Answer:
How can line formatting be accomplished?
To format line spacing:
Select the text you want to format. Selecting text to format.
On the Home tab, click the Line and Paragraph Spacing command. A drop-down menu will appear.
Move the mouse over the various options. A live preview of the line spacing will appear in the document. Select the line spacing you want to use.
The line spacing will change in the document.
Task 03
Write C# code which starts with the number 1 and then displays the result of halving
the previous number until the result is less than 0.001.
The expected output should be:
1.0
0.5
0.25
0.125
0.0625
0.03125
0.015625
0.0078125
0.00390625
0.001953125
Answer:
class Program {
public static void Main (string[] args) {
double number = 1.0;
while(number >= 0.001) {
Console.WriteLine (number);
number /= 2;
}
}
}
Explanation:
Always think carefully about what is in the condition of the while statement. In this case, you want the loop to be executed as long as the number is larger than or equal to 0.001.
Help!
Write the declaration for a gradient. It may be either gradient type, and consist of any colors.
Answer:
it may be linear gradient.
How artifical intelligence will have more effect on our day to day life ?
Answer:
Artificial intelligence can dramatically improve the efficiencies of our workplaces and can augment the work humans can do. When AI takes over repetitive or dangerous tasks, it frees up the human workforce to do work they are better equipped for—tasks that involve creativity and empathy among others.
Find a regular grammar that generates the language L(aa*(ab+a)*)
Answer:
S → aAB
A → a | ɛ
B → abB | aB | ɛ
Explanation:
Long time ago I did this, but I think this does the job?
Regular grammar for language L(aa*(ab+a)*):
S -> aA, A -> aA | B, B -> ab | a | ε.
We have,
To construct a regular grammar that generates the language
L(aa*(ab+a)*), we need to break it down into its basic components and then define the production rules for each part.
The language L(aa*(ab+a)) consists of strings that start with one or more 'a's (aa), followed by either the string "ab" or just "a" (ab+a)*.
Note that the "ab+a" part can repeat zero or more times.
Here is the regular grammar:
- Start with the initial non-terminal S.
- The production rules are as follows:
S -> aA
A -> aA | B
B -> ab | a | ε
- Explanation of the production rules:
S -> aA: The string starts with an 'a', followed by A.
A -> aA: If the string contains more 'a's, it remains in A and continues adding 'a's.
A -> B: If the string contains "ab" or just "a", it goes to B.
B -> ab: The string contains "ab".
B -> a: The string contains only "a".
B -> ε: The string is empty.
This grammar generates strings in the language L(aa*(ab+a)*).
The notation "ε" represents an empty string (i.e., the production rule does not add any symbols to the string).
Thus,
Regular grammar for language L(aa*(ab+a)*):
S -> aA, A -> aA | B, B -> ab | a | ε.
Learn more about regular grammar for languages here:
https://brainly.com/question/31423942
#SPJ3
Question 4 of 10
Which action takes place in the Define step of the game development cycle?
A. Looking for errors and determining how best to fix them
B. Choosing a color scheme and overall theme for the game
OC. Determining the goals of the game
D. Releasing the game and collecting feedback from users
SUBMIT
An action which takes place in the Define step of the game development cycle is: C. determining the goals of the game.
What is GDLC?GDLC is an acronym for game development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages that are associated with the design, development and implementation of high quality gaming software programs (applications).
In Computer science, there are seven (7) phases involved in the development of a gaming software program and these include the following;
DefinePlanningDesignDevelopment (coding)TestingDeploymentMaintenanceIn this context, we can infer and logically deduce that determining the goals of the game is an action which takes place in the Define step of the game development cycle.
Read more on software here: brainly.com/question/26324021
#SPJ1
Which action takes place in the Deploy stop of the game development cycle?
