1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
14

5. Robotics deals with the design, construction, operation, and use of robots, as well as computer systems for their control, se

nsory feedback, and information processing.
These technologies are used to develop machines that can substitute for humans and
replicate human actions.
a) False
b) True
Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
3 0

The answer would be

True

You might be interested in
Consider two sets S1 and S2 of size 3 and 2 each.
Brrunno [24]

Answer:

Answered

Explanation:

function from S_1 to S_2 (functions have unique mapping

each element in S_1 has 2 elements to map to in S_2 and there are 3 elements in S_1

therefore number of functions = 2^3 = 8 (2 choices for each of 3 elements)

a) relations between S_1 and S_2 are subset of S_1 x S_2

there are 6 elements in S_1 x S_2 therefore relations would be 2^6 = 64

(no of subsets of set of n elements = 2^n)

b) By above explanation functions from S_2 to S_1 = 3^2 = 9

 and relation from S_2 to S_2 = 2^4 = 16

7 0
3 years ago
What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
mars1129 [50]
I think its the ruler c
7 0
2 years ago
Read 2 more answers
* what is an electronic mail ?
Vikki [24]

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

6 0
3 years ago
Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
STatiana [176]
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
3 0
3 years ago
Read 2 more answers
Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw
xeze [42]

Answer:

host-based security measures

Explanation:

Anti-virus, host-based firewall, system hardening, change control, and log management are host based.

6 0
3 years ago
Other questions:
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • Create a structure named planet This structure will contain distance from Earth as an integer Atmosphere, language, people and p
    8·1 answer
  • What are the five resources paid for by local taxes
    15·1 answer
  • Which of the following is *not* true about logging user and program actions on a computer?
    10·1 answer
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • A single-user/single-tasking operating system allows only one user to perform one task at a time. A real-time operating system g
    13·1 answer
  • Xbox one is not turning on and power brick is orange why is that?​
    6·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
  • (40 PTS) Be specific
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!