The area of ai that investigates methods of facilitating communication between computers and people is natural language processing.
What is synthetic intelligence conversation?Communication and synthetic intelligence (AI) are carefully related. It is conversation – specifically interpersonal conversational interaction – that offers AI with its defining check case and experimental evidence.
Natural language processing (NLP) refers back to the department of laptop science—and greater specifically, the department of synthetic intelligence or AI—worried with giving computer systems the cap potential to recognize textual content and spoken phrases in a whole lot the equal manner human beings.
Read more about the communication :
https://brainly.com/question/26152499
#SPJ1
Write code that does the following: opens an output file with the filename number_ list.txt, uses a loop to write the numbers 1 through 100 to the file, then closes the file.
Answer:
6
Explanation:
# create the file
filemane= "Testfile.txt"
# for writing, we create the iutput file:
output = open(filename, "w")
#Writibg numbers from 1-100
for item in range 1,101):
Which tasks fall under WBS?
Kevin’s WBS for a project
Project manager Kevin has made a project plan for a software development project. a) Kevin calls a meeting with his team members to further discuss project requirements.
In the meeting they decide to b) break down deliverables into subdeliverables with detailed explanations.
After listing the tasks and milestones, the project team c) decides to enter the duration for each task. The entire list of tasks follows a logical sequence which aids in scheduling.
Answer:
Amongst them are a risk management plan, quality plan, procurement plan, communications plan, staffing plan, and a work breakdown schedule plan. The work breakdown schedule includes the start and completion dates for all tasks, activities, and deliverables defined in the WBS.
View One | View All
2
A team of students is in the process of designing a control system. After
conducting extensive testing of the prototype, the team discovers that it does not
work as expected. The team returns to a previous step of the engineering design
process.
Which step should the team take next in order to complete this project?
to present their solution
to plan their next prototype tests
to design a new solution
to define their new problem
In the case above step should the team take next in order to complete this project is to to plan their next prototype tests.
What are the steps in the design process?The engineering design process is known to be made up of seven step and they are:
Define the problem AskImaginePlan Prototype Test ImproveNote that In the case above step should the team take next in order to complete this project is to to plan their next prototype tests because they have gone a step backward.
Learn more about engineering design process from
https://brainly.com/question/17711844
#SPJ1
How do the InfoSec management team's goals and objectives differ from those of the IT and general management communities
InfoSec management team's goals and objectives differ from those of the IT and general management communities in terms of:
Strategic planningLevels of work.Risk management How does SecDLC differs?The SecSDLC is known to be a lot more aligned with risk management practices and it is one that makes a huge effort in knowing the kinds of specific threats and risks, and makes or create and implements a lot of controls to counter those threats and aid in management of the said risk.
Therefore, InfoSec management team's goals and objectives differ from those of the IT and general management communities in terms of:
Strategic planningLevels of work.Risk managementLearn more about management team's from
https://brainly.com/question/24553900
#SPJ1
Choose the correct answer (picture included)
GIVING BRAINLIEST
15 POINTS!
Answer:
C++
Explanation:
i need help someone please !!
Work samples can be printed or placed on the web and should be appropriate for the job you are appyling for.
What is a work sample?This is a sample such as a document that shows the interviewer the skills of the candidate to complete specific task. For example if the candidate is applying to a editor position, he/she can bring a sample of edition.
What are the characteristics of work samples?This should be done by the candidate.It should be relevant to the job applied.It can be online or printed.Learn more about sample in: https://brainly.com/question/11045407
#SPJ1
which access object cannot be used to enter or edit data
a. Report
b. Table
c.Query
d. Form
Answer:
Should be B. table !
when a playtester is playing your game, it is useful to give them frequent hints, help them, or otherwise defend your game. True false
If a playtester is playing your game, it is useful to give them frequent hints, help them, or otherwise defend your game is a false statement.
What makes a good game method?In game mechanics, one to look or think about the experience of the game that is made or one is creating.
Note that If a playtester is playing your game, it is useful to give them frequent hints, help them, or otherwise defend your game is a false statement as it does not need those kind of input.
Learn more about Games from
https://brainly.com/question/2684713
#SPJ1
why charles babbage father of computer?
Answer:
Due to basic concepts of Computer.
Explanation:
Charles Babbage Gave the basic concepts of Computer ( input , process and output) and he also used it in his computer. so charles Babbage is father of computer science.
I need help with some homework. I would like to know what is the easiest way to reach out.
Dominic's plane was delayed, so he connected to the free Wi-Fi and was about to log into Netflix to watch a movie. He thought about his friend who was coming to pet sit for his family while they were away. He thought he might get bored and want to watch a movie too while he was there and sent him a text.
