How much do you think robots would need to understand human emotions?

Answers

Answer 1

Answer:

In the future, a lot.

If we can get robots to understand the concept of emotions, we can create a whole new world and future that is better for everyone. The robots could do so much more.

-learning computers with potato


Related Questions

Can someone give me a simple topic for a website please be creative make it simple! and fun for brainliest

Answers

Answer:

hmm you could talk about your dailylife , or stuff you like to do etc do what you like <3 , if you like art you could do that to!

Explanation:

Can someone give me a simple topic for a website? please be creative make it simple! and fun for brainliest

explain briefly the use of computers in the education​

Answers

Answer:

it helps us in learning new words and also improve our vocabulary skills and even in games like using Mavis beacon

How could a game development team use measures of things like blood pressure, brain waves, eye movement, and even electrical conductivity of a player’s skin to improve their game

Answers

Responses from the somatic nervous system, essentially via electromyogram. ( via adding responses through your body in order to add abstract or involuntary actions)

Responses from the autonomous nervous system that include blood pressure, heart rate, temperature and stomach pH, among others.

Response from the central nervous system obtained via electroencephalogram, which detects brain rates (alpha, theta, SM and MU waves).

The development of methodologies in human interaction with technology has advanced a great deal over the last few decades in fields such as IT, engineering and even psychology.

ABC Company needs a weekly payroll report for its sales people. Input to the program is the weekly sales of the sales person. Each salesperson receives a base pay of 800 as well as a 10 percent commission on his or her total sales up to and including $1000.00. Any sales over $1000.00 merit a 20 percent commission for the employee. Compute the weekly payroll for one employee. Draw a flowchart to solve the problem

Answers

The payroll equation for one employee is given as;

Payroll = $800 + 10%( 0≥x≤$1000) + 20%(x>$1000).

Where X = Sales.

The payroll is computed as an equation because the commission is relational and not given. The flow chart to for the problem is attached.

What is a Flowchart?

A Flow chart is a graphical representation of a sequence of events showing the order in which they occur.

Flow charts are used for:

Designing programsDepicting or documenting simple processesMaking processes easy to communicate etc.

Flowcharts are usually related to Pseudocodes.

The pseudocode for the equation above will look like this:

StartInput xP = $800 + 10%( 0≥x≤$1000) + 20%(x>$1000).Displace PStop

Learn more about flow charts at:

https://brainly.com/question/6532130

What is a cyber crime?

help

Answers

Answer:

cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child p0®n0graphy and intellectual property, stealing identities, or violating privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

Answer:
Cyber crimes are [CRIMES]
Explanation:

Define a SCHEME function, unzip, which takes a list of pairs ((a .b)... (an .bn)) and returns a pair consisting of the two lists (a ...an) and (b. ... bn).

Answers

A scheme function can simply be defined as a programming language which allows us to build our own proce- dures and add them to the set of existing ones

However too, function call is given by as fa-rgs

Where, f is the name of the function and args a space-separated sequence of arguments

What is scheme?

It simply refers to an orderly large-scale plan or systematic arrangement for attaining a particular object or putting a particular idea into effect

So therefore, a scheme function can simply be defined as a programming language which allows us to build our own procedures and add them to the set of existing ones

Learn more about exponential scheme function:

https://brainly.com/question/11464095

Sounds can be played in the background and loop continuously
False
True

(Scratch Coding)

Answers

Answer:

True.

Explanation:

I think use the key repeat over your sound to make it loop

Help here please

Show that 2n+1 is O(2n
) and 8n+5 = Ω(n)

Answers

Answer:

Show that 2n+1 is O(2n)

Given f(n) = 2n+1

Definition of Big-Oh

f(n) = O(g(n)) means there are positive constants c and k, such that 0 ≤ f(n) ≤ cg(n) for all n ≥ k.

0 ≤ 2n+1 ≤ 2(2n)

Where c=2, n>0 and g(n)=2n

Explanation:

So, from the definition of Big-Oh we can say that

f(n) = O(g(n)) = o(2n)

what is a window with controls that you tell window what you want

Answers

Answer:

dialog box

I hope this helps you

:)

What kind of company would hire an Information Support and Service employee?

