1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
3 years ago
13

Which of these is NOT an Al technology?

Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
7 0

Explanation:

The answer is B since facial recognition uses cameras that scan who you are. Robotics is controlled by someone with a remote or a simple command.

You might be interested in
Using the flowchart diagram, identify the decision point of this solution. Identify vendors. Calculate amount due. Determine dat
andreev551 [17]

Answer:

answer is "is there an early pay discount"

Explanation:

3 0
4 years ago
Read 2 more answers
In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retri
rusak2 [61]

Answer: a function or procedure call from one object to another object

Explanation: UML(Unified Modeling language) behavioral modeling is the depiction of the relation of the elements in a dynamic manner and the dependency on time .Message in the UML behavioral modeling is a functional call taking place from one element to another.

The interaction is the model is seen through the flow of messages.Other options are incorrect because message is not information holding data structure, does not display the relation between object rather presents the flow and is not a memory location .

7 0
3 years ago
Given a long integer representing a 10-digit phone number, output the area code, prefix, and line number using the format (800)
Alexxandr [17]

Answer:

See explanation!

Explanation:

Here we have a program written in C++ language. Each // symbol is a relative comment explaining the reason for each command line (and is not included during the program execution).

<em>The Program: </em>

#include <iostream>

<em>//c++ build in library</em>

using namespace std;

<em>//main code body starts here</em>

int main()

{

 <em> //declare variable to store phone numbers,its area code, prefix and line    number.</em>

  long pnumber;   <em>//declare long variable</em>

  int ac, prefix, lnumber;

 <em> //declare integer variables, where ac: Area Code and lnumber is the Line Number</em>

  cout<<"Enter a 10-digit Phone Number: "<<endl;

  <em>//cout command prints on screen the desired message</em>

  cin>>pnumber;

 <em> //cin command enables the user to interact with the programm and enter information manually</em>

 <em> //main body to obtain the desired output starts below</em>

<em>   //each 'division' is used to allocate the correct value at the correct </em>

<em>   //since prefix is used to get the desired output of ( )    -</em>

  ac = pnumber/10000000;

  prefix = (pnumber/10000)%1000;

  lnumber = pnumber%10000;

 <em> //main body ends here</em>

  cout<<"Based on your 10-digit number"<<endl;

  cout<<"below you have (AreaCode), Prefix, and - line number "<<endl;

  cout<<"("<<ac<<")"<<""<<prefix<<"-"<<lnumber<<endl;

 <em> //Prints on screen the desired output of the long 10 digit Number</em>

  return 0;<em> //ends program</em>

}

-------------------------------------------------------------------------------------------------------

<em>The Output Sample:</em>

Enter a 10-digit Phone Number:

8019004673

Based on your 10-digit number

below you have (Area Code), Prefix, and - line number

(801) 900-4673

<em>....Programm finished with exit code 0</em>

8 0
3 years ago
Small programs called _______ are used to communicate with Paris Friel devices such as monitors printers portable storage device
algol13

the answer is D drivers

7 0
3 years ago
What is phishing?
alexira [117]

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

7 0
3 years ago
Other questions:
  • Which method of encryption is based on physics principles?
    5·1 answer
  • write a c++program that allows the user to enter the last names of fivecandidates in a local election and the number of votes re
    15·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • To select a new theme for a slideshow use the blank tile in the ribbon
    9·2 answers
  • The benefits for a cad proram is: (points : 2) 1 accuracy 2 repeatability 3 simplicity 4 all of the above
    9·1 answer
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • Which one of the following items is an example of software?
    5·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Please help me please help me.​
    10·1 answer
  • Write a C++ function, smallestIndex, that takes as parameters an int array and its size and returns the index of the first occur
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!