Answer: is D. Releasing the game and collecting feedback from users
fill in the blanks
a:………was the main component in the first generation computer
Answer:
vaccum tubeExplanation:
mark me brainlist!!Write a program to demonstrate doubly linked list using pointers – insert (beginning, end,
middle), delete(beginning, end, middle),view)
A program to demonstrate doubly linked list using pointers – insert (beginning, end, middle), delete(beginning, end, middle),view) is:
/* Initialize nodes */
struct node *head;
struct node *one = NULL;
struct node *two = NULL;
struct node *three = NULL;
/* Allocate memory */
one = malloc(sizeof(struct node));
two = malloc(sizeof(struct node));
three = malloc(sizeof(struct node));
/* Assign data values */
one->data = 1;
two->data = 2;
three->data = 3;
/* Connect nodes */
one->next = two;
one->prev = NULL;
two->next = three;
two->prev = one;
three->next = NULL;
three->prev = two;
/* Save address of first node in head */
head = one;
What is a Doubly Linked List?This refers to the linked data structure that contains of a set of sequentially linked records called nodes.
The requested program is given above.
Read more about doubly linked list here:
https://brainly.com/question/13326183
#SPJ1
Question 1
Write C# code which generates and displays 10 random (integer) numbers between 0 and
50, note that each time this program runs the results are different.
Question 2
Repeat your code from the previous exercise.
In addition to generating the 10 random numbers, display the lowest of the 10 numbers.
Question 3
Repeat your code from the previous exercise.
In addition to the lowest number, display the highest and the average of the 10
numbers.
Using the knowledge in computational language in C++ it is possible to write a code that generates and displays 10 random (integer) numbers between 0 and 50.
Writting the code in C++class SecureRandom : Random
{
public static byte[] GetBytes(ulong length)
{
RNGCryptoServiceProvider RNG = new RNGCryptoServiceProvider();
byte[] bytes = new byte[length];
RNG.GetBytes(bytes);
RNG.Dispose();
return bytes;
}
public SecureRandom() : base(BitConverter.ToInt32(GetBytes(4), 0))
{
}
public int GetRandomInt(int min, int max)
{
int treashold = max - min;
if(treashold != Math.Abs(treashold))
{
throw new ArithmeticException("The minimum value can't exceed the maximum value!");
}
if (treashold == 0)
{
throw new ArithmeticException("The minimum value can't be the same as the maximum value!");
}
return min + (Next() % treashold);
}
public static int GetRandomIntStatic(int min, int max)
{
int treashold = max - min;
if (treashold != Math.Abs(treashold))
{
throw new ArithmeticException("The minimum value can't exceed the maximum value!");
}
if(treashold == 0)
{
throw new ArithmeticException("The minimum value can't be the same as the maximum value!");
}
return min + (BitConverter.ToInt32(GetBytes(4), 0) % treashold);
}
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
Please solve this in JAVA
Please see the attachment
Answer:
I'm going to do it but you should try these things for yourself or else you won't learn.
Explanation:
-First create a project (I'm using Netbeans 14 and the project is a Maven, but the code should work on any IDE)
-Name the project 'ShoppingCartPrinter' and leave the package name as it is. This is the main class so the main method is gonna be there already.
-Then you will create a second class named 'ItemToPurchase'. So I'll leave the code in the attachment (at the bottom of my answer it's written 'Download txt') or else brainly will think it's some sort of redirection to another websites because of the 'dots' and won't let me post it.
For a computer, it is a minimum system requirement that the video card supports directx 9 graphics with ____________________ 1.0 or higher driver.
Answer:
With 0.5,0.7,0.9 drivers
What is the output of the
given program if the user
enters 20?
A. A lot of fun
B. some fun
C. no fun
Consider the following
segment:
Scanner
Scanner(System.in);
input
System.out.print("Please
value");
int value =
fun");
}
else
{
input.nextInt();
if (value >= 30 )
{
program
enter
System.out.println("A
lot
new
a
of
5
if(value_ 30)
Explanation:
es igual 30 espero que te sirva
Question One
a) The research department of De-mod Limited has developed a software at a cost of ten million cedi that is a game changer. In other to ensure total ownership and control of the software, you have been consulted to provide an advice on what De-mod Limited can do to maintain absolute ownership and control of the newly developed software.
