Answer:
refinement
Explanation:
https://brainly.com/question/19274876
Provide 10 points for each question
What is Sophia (Robot) citizenship?
Why is Sophia (robot) a she and not a he
Features - what can Sophia (robots) do and not do, her limits
Public figure – why is she so popular in comparison to other robots
Events - name all events Sophia has spoken in
Controversy over hype in the scientific community – what are they
What is your opinion about Sophia, just a robot or human robot (explain your answer
with merits
Provide a legend of references and link it to each paragraph (cannot use Wikipedia
as a site) – foot note each references, even if it is in your own words
Answer:
1- Saudi arabia
Explanation:
list the steps on how to apply bevel and emboss to a layer
Answer: 2123
Explanation:
ok
what to do if you forgot your locked notes password
Answer:
what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.
i hope this helps :D
Help po thank you po
Answer:
hope helpful
Explanation:
a
c
b
c
d
have a great day
private void finishMap()
{
move();
turnLeft();
move();
move();
move();
takeBall();
takeBall();
turnLeft();
turnLeft();
move();
move();
move();
turnLeft();
}
}
for codeHS 1.5.5 mario karel what am i doing wrong?
Answer:
Where can I find Codehs answers?
You can view the solution for an assignment in multiple ways: Through the Assignments page.
...
To view solutions from the Assignments page:
Navigate to the Assignments page.
Click the '...' next to the assignment you wish to view the solution for.
Choose Solution and another page will open with the solution reference.
what can be deployed to intercept and log network traffic passing through the network?
Answer:
Packet sniffers are protocol analyzers that can be deployed to intercept and log network traffic passing through the network.
Explanation:
Consider the binary number 1100.a) If you add a zero to the left of the number
(01100) does the value of the binary number change? Explain why or why not
with complete explanations
Answer:
no
Explanation:
The value represented by the added zero is 0·2⁴, which is of course 0.
In the unlikely situation where the binary number is only 4 bits wide, adding a value would be impossible.
I was correcting my keyboard since the arrows had a qwerty swap, but I looked at the settings and realized I needed to change it, but I deleted the keyboard file and my keyboard stopped working, so I panicked. I'd be dead if my father saw the keyboard. What do i need to reinstall it?,,,
Answer:
Hi,
Try this linkhttps://certified.windowserrorhelp.com/automatically-update-device-drivers/?headline=%20Keyboard%20Drivers&logo=keyboard&gclid=CjwKCAjw5c6LBhBdEiwAP9ejG1lZr9EYilcRFp3KfYydybYMNfbWAC9-1cwynalo6vDN9R7D452qORoCC9cQAvD_BwE
Then download the thing.I promise it is secure.Explanation:
It helps reinstall and install driver updates for windows computers. Based on the way you talked about your keyboard it seems like you have a laptop. The link above will help you re-install and automatically update your keyboard driver. If you have a Mac or other Apple Computer you didn't delete it because Apple hardware has non-removable Drivers for their laptops. in this case there is probably a 3 party source affecting this, such as, heaven forbid, a virus, a corruption of internal storage, or a short circuit.
All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data
Answer: A: a scanning device at the grocery store
Explanation:
Spreadsheets will be displayed as tables in presentations. True or False?
True
Explanation:
Tables and spreadsheets can only be inserted into slides with blank layout. Once a table or spreadsheet has been inserted into a slide it's formatting cannot be changed.
Answer: True
Explanation:
how do ""night modes"" on computer screens help people fall asleep?
Answer:
it doesn't really help people fall asleep but
Explanation:
When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.
Answer:
Answer it doesn't really help people fall asleep but some people it can
Explanation:
Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open
you can resize a row in a table by dragging the ____.
Answer:
desk
Explanation:
You need more backround information i dont know what u talking about
this endpoint does not support blobstorageevents or softdelete. please disable these account features if you would like to use this endpoint.
Answer:
A
Explanation:
Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
What is content filtering ?Content filtering has been the process of the screening and or restricting access to objectionable email, webpages, executables, and other suspicious items using software or hardware. Filtering software can detect objectionable or criminal content, such as hate sites, illegal content, and social media.
As the part of their internet firewalls, businesses frequently employ content-based filtering, also known as information filtering. Content filtering, a common security measure, assists businesses in enforcing corporate policies regarding the use of information systems, such as the filtering and blocking of employee access to social media platforms.
Therefore, Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
To learn more about content filtering , visit
https://brainly.com/question/13129235
#SPJ2
please answer it is important!!!! i will mark you branliest
Answer:
Machine - consists of the numeric codes for the operations that a particular computer can execute directly
Assembly - provides the information of any error in the code.
High level - Require translation.
Require translation.Portable.
Require translation.Portable.Easier to read, write and maintain as commands are similar to English.
Require translation.Portable.Easier to read, write and maintain as commands are similar to English.Allow access to module libraries.
which cyber protection condition establishes a protection priority focus on critical and essential functions only
INFOCON 1 is the cyber protection condition establishes a protection priority focus on critical and essential functions only.
INFOCON 1 describes the threat level system (defense system) that is used to defend against military attacks and is based fundamentally on the status of information systems i.e. on essential and critical functions of the system.