Answers

Answer:

A service company.

Explanation:

hope it helps!

Question 8:
It is important for a business to secure its computer data because:
sensitive information and data could be corrupted or stolen by a competitor.
o
competitors play fair and will not steal information.
O
computers automatically prevent security breaches from happening.
O
computers are not accessible by unwanted individuals.

Answers


A. sensitive information and data could be corrupted or stolen by a competitor.

The correct option is A. It is important for a business to secure its computer data because sensitive information and data could be corrupted or stolen by a competitor.

Why is data security important?

In order to prevent data breaches, lower the risk of data exposure, and ensure regulatory compliance, data security is necessary. The purpose of data security inside any company is to guarantee the continued safe and secure usage of sensitive data while reducing exposure risk.

The practice of safeguarding company data and avoiding data loss due to illegal access is known as data security. This entails safeguarding your data from assaults that can alter or damage it, as well as assaults that can encrypt or destroy it, like ransomware.

Thus, the ideal selection is option A.

Because law enforcement cannot be everywhere at once, what kind of intelligence should be focused on in order to avoid potential cyber
threats?
А. preventative
B. international
c. democratic
D. top-secret

Answers

B. International. I just took the test.

Which factor affects reading speed the most?
a.
The desire to improve speed
c.
The motivation to practice
b.
The willing to try new techniques
d.
These are all equal factors


Please select the best answer from the choices provided

A
B
C
D
Mark this and return

Answers

D of course because each one of them affects reading speed equally.

Answer:

D. these are all equal factors

Explanation:

i took the test lads

Discuss Network Heighbourhood lcon?

Answers

Answer:

Network Neighborhood was a desktop icon in Microsoft Windows NT, Windows 95, and Windows 98 that allows users to browse shared network resources on their computers. Using Network Neighborhood, you can browse resources on the network in the same way that you use My Computer to browse the resources on your local machine.

What is the hexadecimal value for the following, 0101

Answers

Answer:

5

Explanation:

What are variables? Write the name of any two types of variables.

Answers

Answer:

A variable is an identifier which changes the values given to it when the program is being executed.

e.g. - var count : integer

var avg : real

Explanation:

Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive information on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on.

Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?

Answers

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

What is  Vulnerability scanning?

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

Verify a threat exists.Bypass security controls.Actively test security controls.Exploit vulnerabilities.

Learn more about penetration test  from

https://brainly.com/question/26555003

Which variable data type is used to store a number that contains a decimal?

Question 3 options:

String


Integer


Boolean


Floating Point

Answers

Answer:

Floating Point

Explanation:

Also know as "real" or just "float".

key features of a desktop?

Answers

Answer.The

Quick Launch. ...

Taskbar. ...

Deskbands. ...

Notification area.

Explanation:

The Windows desktop has the following program access points:

Work area. The onscreen area where users can perform their work, as well as store programs, documents, and their shortcuts. ...

Answer:

The monitor is much wider, it has fast startups and functions, and good central processing.

1. this network device check the data package arriving from one computer and sends the data to a specific computer?
2. This network device sends the data packet from computer to all devices connected to it?
3. This network device connects a LAN to the Internet
4. This network device connects one LAN to another with the same protocol

Answers

Answer:

Explanation:

1. This network device check the data package arriving from one computer and sends the data to a specific computer - Router

2. This network device sends the data packet from computer to all devices connected to it - Hub

3. This network device connects a LAN to the Internet - Default Gateway

4. This network device connects one LAN to another with the same protocol - Router

Just noticed Router appeared twice. If they must be all different, please mention that in comment and I will think of a different name.

An Internet Service Provider(ISP) has three different subscription
packages for its customers:

Package A: For $15 per month with 50 hours of access provided.
Additional hours are $2.00 per hour over 50 hours.
Assume usage is recorded in one-hour increments,


Package B: For $20 per month with 100 hours of access provided.
Additional hours are $1.50 per hour over 100 hours.


