1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
10

Select the correct answer.

Computers and Technology
1 answer:
Alex3 years ago
4 0

To my thinking:

If it's a humanlike AI- then her phone will speak like we speak (english and other languages) also will talk how we talk (slang and will think what is the answer is based on the problems like right now the virus, everyone thinks we going to be stuck indoors forever so the AI will think that too)

if it's a non-humanlike AI- then the AI will be like -beep beep- (and say things that the users does’t understand )

if it's a weak AI- then it would be limited or use any info, expecting the user to find it out

if it's a strong AI- then it will answer things like as there sure what they said is an answer. like a educated guess

if it's a true AI- then it will have all the answers right, no matter if the AI looked it up or not

so to my thinking- I have Siri (iPhone) and when I see the answers to see what my AI is, then I would have picked answers A and E. But if I have to chose one then I'm am going with E.

You might be interested in
The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the s
Alisiya [41]

Answer:

You should use an effective password cracker.

Explanation:

Since the system administrator decided to quit unexpectedly and apparently, he changed the server password and no one knows what it is. What you might do in this type of situation is to use an effective password cracker.

A password cracker can be defined as a software application or program used for retrieving passwords from stored locations or computer data systems. This simply means that, a password cracker is used to recover passwords in order to gain access to a computer system that is protected by authentication.

Some examples of commonly used passwords cracker are ElcomSoft, Aircrack, Hashcat, John the Ripper, Hydra, Cain and Abel, DaveGrohl, Ophcrack etc.

4 0
3 years ago
A static class method can be accessed without referring to any objects of the class. True False
VLD [36.1K]

Answer:

True

Explanation:

This is true because a static class method can be accessed without referring to any objects of the class. When a class member is made static, it's very easy to access the object.

The member becomes static and becomes class level

4 0
3 years ago
A circle surrounding the earth at the equator would consist of ___________ “degrees” of angular measurement.
Lelu [443]

Answer:

360°

Explanation:

Earth rotation can be defined as the amount of time taken by planet earth to complete its spinning movement on its axis.

This ultimately implies that, the rotation of earth refers to the time taken by earth to rotate once on its axis. One spinning movement of the earth on its axis takes approximately 24 hours to complete with respect to the Sun. Therefore, in a 24 hour period, the earth rotates 360 degrees about its axis and as such in an hour it rotates 15 degrees to create a 24-hours time zones.

When the earth's equatorial plane intersect with the surface of a celestial sphere, it results in the formation of a great circle which divides or cuts the earth into two equal halves known as celestial equator. This great circle divides the earth into a circumference having two (2) equal halves.

Hence, a circle surrounding the earth at the equator would consist of 360 “degrees” of angular measurement. Thus, giving rise to latitude (zones of latitude) which is north or south of the equator that includes equatorial, low latitude, mid latitude, tropical, subtropical and polar regions.

5 0
3 years ago
Which two statements are true about algorithms?
DENIUS [597]

Answer:

I. Algorithms can be written using pseudocode.

II. Algorithms can be visualized using flowcharts.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

The two statements which are true about algorithms are;

I. Algorithms can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. Algorithms can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

3 0
3 years ago
Read 2 more answers
Which of the following is considered a modern method of communication?
Vika [28.1K]
The answer is C. Tablet, because that is the quickest, easiest, and most recent way of communication.
4 0
3 years ago
Read 2 more answers
Other questions:
  • The front surface of the CCD is called the _________
    11·1 answer
  • Which of the following can be created when two tables contain a common field?
    14·1 answer
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • In order to get a comprehensive evaluation of the computer programmers he managed, Justin organized a(n) __________, where he as
    11·1 answer
  • Which of the following would be useful to understand if you wanted to build a web page
    15·1 answer
  • Site at least 3 articles of impact of internet that affect in our daily lives.
    15·1 answer
  • Numerical methods are implementations of mathematical algorithms, but constructed with special consideration for accuracy of sol
    7·1 answer
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
  • Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!