In the case above, to be able to use the Netflix to watch a movie, he needs the password for the Netflix account as well as if there is already a Netflix subscription.
Is Netflix free?It is known to be only the first month that is said to be free and then one can either proceed to either cancel or let NETFLIX automatically charge one for the account.
In the case above, to be able to use the Netflix to watch a movie, he needs the password for the Netflix account as well as if there is already a Netflix subscription.
Learn more about Wifi from
https://brainly.com/question/13267315
#SPJ1
PLEASE HELP!
I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please help!
On a phone.
To block link that keeps popping up everywhere, one can:
Use your browser and click on block Pop-ups in settingsInstall an antivirus.How do I stop pop-up links?One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:
Click on Settings from the Chrome menu.input 'pop' in the search bar.Select Site Settings and then select Pop-ups and redirects.Here one can toggle the Pop-ups and redirections option to Blocked them.Therefore, To block link that keeps popping up everywhere, one can:
Use your browser and click on block Pop-ups in settingsInstall an antivirus.Learn more about pop up link from
https://brainly.com/question/13666301
#SPJ1
can u please help me solve this
Alice has twice as many pencils as Cara. Leon has three more pencils than Alice. The three children have a total of 58 pencils.
What are the no. of pencils?
The no. of pencils are there totally as the 11.
Read more about the basic maths:
https://brainly.com/question/19493296
#SPJ1
Write an if-else statement that determines whether the variable points is outside the range of 9 to 51. If points is outside the range,
"Invalid Points" should be displayed. Otherwise, "valid Points" should be displayed.
Answer: Using Python
Explanation:
num = int(input("Enter number > "))
if num in range (9, 52):
print("Valid Points")
else:
print("Invalid Points ")
What's good computing?
Answer:
1.Use passwords that can't be easily guessed, and protect your passwords.
2.Minimize storage of sensitive information.
3.Beware of scams.
4.Protect information when using the Internet and email.
5.Make sure your computer is protected with anti-virus and all necessary 6.security "patches" and updates.
7.Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.
8.Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.
9.Don't install or download unknown or unsolicited programs/apps.
Secure your area before leaving it unattended.
10.Make backup copies of files or data you are not willing to lose.
Explanation:
Question 5
What keyboard button do you hold to select multiple cells simultaneously?
Shift
Alt
Ctrl
Tab
2 p
2 nts
Answer:
Ctrl hope it will help :)
If your laptop is not able to connect to your wireless network, which of the
following might be a likely cause of the problem?
A. The laptop is too far away from the source of the signal.
B. The display screen on the laptop is too small.
C. The signal from the wireless source is too strong for the laptop.
D. The laptop is operating from a battery rather than a wall outlet.
for robot arms the first three axes are called
[tex]\huge\purple{Hi!}[/tex]
Cartesian robots (sometimes called rectilinear or gantry robots) have three linear axes, x, y, z.
Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which generally uses Ethernet cablesBluetoothWi-Fi for communication.
Irene created a LAN , which generally uses Ethernet cables for communication.
What is LAN about?The LAN ports are known to be employed to link computers that do not have Wi-Fi access and it is one that make use of an Ethernet cable.
Note that Irene created a LAN , which generally uses Ethernet cables for communication to access the internet.
Learn more about wireless connection from
https://brainly.com/question/26956118
#SPJ1
Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method
Using the computational language in python we have to use it to write to a file and read with the code.
Writing this code in python we have:filename = input()
file = open(filename)
lines = file.readlines()
data = {}
for i in range(0, len(lines), 2):
num_seasons = int(lines[i].strip())
show = lines[i + 1].strip()
if num_seasons not in data:
data[num_seasons] = []
data[num_seasons].append(show)
file.close()
file_writer = open('output_keys.txt', 'w')
titles = []
for num_seasons in sorted(data):
shows = []
for show in sorted(data[num_seasons]):
titles.append(show)
file_writer.write(str(num_seasons) + ': ' + '; '.join(data[num_seasons]) + '\n')
file_writer.close()
file_writer = open('output_titles.txt', 'w')
for title in sorted(titles):
file_writer.write(title + '\n')
file_writer.close()
See more about python at brainly.com/question/18502436
#SPJ1
A diagram of a ten-node network that uses ten routers
The diagram of the of a ten-node network that uses ten routers is given in the image attached.
What is a node in a network?A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.
Note that they are known to often receive and send data from one network or endpoint to another.
Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.
Learn more about routers from
https://brainly.com/question/24812743
#SPJ1
What is the output?
