • 7.14 LAB: Word frequencies Write a program that reads a list of words. Then, the program outputs those words and their frequenci
    10·1 answer
  • What is the Difference between raw_input and input?
    6·1 answer
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • Including quotes in your paper can bring additional meaning to the content True are false
    11·2 answers
  • In statistics, what is the mode of a data set?
    6·2 answers
  • Which of the following is not true about a computer byte? A) It is made up of 8 bits. B) Each letter of the alphabet is stored i
    15·1 answer
  • _______ Originally , the art of maganing engines; in its modern and extended sense
    7·1 answer
  • When two conductors are accidentally connected it is<br> called a
    6·1 answer
  • If you have a 99% and you got a 50 on a test what is the grade please I will give brainless
    7·2 answers
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!