Package C: For $25 per month with 150 hours access is provided.
Additional hours are $1.00 per hour over 150 hours

Assume the Billing Cycle is 30 days.

The ISP has contracted us to write the application software for their
new Billing System.

We will do the project over the next two weeks:

WEEK 9 -- Write the Functions to do the tasks that we will be using
to develop the application in Week 10.
WEEK 10 -- Write an Interactive Console Application using the
Functions which you developed in Week 9.

===========================================================================
DESCRIPTION of PROBLEM SET for Week 9
===========================================================================

Write the Function Definitions for the following tasks needed by
the ISP Billing System.

getPackage
validPackage
getHours
validHours
calculatePkg_A
calculatePkg_B
calculatePkg_C
---------------------------------------------------------------------------
getPackage: get value (A, B, C) for selected package from the keyboard.

validPackage: ensure that the value entered is an (A,B,C).

getHours: get value (0 - 720) for hours of usage from the keyboard.

validHours: ensure that the value entered is between 0 and 720.

calculatePkg_A: calculates the monthly charges for internet usage
based on hours of usage when Package 'A' is selected.

Answers

Use the knowledge of computational language in C code to write a code that has three different subscription packages for its customers.

How to write code about sales?

To make it simpler the code is described as:

#include <iostream>

#include <string>

using namespace std;

int main() {

string package;

float time;

float price;

cout << "Choose package: ";

cin >> package;

// Package validation

if ((package == "A") || (package == "B") || (package == "C")) {

cout << "The number of hours: ";

cin >> time;

// Time validation

if (time <= 744) {

// Package A

if (package == "A") {

if (time > 50) {

price = 15 + (time - 50) * 2;

} else {

price = 15;

}

// Package B

} else if (package == "B") {

if (time > 100) {

price = 20 + (time - 100) * 1.5;

} else {

price = 20;

}

// Package C

} else if (package == "C") {

if (time > 150) {

price = 25 + (time - 150) * 1;

} else {

price = 25;

}

cout << "Price: $" << price;

}

See more about C code at brainly.com/question/19705654

Briefly explain the Infrastructure challenges, Technology transfer issues, and Product
and service challenges

Answers

Answer:

asymmetric information, market power, and externalities

Explanation:

define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change the number of branches and size
then make on that does not use the pinwheel function to draw it

Answers

Start with your draw_pinwheel() function

During each iteration of the loop decide which color to set the turtle to using the color() function

On even iterations, use color1

On odd iterations, use color2

Use an if/else statement to do the decision making

After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.

If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.

my_number = 3

if(my_number % 2 == 0):     # the remainder of dividing by 2 is 0

   print("The number is "+str(my_number))

   print("The number is EVEN")

else:                       # the remainder must be 1

   print("The number is "+str(my_number))

   print("The number is ODD")

Good luck <3

Please help. Thanks

Satellite images are based on data obtained by Landsat satellites.


Please select the best answer from the choices provided

T
F

Answers

Answer:

Answer: T (true)

Satellite images are based on data obtained by Landsat satellites. The process of surveying is used by computer mapmakers to convert information into computer language. Satellite images are formed of pixels. With computers, mapmakers can store, process, and display map data electronically.

Landsat satellites have the optimal ground resolution and spectral bands to efficiently track land use and to document land change due to climate change, urbanization, drought, wildfire, biomass changes (carbon assessments), and a host of other natural and human-caused changes.

71. Name 5 computer skills that a Veterinary Assistant should possess.

Answers

Answer:

Using record keeping software , scheduling software , Computer-based accounting skills , Creating and extracting patient information

5 computer skills that a Veterinary Assistant should possess are

Computer-based accounting skills, chart creation for patients, retrieval of charts for patients, scheduling software, and operating record keeping software.

What are computer skills?Computer skills are expertise to use one's knowledge effectively.Computer skills are also known as computer literacy. Nowadays computer skills have become very important in everyone's life. The basic computer skills one should possess are typing, MS office, communication tools, operating systems,  E-mails, social media, web, etc.