>>>import time
>>>time.localtime()
a. the number of seconds since the epoch
b. the user's time zone
c. the date
d. the time
e. the time-zone offset
It is a select all that apply type of question
Answer:
a. the number of seconds since the epoch
Explanation:
time.localtime(), returns the number of seconds since the epoch if no argument is passed oyherwise it return struct_time in local time if you pass in seconds since epoch
various types of mouse pointer
Answer:
Text Pointer
Busy Pointer
Link Pointer
Precision Pointer
Standard Pointer
Help Pointer
Background Busy Pointer
Read the quotation from "Song of Myself."
It is not far, it is within reach,
Perhaps you have been on it since you were born and did not know,
Perhaps it is everywhere on water and on land.
Shoulder your duds dear son, and I will mine, and let us hasten forth,
Wonderful cities and free nations we shall fetch as we go.
In this quotation, the first stanza has a different style from the second section. What does this suggest about Whitman’s overall style in the poem?
that Whitman does not have a distinctive style as a poet
that Whitman’s style allows for various kinds of language
that Whitman is comfortable using traditional styles of poetry
that Whitman’s style conforms to age-old rules of poetry
Mark this and return
Based on the first stanza from "Song of Myself," the overall style suggests: B. that Whitman's style allows for various kinds of language.
What is a poem?A poem is a literary work that comprises either written or spoken words which are carefully chosen and arranged in separate lines, especially based on their diction (sound), rhythm, and meaning.
Based on the first stanza from "Song of Myself," we can infer and logically conclude that the overall style suggests: B. that Whitman's style allows for various kinds of language.
Read more on Whitman's style here: https://brainly.com/question/12881683
#SPJ1
If I use the command right(90), which way will Tracy turn?
If correct I mark brainlist
Answer: Right
Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...
Which two extensions in scratch are correctly matched to their accessibility goals
A. Pen extension
B. Translate extension
C. Video sensing extension
D. Text to speech extension
Choose two answers
The two extensions in scratch are correctly matched to their accessibility goals Translate extension and Text to speech extension.
What are Scratch Extensions?Scratch extensions are known to be used in an interface with external hardware and information outside of the Scratch website via new blocks.
Note that The two extensions in scratch are correctly matched to their accessibility goals Translate extension and Text to speech extension.
Learn more about scratch from
https://brainly.com/question/25720264
#SPJ1
A large global retail corporation has experienced a security breach, which includes personal data of employees and customers.
What would Accenture offer as the best solution to ensure enhanced security in the future?
The act that Accenture would offer as the best solution to ensure enhanced security in the future is Data Protection program.
What is Accenture about?In Keeping client data protected, Accenture’s Information Security Client is known to be well built up with Data Protection program that can help client teams with a good approach and the security controls, etc.
Therefore, The act that Accenture would offer as the best solution to ensure enhanced security in the future is Data Protection program.
Learn more about Accenture from
https://brainly.com/question/25682883
#SPJ1
In order to protect your computer from the newest virues which of the following should you do after you installed virus scan software
In order to protect your computer from the newest viruses, you should update the antivirus software and virus definition on a regular basis.
What is a virus?A virus can be defined as a malicious software program that moves through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.
This ultimately implies that, you should update the antivirus software and virus definition on a regular basis, so as to protect your computer from the newest viruses.
Read more on a virus here: brainly.com/question/26128220
#SPJ1
What is the error in this program?
when
clicked
define Tickle
Tickle Cat
forever
touching mouse pointer ? then
play sound Giggle- until done
O A. The name of the function doesn't match the function that is
defined.
OB. There is no end block under the "Tickle Cat" function.
OC. All the blocks should be in one connected stack to function.
O D. The "forever" block should be removed so the "Giggle" sound
stops.
The error in this program above is that All the blocks should be in one connected stack to function.
What are the errors in a program?In the act of developing a programs there are some kinds of error that can take place such as syntax errors, logic errors and others.
Note that in the program above, The error in this program above is that All the blocks should be in one connected stack to function and thus there is an error.
Learn more about program from
https://brainly.com/question/1538272
#SPJ1
Which of the following answers is incorrect regarding the Naive Bayes algorithm?
Select the best answer (as an incorrect claim)
Select one:
A.
The algorithm uses the conditional probability of the feature given by the class.
B.
The features can be discrete, but can also be continuous.
C.
Because we want to prevent underflow, we calculate a sum of logs of the probabilities instead of their multiplication .
D.
We prefer features with high dependency to get better prediction.
Answer:
B. The features can be discrete, but can also be continuous.
Explanation:
Each continuous attribute can be discretized and the continuous attribute value replaced with the matching discrete interval.