With the knowledge you have acquired in this course, examine at least three protections for developers of computer software, stating the merits and demerits of each EV(7Marks)
The three protections for developers of computer software, are:
Patents Copyright and Trade secretsTrademarks.What are the different kinds of protection of computer software?The principal modes of protection of software is known to be copyright and patents. Copyright is said to be used a lot so as to protect computer program, this is due to the fact that writing of a code is one that tends to be similar to any other kinds of literary work.
Patents are known to be exclusive right of a person to make or produce, use their invention and thus The three protections for developers of computer software, are:
Patents Copyright and Trade secretsTrademarks.Note that the use of patent and copyright benefits a person as it tends to give them the power over their products and services.
Learn more about computer software from
https://brainly.com/question/1538272
#SPJ1
You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes will
be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method
Using the knowledge in computational language in python it is possible to write a code that uses process of writing a class definition for the class Book.
Writting the code in python:class Book:
# a constructor for this class.
# The constructor should accept an argument for each of the fields.
def __init__(self, book_title, book_author, book_publisher):
self.book_title = book_title
self.book_author = book_author
self.book_publisher = book_publisher
def main():
b = Book("title1", "author1", "publisher1")
print(b.book_title)
print(b.book_author)
print(b.book_publisher)
main()
See more about python at brainly.com/question/18502436
#SPJ1
Explain the unique reasons why assembly language is preferred to high level language
The special reason why assembler language is preferred to high level language is that It is said to be memory efficient and it is one that requires less memory.
Why is assembly language better than other kinds of high level?It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.
Note that it is one that has a lot of better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.
Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.
Hence, The special reason why assembler language is preferred to high level language is that It is said to be memory efficient and it is one that requires less memory.
Learn more about assembler language from
brainly.com/question/13171889
#SPJ1
How serious are the risks to your computer security?
Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?
The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
What are the risk results for information and computer security?The term “information security risk” is known to be those damage that occurs due to an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.
Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.
Hence, The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
Learn more about computer security from
https://brainly.com/question/12010892
#SPJ1
write a pseudocode to accept the item name , price and quantity from a user and display the item name and its total value
A pseudocode to accept the item name , price and quantity from a user and show the item name and its total value
1. start
2. get item title, price, quality
3. set total weight = price * quality
4. print total value, item name
5. stop
What is a pseudocode with example?
Pseudocode is an unnatural and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) configuration tool. The rules of Pseudocode are reasonably clear. All statements showing "dependency" are to be indented.
How is pseudocode used in programming?
Pseudocode is an everyday way of programming description that does not require any strict programming language syntax or underlying technology reviews. It is used for making an outline or a rough draft of a program. Pseudocode outlines a program's flow, but bans underlying details.
To learn more about Pseudocode, refer
https://brainly.com/question/24953880
#SPJ9
Write the function definition for a function called list_total that accepts a list of integers
as a parameter. The function should sum all the numbers in the list and return the total.
Answer:
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
sum_of_numbers += number
return sum_of_numbers
Explanation:
So, to define a function, the syntax is simply:
def functionName(arguments here):
# code
So to define a function called "list_total" which accepts a list of integers, you write:
"
def list_total(numbers):
# code
"
any the "numbers" is a parameter, and it's just like any variable, so you can name it anything besides keywords. I just named it "numbers" since it makes sense in this context, you could also write "integers" instead and it would be just as valid, and may be a bit more specific in this case.
Anyways from here, the initial sum should be equal to 0, and from there we add each number in the list to that initial sum. This can be done by initializing a variable to the value "0" and then traversing the list using a for loop. This can be done as such:
"
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
# code
"
So for each element or integer in the list "numbers" the for lop will run, and the variable "number" will contain the value of the current element it's on.