There are often five levels of INFOCON with INFOCON 1 being an acronym for "information operations condition 1" and is used in the United States of America and is carried out on attacks that were successful and could impact the missions of the Department of Defence and as such is only needed on occasions of extreme cyber risks.
In addition, INFOCON 1 describes the Computer Network Defense system at maximum alertness and any compromised systems in the network are completely isolated from the rest of the network to avoid further damage.
Learn more about cyber protection here: https://brainly.com/question/25157787?referrer=searchResults
what the answer is have been stuck for 4 hours on this questoin its sience
Answer:
what the question?
Explanation:
100 POINTSSSSSSS!!
Intellectual property laws were created because _____.
A. people have a right to their own intellectual property
B. people have no value for their own intellectual property
C. people have to get permission to own their intellectual property
D. people have to sacrifice their own intellectual property
Answer:
D
Explanation:
edg 2021
Answer:
A. people have a right to their own intellectual property
Explanation:
Which statement correctly describes one aspect of the team's commitment at the end of PI Planning?
The statement that describes one aspect of the team's commitment at the end of PI Planning is a team does not commit to uncommitted objectives.
What does teams do in pi planning?PI planning are known to be a kind of face-to-face events that are held every 8-12 weeks after the former PI event was held.
In this event, a lot of teams do come together to map out, plan and set out the work that they needs to do, review backlogs, discuss which features will benefit them , form or update their product roadmap, and others.
Learn more about PI Planning from
https://brainly.com/question/6500846
when is not appropriate to be funny in a headline
Answer: I it is something serious like the death of a person then you should not be funny
what 3 types of data can be entered in a spreadsheet
Answer:
data, labels and formulas
The three types of data that can be entered in a spreadsheet are Number data, Text data and Logical data.
We are given that;
The spreadsheet
Now,
Number data: This includes any kind of numerical values, such as integers, decimals, percentages, dates, times, or phone numbers. Number data can be used in calculations and formatted in different ways.
Text data: This includes any kind of characters, such as letters, words, sentences, or symbols. Text data is used for labels, headings, names, or other information that is not numerical.
Text data cannot be used in calculations, but can be formatted in different ways.
Logical data: This includes only two possible values: TRUE or FALSE. Logical data is usually the result of a test or comparison, such as whether a condition is met or not.
Logical data can be used in formulas and functions that involve logical operators or conditions.
Therefore, by spreadsheet the answer will be Number data, Text data and Logical data.
To learn more about spreadsheet visit;
https://brainly.com/question/31511720
#SPJ6
Using robots to replace workers in factories is an example of which of the following forms of information processing systems? a. Commercial b. Control c. Scientific d. Industrial
Answer:
Industrial Robots
Explanation:
They are considered industrial robots because the word industrial has to do with an industry or a factory.
Also, industrial robots will replace the human workers
Hope this Helps
To free up human power for more difficult jobs, they are easily used to finish boring, repetitive, and physically taxing chores. This means that many low-skilled positions, like those in warehouses and on assembly lines, will be replaced by robots, endangering the employment of many low-skilled humans. Thus, option D is correct.
What using robots to replace workers in factories?Labour automation is the process of using technology instead of people to carry out particular tasks or jobs. Mechanization is a component of automation, but it also entails expanding it by using technology to further dehumanize work.
An automated conveyor would transport the product being manufactured from one stationary worker to the next until it was fully assembled, replacing the previous approach in which employees transported their pieces to a stationary assembly site.
Therefore, using robots to replace workers in factories is an example of Industrial forms of information processing systems.
Learn more about robots here:
https://brainly.com/question/15561225
#SPJ2
In your opinion., which Zelda character is the hottest? Be honest.
Answer:
link<3
Explanation:
What is a special kind of block that can only give two responses?
A.
forever block
B.
conditional block
C.
loop block
D.
Boolean value
Answer:
A. forever block
Explanation:
u dont need a explaination
will economists be replaced by artificial intelligence?
What is a Font? I need help please
Answer:
This is the answer, see which is best suited
what threat do insiders with authorized access to information or information systems pose
Answer:
Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.
wap to sore two different variable a and b resoectively. Calculate sum
Answer:
Input : x = 10, y = 20;
Output : x = 20, y = 10
Input : x = 200, y = 100
Output : x = 100, y = 200
Explanation:
Pls give ME A BRAINLAIST
what are the advantage and disadvantage of super disk,in point???
urgently
Answer:look over this
Explanation:
https://en.wikipedia.org/wiki/SuperDisk
Who was your first video game crush? Be 100% honest!
Answer:
princess peach
E SEQUENCE OF ACTIONS THAT ALLOWS YOU TO DOUBLE UNDERLINE A PIECE OF TEXT IN YOUR DOCUMENT IS: *
EDIT, INSERT, UNDERLINE, DOUBLE
FORMAT PARAGRAPH, UNDERLINE , DOUBLE
FORMAT, FONT, UNDERLINE STYLE, DOUBLE
FORMAT, FONT, SPACING, UNDERLINE STYLE, DOUBLE