To learn more about Computer skills refer to:

https://brainly.com/question/27032395

#SPJ2

as a rule, is a leak is found what should be done

Answers

Answer:

Refrigerant leaks detected at compressor crank 

Explanation:

the information of an management information system comes from?

Answers

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

Write a java program to input a number from the user and tell if that number is a power of 2 or not.
Powers of 2 are 1, 2, 4, 8, 16, 32, 64, 128, 256 and so on.

Answers

Answer:

 public static boolean isPowerOfTwo(int n) {

   long exp = Math.round(Math.log(n) / Math.log(2));

   return Math.pow(2, exp) == n;

 }

Explanation:

The opposite of power-of-2 is the 2-log, which is calculated using any log divided by log(2).

I'm sure you can do the input part yourself!

In order to use a data type, a variable must be _____________________ and _____________________.

memorized and initialized
declared and initialized
assigned and memorized
noted and declared

Answers

Answer:

declared and initialized

Explanation:

:))

What happens if we play talking Angela at 3 am​

Answers

maybe angela will talk to you

Explanation:

other people say it

Other Questions
5(s 30) = 10 please please help me Which of the following has had an effect on the shape of the Earths surface? movement of tectonic plates none of these weathering erosion all of these what did germany promise belgium it would do with its troops once peace had been achieved Connect the war of 1993 and 1947 in history of the Alps what is the rarest language still spoken today Most of the functions of a cell membrane, including transport and enzymatic function, are performed by. please help me answer this asap thank you Two parallel chords of a circle, MN and PQ have lengths 12 cm and 16 cm. If the diameter of the circle is20 cm, find the perpendicular distance between the chords. good evening! Can someone please answer this, ill give you brainliest and your earning 50 points. Would be very appreciated. The rest of the question with the picture says.A company is analyzing the data of two branches located in different cities. Part of reviewing the effectiveness of the branches involves analyzing the member statistics on each branch's website.for part b it says Explain your response to Part A. Be sure to include an explanation for both Branch A and Branch B. An object is moving to the leftat a constant speed. Itsacceleration is:A. PositiveB. NegativeC. Zero Thomas has to bring home $10.00 change but he wants to buy 2 hamburgers for his sisters will he have enough money to purchase the burgers ?(2 hamburgers is 2.25) ASAP MUST BE 100% CORRECT!!!Question 12 of 20Which of the following factors most directly contributed to the economicconditions described in Mr. Tarver's 1929 statement?A. Keynesian economic policies enacted by the Federal ReserveB. Forced closings of banks required by New Deal financial programsC. Reckless stock market speculation following World War ID. Falling corporate profits following the unionization of U.S. workersSUBMIT the equation y = x + 8 represents the length, y, in inches of a sleeping bag for a person who is x inches tall. which ordered pair does not belong on the graph? (64,72) (70,78) (72,80) (74,66) I will give you brainlist and 100 points please help02.04 First DraftIts time to compose the first draft of your news story.Paste your entire first draft of your news story here. It must meet the following requirements: a minimum of 500750 words longinclude an effective leadinclude direct quotations from your interviewed sourceinclude references to information you learned from your research sources Refer to the rubric to make sure you have met all the requirements for this draft. Keiko tosses one penny and Ephraim tosses two pennies. What is the probability that Ephraim gets the same number of heads that Keiko gets? What new facts or perspectives did you learn about the Civil War and reconstruction Ocho veces un nmero es restado de dos veces surecproco. El resultado es 15. Halla el nmero. A statue stands on a 625 m2 base. An artist creates a replica using a ratio of 1:10 What is the area of the replica's base? Why cripps mission was sent?(7) Name 2 ways that humans can use the products of yeast respiration Write a well-organized argument letter of three or four paragraphs on an issue that is meaningful. Example: 1) Wildlife. ( Will Mark Brainliest). Please Be Honest and Respectful with your answer). ( I need to turn the information that I posted in the picture to a 3 or 4 paragraph argument letter if anyone would be able to help me). You'll get Brainliest if you can actually help and 5 .