So we can add the "number" to the sum_of_numbers as such:
sum_of_numbers = sum_of_numbers + number
but there is a shorter way to do this, and it's represented as:
sum_of_numbers += sum_of_numbers
which will do the same exact thing. In fact this works for any mathematical operation for example:
a *= 3
is the same thing as
a = a * 3
and
a /= 3
is the same thing as
a = a / 3
It's the same thing, but it's a much shorter and more readable notation.
Anyways, this code will go in the for loop to almost finish the code
"
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
sum_of_numbers += number
"
The last thing is to return this value, and this is simply done by using the syntax:
"return {value here}"
and since the sum_of_numbers has the value, we write
"return sum_of_numbers"
at the end of the function, which is very very important, because when you use the return keyword, you end the function, and return whatever value is next to the return to the function call
So to finish the code we just add this last piece to get:
"
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
sum_of_numbers += number
return sum_of_numbers
"
You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?
A. Wrong SSID
B. Incorrect 802.11 standard
C. Incorrect encryption key
D. Wrong antenna type
The most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type
What is a Computer Network?This refers to the inter-connectivity between wireless bridges to connect a computer system to the world wide web.
Hence, we can see that based on the fact that there is troubleshooting going on about two wireless bridges where the signal strength is lower than expected, the most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type
Read more about computer networks here:
https://brainly.com/question/1167985
#SPJ1
How to enter Data into cells in excel
Answer:
u can enter data into excel by either copy pasting by right clicking or typing It manually in the Fx box located at the top
In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert is qualified for:
a. The IF function should determine if the student's Post-Secondary Years is greater than or equal to 4, and return the value 2 if true or the value 1 if false.
The IF Function based formula that can be entered into cell N2 that will return 2 if true, and 1 if false is =IF(M2 >=4, 2, 1).
How is the IF function used?An IF function allows us to be able to sort through data by analyzing data to find out if it conforms to a certain characteristic that we are looking for.
If the data corresponds, the IF function will return a value that means True, but if it doesn't, the value returned would be false.
After typing in the IF function, the next thing to do is specify the cell where the data you want to analyze is. In this case that data is in cell M2. You immediately follow this up by the parameter being compared.
In this case, we want to know if the figure in cell M2 is greater or equal to 4 so the next entry is M2>=
The next entry is the return if the comparison is true. In this case, the number for true is 2 and the one for false is 1. The full formula becomes:
=IF(M2 >=4, 2, 1).
In conclusion, the function is =IF(M2 >=4, 2, 1).
Find out more on the spreadsheets at https://brainly.com/question/1429504.
#SPJ1
In python please:
Assume the variable definitions references a dictionary. Write an ig statement that determined whether the key ‘marsupial’ exist in the dictionary. If so, delete ‘marsupial’ and it’s associated value. If the key is not the dictionary, display a message indicating so.
Answer:
"
if 'marsupial' in dictionary:
del dictionary['marsupial']
else:
print("The key marsupial is not in the dictionary")
"
Explanation:
So you can use the keyword "in" to check if a certain key exists.
So the following code:
"
if key in object:
# some code
"
will only run if the value of "key" is a key in the object dictionary.
So using this, we can check if the string "marsupial' exists in the dictionary.
"
if 'marsupial' in dictionary:
# code
"
Since you never gave the variable name for the variable that references a dictionary, I'm just going to use the variable name "dictionary"
Anyways, to delete a key, there are two methods.
"
del dictionary[key]
dictionary.pop(key)
"
Both will raise the error "KeyError" if the key doesn't exist in the dictionary, although there is method with pop that causes an error to not be raised, but that isn[t necessary in this case, since you're using the if statement to check if it's in the dictionary first.
So I'll just use del dictionary[key] method here
"
if 'marsupial' in dictionary:
del dictionary['marsupial']
else:
print("The key marsupial is not in the dictionary")
"
The last part which I just added in the code is just an else statement which will only run if the key 'marsupial' is not in the dictionary.
Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.
Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays
Writting the code in JAVA:
BEGIN
DECLARE
employeeNames[100] As String
employeeSalaries[100] as float
name as String
salary, totalSalary as float
averageSalary as float
count as integer
x as integer
rangeMin, rangeMax as float
INITIALIZE
count = 0;
totalSalary =0
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
//Read Employee data
WHILE name != “*” AND count < 100
employeeNames [count] = name
DISPLAY“Enter salary for “ + name + “.”
READ salary
employeeSalaries[count] = salary
totalSalary = totalSalary + salary
count = count + 1
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
END WHILE
//Calculate average salary with mix , max range
averageSalary = totalSalary / count
rangeMin = averageSalary - 5
rangeMax = averageSalary + 5
DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”
For (x = 0; x < count; x++)
IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )
DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]
END IF
END FOR
END
See more about JAVA at brainly.com/question/12978370
#SPJ1
How can structure of a table change in sql. What general types of changes are possible
One can structure of a table change in sql and the general types of changes that are possible is that:
One can use the MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.How can we modify the structure of a table in SQL?The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.
Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.
Hence, One can structure of a table change in sql and the general types of changes that are possible is that:
One can use the MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.Learn more about table structure from
https://brainly.com/question/26125587
#SPJ1
Write a program in c# that simulates the roll of two six sided dice.
The program should ask the user to guess the total sum of the dice. The user has to
keep guessing until they get the total correct, and the program should tell them how
many tries it took.
An example of the expected output is shown below.
What do you think the total of two six-sided die will be? 6
The total was 8. Try again!
What do you think the total of two six-sided die will be? 4
The total was 11. Try again!
What do you think the total of two six-sided die will be? 10
The total was 10. Congratulations! It took you 3 tries to guess successfully.
Answer:
using System;
class Program
{
public static void Main(string[] args)
{
Random rnd = new Random();
int tries = 0;
while (true)
{
tries++;
Console.Write("What do you think the total of two six-sided die will be? ");
int guess = int.Parse(Console.ReadLine());
int total = rnd.Next(1, 7) + rnd.Next(1, 7);
Console.Write($"The total was {total}. ");
if (total == guess)
{
Console.WriteLine($"Congratulations! It took you {tries} tries to guess successfully.");
break;
}
else
{
Console.WriteLine("Try again!");
}
}
}
}
Explanation:
Worst case you could be guessing forever...
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.
About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.
Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:
An external website permitting users to browse and purchase widgets
An internal intranet website for employees to use
Secure remote access for engineering employees
Reasonable, basic firewall rules
Wireless coverage in the office
Reasonably secure configurations for laptops
Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.
Engineers will require access to internal websites, along with remote, command line access to their workstations.
Grading: This is a required assignment for the module.
What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:
Authentication system
External website security
Internal website security
Remote access solution
Firewall and basic rules recommendations
Wireless security
VLAN configuration recommendations
Laptop security configuration
Application policy recommendations
Security and privacy policy recommendations
Intrusion detection or prevention for systems containing customer data
The authentication can be done by using user id and password, social sign-in or by using the biometrics.
How to explain the information?Authentication works as follows:
Prompting the user to enter the credentials. Send credentials to the authentication server. Match the credentials. Authorize the user and grants the accesExternal Website security:
Use of firewall. Implement the access control. Use of MVC (Model View Controller) Use of encryption. Use of SSL certificate.Use of security plugins. Use of network monitoring team.Internal Website security:
Use of authentication to identify the user identity. Use of authorization to provide different user with the specific privileges and access. Encrypt or hide sensitive web pages. By implementing IT policies. Educate the user about the website.Remote Access Solution:
Remote access provides better security, cost efficiency, ease of management, and increased availability.
Remote access can be deployed by using the RAS gateway.
Firewall and Basic rules recommendations:
Firewall is important for managing the traffic and providing external website security. Rules to prevent SQL injection and XSS. Allow only the specific type of traffic. Use access rules for IP security. Implement certain IT policies.Wireless Security:
Wifi is being used in every organization and it prevents the network from malicious access.
