Answer:
Section breaks
Explanation:
The Breaks command, which has several options, inserts section breaks. Section breaks appear as a double-dotted line, and they store formatting instructions such as margins, page size, and page numbering formats for the section above the marker.
Answer:
What is Robotics?
Robotics is the branch of technology that deal with the design, construction, operation and application of robots as well as computer system for there control, sensory feed back, and information processing. the design of given robotic system often contain principle of mechanical or electronic engineering and computer science. The word robotic was first used in 1941 by the writer Isaac Asimov.
Branches of robotics:
Artificial intelligence: The developing of an intelligence of machine and is a branch of computer science.
Nano Robotics : the field of creating machines that are at a scale of a nano meter.
Tele-presence: The study given to an illusion of being at a place without being there physically.
Robot Locomotion: The study of method that Robots used to transport them selves from place to another.
Robots have long captured the human imagination but despite many advances robots have yet to reach the potential so often envisioned in science fiction today engineers and computer scientist are still pursuing one missing ingredient high intelligence it would be nice for example: if robots possessed the intelligent needed to cope with uncertainty, learn from experience and work as team.
Intelligent robots will be one of the engineering achievement of 21 century said Junku Yuh, how leads the robotics program in the national science foundation computers and information science and engineering directorate "we will see them more and more in our daily life".
Answer:
False
Explanation:
Be safe and make good choices!!
Answer:
"Store date, intermediate results, and instructions (program."
Explanation:
"CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer."
Answer:
Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.
On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.
This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.