1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
4 years ago
15

coding could help prevent car crashes with automatic driving cars; however, some are afraid of tha because it allows control ove

r people.what do you think? safety verse power verse privacy?​
Computers and Technology
1 answer:
dybincka [34]4 years ago
5 0

Answer:

Honestly self driving cars are the future of humans and it can and will help us evolve. It could possibly be more dangerous if someone messed up the coding and it can be hacked by almost anyone with coding abilities, so it all depends on how safe you think you will be not driving yourself anywhere. Overall it could go both ways( good or bad.)

Hope this helped

Explanation:

You might be interested in
Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
Nadya [2.5K]

Answer:

dismiss all of them

Explanation:

4 0
3 years ago
Problem 6. (Fibonacci Number) Write a program fibonacci.py that accepts n (int) as command-line argument, and writes to standard
77julia77 [94]

Answer:

  1. import sys
  2. def fibonacci(n):
  3.    if(n == 0 or n == 1):
  4.        return n  
  5.    else:
  6.        return fibonacci(n - 2) + fibonacci(n-1)
  7. num = int(sys.argv)  
  8. output = ""
  9. for i in range(1, num+1):
  10.    output += str(fibonacci(i)) + " "  
  11. print(output)

Explanation:

Firstly, we import sys module as we need to accepts n as command line argument (Line 1).

Next, create a function fibonacci takes take one input n (Line 3). If the n is zero or one, return the n itself (Line 4-5). Otherwise, the program shall run the recursive call to the fibonacci function itself by putting n-2 and n-1 as function argument, respectively (Line 6-7).

After that, use the sys.argv to get the command line argument and assign the value to num (Line 9).

Use a for loop to generate the output string by progressively calling the fibonacci function and join the return result to the output string (Line 12-13).

At last print the output string (Line 15).

7 0
3 years ago
List the components of a typical operating system and summarize the role of each in a single phrase.
yanalaym [24]

Answer:

The answer is below

Explanation:

There are several components of operating systems, this may be based on the specific types of Operating systems. However, here are some of the major components.

1. Kernel: it delivers the primary level of control on all the computer peripherals.

2. Process Execution: it serves as a connection between the hardware and application program

3. Interrupt: it provides a dependable technique for the OS to transmit & respond to their surroundings.

4. Memory Management: it regulates main memory and then moves processes between disk & main memory during implementation.

5. Multitasking: it interprets the activities of many independent computer programs on a similar computer system.

6. Networking: it defines the interaction of processor through communication lines

7. Security: it protects the activities of other processes going in the system

8. User Interface: it provides permission for a computer operator to get the information.

3 0
3 years ago
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
What folder holds 32-bit programs installed in a 64-bit installation of windows?
raketka [301]
<span>C:\Program Files (x86) folder</span>
8 0
3 years ago
Other questions:
  • Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the g
    12·2 answers
  • Use the following data definitions data myBytes BYTE 10h,20h,30h,40h myWords WORD 3 DUP(?),2000h myString BYTE "ABCDE" What will
    9·1 answer
  • What was the first e-commerce service
    13·1 answer
  • What is the way to discover requirments for software projects ?
    14·1 answer
  • Critical Thinking Questions
    15·2 answers
  • ___________ is a computer programming language.
    9·2 answers
  • What are the pros and cons of using ICT​
    13·1 answer
  • Determining which computer platform (operating system) would be best for a particular student often depends on what the student
    11·1 answer
  • Find the quotient. 2.5 ÷ 5
    8·2 answers
  • Which of the following is the safest authentication method?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!