1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
13

Principles of Responsible Artificial Intelligence (AI)?

Computers and Technology
1 answer:
melamori03 [73]3 years ago
3 0

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

Explanation:

You might be interested in
What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
ValentinkaMS [17]

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

4 0
4 years ago
It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
Y_Kistochka [10]

Answer:

The laws and regulations will often define sensitive or protected data and the reporting requirements in the case of a data breach. Failure to follow the prescribed process can often result in fines or other penalties.

Explanation:

These data security laws should be standardized worldwide in order to stop internet abuses.

5 0
4 years ago
And this also please. help​
gregori [183]

Answer:

1. Scanner = reading passports.

2. Barcode reader = automatic stock control.

3. pH sensor = monitor soil in a greenhouse.

4. Microphone = voice recognition.

Explanation:

1. Scanner: Copies paper documents and converts the text and pictures into a computer-readable form. Therefore, it can be used for reading passports.

2. Barcode reader: reads labels containing parallel dark and light lines using laser light or LEDs; the width of each line represents a binary code. Therefore, it is used for automatic stock control.

3. pH sensor: detect changes in acidity levels; data is often in analogue form. Thus, it is typically used to monitor soil in a greenhouse.

4. Microphone: allows audio signals to be converted into electric signals; these can be interpreted by a computer after being converted into digital form. Microphones are used for voice recognition.

5 0
3 years ago
Damage to which portion of the limbic system results in loss of memory of recent events and difficulty committing anything new t
Vera_Pavlovna [14]

Answer:

Hippocampus.

Explanation:

There are two parts of the limbic system. They are the frontal part which is the amygdala and the posterior part which is the hippocampus.

The hippocampus is an extension of the temporal part  of the cerebral cortex which is a plastic-like structure that can be easily damaged by stimuli. It is packed with densed neurons and forms an S-shape at the extension of the temporal part.

It is responsible for learning and memory and damage to it can result to memory loss of recently learnt information.

8 0
3 years ago
An online news website relies on in-page advertisements to make money. Their article pages have multiple slots for advertisement
Masja [62]

Answer:

Create a dynamic-sized circularly-linked list to hold a tuple of the adverts and the count. As the program runs, the sum of the counts is used to calculate the fixed advertisement time which is saved in a variable time_slot. Then a loop statement should be used to traversal the linked list continuously until the count sum is exhausted for the day.

Explanation:

A circularly-linked list is a linked list with both ends joined together. With this data structure, the continuous traversal of the list is easier and faster. A conditional statement is used in the algorithm to check and decrement the count of each advert and when all is zero or false, the program ends.

7 0
3 years ago
Other questions:
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • ____ is an act, directed at Web sites catering to children, that requires site owners to post comprehensive privacy policies and
    5·1 answer
  • Compare the specialized and statistical functions in excel
    10·1 answer
  • A computer can sort x objects in t seconds, as modeled by the function below:
    5·1 answer
  • 4. What is the simplest way to permanently get rid of an unwanted file?
    12·1 answer
  • I love this an this a a good app ❤️❤️❤️​
    5·2 answers
  • Việc áp dụng khai báo hải quan điện tử có áp dụng chữ ký số, đem lại những lợi ích gì
    10·1 answer
  • Lists are indexed by an ________. a. float b. integer c. string d. All of the above​
    8·1 answer
  • Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false q
    7·1 answer
  • Which of the following is one of the tools used by a Python IDE that helps prevent syntax errors?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!