1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
14

Pro and Cons of Artificial Intelligence in Art You must have 3 statements in each

Computers and Technology
1 answer:
Anni [7]3 years ago
6 0

Answer:

The answer is below

Explanation:

Aritifiaicla intelligence in art is an artwork created by the application of artificial intelligence software.

Some of the pros of artificial intelligence in the art are:

1. It creates a new and improved interface, specifically in graphic design such as virtual reality and 3D printing

2. It creates and mixes the artistic ideas properly, such as mixing of different instruments in music to creates a new sound

3. It establishes graphical and visual display with no blemishes o,r error when applied accordingly, such as AUTOCAD

The cons of artificial intelligence in art are:

1. Artificial Intelligence lacks emotional sense. Hence it is challenging to display artistic elements that portray genuine emotions

2. It lacks creativity. Unlike humans, artificial intelligence is not as creative as humans when it comes to words or sentence constructions in an artistic sense.

3. It doesn't apply experience to its productions. Arts can be improved with more understanding of what is happening in the society or environment; artificial intelligence cannot translate its experience into arts formation.

You might be interested in
What is the best overall approach to education and career development for IT professionals?
LuckyWell [14K]

Professional development is learning to earn or maintain professional credentials such as academic degrees to formal coursework, conferences and informal learning opportunities situated in practice. It has been described as intensive and collaborative, ideally incorporating an evaluative stage.[1] There are a variety of approaches to professional development, including consultation, coaching, communities of practice, lesson study, mentoring, reflective supervision and technical assistance.[2]


5 0
4 years ago
I am having trouble with this python question. I am in a beginner level class also so any solution that isn't too complex would
Delicious77 [7]

The code:

filename = input("> ")

with open(filename, "r") as file:

   items = file.read()

   items = items.split("\n")

   for index, item in enumerate(items):

       items[index] = item.split("\t")

   for item in items:

       if item[3] == "Available":

           print(f"{item[1]} ({item[0]}) -- {item[2]}")

Explenation:

1. We make the user enter the file's path, in our case "food.txt". This does only work if the .txt file is in the <u>same</u> directory as our code.

2. We get the content of our .txt file with the "open" function. If we use the "open" function inside of a "with" statement we don't have to deal with closing the file after we opened it. The file will close as soon as we exit the statement. The argument "r" indicates that we only want to read the file, not do anything else with it.

3. However the variable "file" doesn't contain the <u>contents</u> of "food.txt", only the class object of our file (if you try "print(file)" you'll only get nonsense). We can simply get the content of the file by calling ".read()" after.

4. We can separate this long str using the ".split()" function. The split function seperates a string by another sertain string (in our case "\n", since the different items are seperated by a newline). Now "items" is a list of strings.

5. Next we go through all items in "items" and separate them by "\t", again using the ".split()" function. Enumerate makes a list of indexes and values from another list (in our case, "items").

6. Now we have a list of lists of strings. The only thing left to do is go through every item and print it if the item's third item is equal to "Available" (notice that this is case-sensative). And print out the result in the desired format.

The code works for me, please ask me if there is anything you don't understand (or if the code is incorrect). Happy to help :D

5 0
2 years ago
Please help me answer this<br><br>number 1..
beks73 [17]

Answer:

B. How well it conveys information

Explanation:

The most important thing is how we represent the data in a graphic to understand the purpose, we can make an example, but we're going to use the color, can be more effective in a weather chart, for temperatures or clouds, but in an organization, we can use color on red or green numbers, in this way to convey bad and good numbers.

4 0
3 years ago
________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
Harrizon [31]
Trojan horse is the correct answer
5 0
3 years ago
Your Windows client systems are joined to the WestSim domain. To ensure correct time stamps are used, you need to verify that th
natita [175]

<u>Full question:</u>

Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone.

Which command can you use to do this?

• w32tm /tz

• w32tm /monitor

• w32tm /register

• w32tm /query /status

<u>Answer:</u>

w32tm /tz command can you use to do this

<u>Explanation:</u>

W32tm.exe is the approved command-line mechanism for configuring, monitoring, or troubleshooting the Windows Time service. This mechanism is a portion of the default connection between Windows and Windows Server. One can use W32tm.exe to configure Windows Time service settings and to diagnose time setting obstacles.

The syntax is W32tm </parameter> </param2>. w32tm /tz will represent contemporary time zone settings. The Windows Time service is not a full-featured NTP clarification that convenes time-sensitive reinforcement requirements, and it is not verified by Microsoft as such.

6 0
4 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • A network using multiple cell towers falls under which type of network?
    13·1 answer
  • ) How many switching functions of two variables (x and y) are there?
    11·1 answer
  • Is 5g harmful to the body ?
    9·2 answers
  • Many of the first photographers were actullay scientists and inventors
    11·1 answer
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • Write convert() method to cast double to int
    7·1 answer
  • Complete the sentence.
    8·1 answer
  • Different search engines available on the internet​
    7·1 answer
  • Range paramters - for loop<br> question in picture
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!