1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
3 years ago
11

Give one example of where augmented reality is used​

Computers and Technology
2 answers:
vovikov84 [41]3 years ago
6 0
Augmented reality is used during Construction and Maintenance

Service manuals with interactive 3D animations and other instructions can be displayed in the physical environment via augmented reality technology.
Augmented reality can help provide remote assistance to customers as they repair or complete maintenance procedures on products.
topjm [15]3 years ago
5 0

Answer

Medical Training

<em>From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.</em>

<em>it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc </em>

You might be interested in
How would you describe the relationship between blocks of code and commands?<br>HELP​
Karolina [17]

Answer:

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

Explanation:

hope this helps.

7 0
3 years ago
A certain string-processing language offers a primitive operation which splits a string into two pieces. Since this operation in
Nostrana [21]

Answer:

Explanation:

First we define define cost(i,j) to be the cost of cutting the string from index i to j. Then,

cost(i,j) = min {length of substring + cost(i,k) + cost(k,j) where i < k < j}

void  s_cut()    

 {

   int l,p;

   int temp=0;

   //ArrayList<Integer> al = new ArrayList<Integer>();

   int al[];

   Scanner s=new Scanner(System.in);

   int table[][];

   ArrayList<Integer> values[][];

   int low=0,high=0;

   int min=0;

   l=s.nextInt();

   p=s.nextInt();

   System.out.println("The values are "+l+"  "+p);

   table= new int[l+1][l+1];

   values= new ArrayList[l+1][l+1];

   al= new int[p];

   for(int i=0;i<p;i++)

   {

       al[i]=s.nextInt();

   }

   for(int i=0;i<=l;i++)

   for(int j=0;j<=l;j++)

       values[i][j]=new ArrayList<Integer>();

   System.out.println();

   for(int i=1;i<=l;i++)

       table[i][i]=0;

   //Arrays.s

   Arrays.sort(al);

   for(int i=0;i<p;i++)

   {

       System.out.print(al[i]+ "  ");

   }

   for(int len=2;len<=l;len++)

   {

       //System.out.println("The length is  "+len);

       for(int i=1,j=i+len-1;j<=l;i++,j++)

       {

           high= min_index(al,j-1);

           low= max_index(al,i);

           System.out.println("Indices are "+low+"  "+high);

           if(low<=high && low!=-1 && high!=-1)

           {

           int cost=Integer.MAX_VALUE;;

           for(int k=low;k<=high;k++)

           {

               //if(al[k]!=j)

               temp=cost;

               cost=Math.min(cost, table[i][al[k]]+table[al[k]+1][j]);

               if(temp!=cost)

               {

                   min=k;  

                   //values[i][j].add(al[k]);

                   //values[i][j].addAll(values[i][al[k]]);

                   //values[i][j].addAll(values[al[k]+1][j]);

                   //values[i][j].addAll(values[i][al[k]]);

               }

               //else

               //cost=0;

           }

           table[i][j]= len+cost;

           values[i][j].add(al[min]);

           //values[i][j].addAll(values[i][al[min]]);

           values[i][j].addAll(values[al[min]+1][j]);

           values[i][j].addAll(values[i][al[min]]);

           }

           else

               table[i][j]=0;

           System.out.println(" values are "+i+"  "+j+"  "+table[i][j]);

       }

   }

   System.out.println(" The minimum cost is "+table[1][l]);

   //temp=values[1][l];

   for(int e: values[1][l])

   {

       System.out.print(e+"-->");

   }

8 0
4 years ago
Why authentication processes and features important
vladimir2022 [97]

Answer:

<u>Authentication processes</u> are extremely important because they are an extra layer of security. These processes can help keep networks secure by only permitting authorised users to access them. <u>Authentication processes</u> can be used on things such as networks, databases, websites and other network based services/platforms.

Explanation:

3 0
3 years ago
The total number of errors divided by the total number of bits transmitted is the definition of __________. committed informatio
kodGreya [7K]

The answer in the blank is bit error rate, for it is where errors usually occurs and this happens during the digital data transmission. Because of the errors that it is being managed, it divides those errors by the total number of bits that are being transmitted during the process. It happens within a given period.

8 0
4 years ago
A digital camera is an_____​
garik1379 [7]

ITS ABOUT DRIVE

ITS ABOUT POWER

WE STAY HUNGRY

WE DEVOUR

PUT IN THE WORK

PUT IN THE HOURS ⌚

AND TAKE WHATS OURS

Explanation:

fr what is it?

7 0
3 years ago
Read 2 more answers
Other questions:
  • List several things that geographers can map using remotely sensed data
    5·1 answer
  • Which of the following is NOT a MySQL table storage engine?
    6·1 answer
  • When parallel sections of oxygen and fuel gas hoses are taped together, only _____ inches out of 12 inches should be covered by
    8·2 answers
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • Problem: you need to write a code that read 2 array of size 10x10 of zero and ones that represent black
    8·1 answer
  • Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_
    13·1 answer
  • After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their nex
    15·1 answer
  • What is table,form,query and report ?short ans​
    13·1 answer
  • Identify the two top benefits of using angel investors to start a business.
    6·1 answer
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!