Wireless security can be provided by usin encryption, decryption, and authorization.
VLAN configuration:
VLAN are important for traffic filtering and providing the logical division of the network.
VLAN can be configured for web interface and can provide web filtering.
VLAN can be configured between router and firewall that passes the network.
Laptop Security Configuration:
Use of password, VPN and the registering the laptop will provide laptop security. .
Application policy recommendations:
Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.
Security and privacy policy recommendations:
It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.
Intrusion detection or prevention for systems containing customer data:
IPS is implemented behind firewall and it matches the incoming traffic against the security policies.
Learn more about security infrastructure on:
https://brainly.com/question/5939963
#SPJ1
TensorFlow and Pytorch are examples of which type of machine learning platform?
Capgemini
Which among the following statements are not true?
RPA automates business process service activities by utilising the
presentation layer.
ITPA involves connecting the application servers, databases, operating
system and other components at the IT layer and automates the
process flow and creates the scripts and schedule them at the
scheduler in the Orchestrator.
RPA is completely rule based and works on structured data . It isn't
compatible to be applied on unstructured data.
Cognitive systems self learn from the processes based on historical
patterns.
Answer:
RPA is completely rule based
what are web site and web page?
Answer:
Website: a set of related web pages located under a single domain name, typically produced by a single person or organization
Webpage: a hypertext document on the World Wide Web
The term “web site” is commonly used to describe a collection of web pages and related content published simultaneously on at least one server and identified by a common domain name. A web site is a collection of many web pages that are linked together under the domain name of the same company.
Web pageWeb pages are a type of hypertext document which can be found on the World Wide Web. In a web browser, a user can view a web page that has been delivered by a web server to their computer. It is the name “web page” itself that is a metaphor for the binding of paper pages together to make a book.
Hope this helps :)
c) In business, an ethical issue is identifiable problem, situation, or opportunity that requires a person to choose from among several actions that may be evaluated as ethical or unethical. Such a choice often involves weighing monetary profit against what a person considers appropriate conduct. The best way to judge the ethics of a decision is to look at a situation from a customer or competitor’s viewpoint.
As a professional ethics consultant, you are required to discuss in detail, ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications, and business associations.
The ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications are:
The case of Harassment and Discrimination in regards to the Workplace. The issue of Health and Safety in the Workplace. Ethics in regards to Accounting Practices. The issue of Nondisclosure and that of Corporate Espionage.The issues in regards to Technology and Privacy Practices.What are Ethical issues?The term Ethical issues is known to be if a given decision, event or activity is said to have made a conflict with a society's moral principles.
Note that Both individuals and businesses are known to be one that can be involved in all of the conflicts, since any of those activities can be put to question from the point of ethical view.
Hence, The ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications are:
The case of Harassment and Discrimination in regards to the Workplace. The issue of Health and Safety in the Workplace. Ethics in regards to Accounting Practices. The issue of Nondisclosure and that of Corporate Espionage.The issues in regards to Technology and Privacy Practices.Learn more about ethical issues from
https://brainly.com/question/13969108
#SPJ1
Even if we reached the state where an AI can behave as a human does, how do we measure if Al is acting like a human? and how can we be sure it can continue to behave that way? We can base the human-likeness of an AI entity with the: Turing Test, the Cognitive Modelling Approach, The Law of Thought Approach, and the Rational Agent Approach. Explain in detail these terms with suitable examples.
We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.
What test tells you if an AI can think like a human?The Turing Test is known to be the tool or the method that is unused in regards to the inquiry in artificial intelligence (AI) for a person to be able to known if or not a computer have the ability of thinking like a human being.
Note that the test is said to be named after Alan Turing, who was known to be the founder of the Turing Test and he was also known to be an English computer scientist, a cryptanalyst, a mathematician and also a theoretical biologist.
Therefore, in regards to the issues with AI, a person or We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.
Learn more about Al from
https://brainly.com/question/20463001
#SPJ1