Design a webpage on Artificial Intelligence/augmented reality

Answers

Answer 1

Answer: is there even an answeR for this? Anyway plz do my question. If you are looking for web page options thou I would offer a Alexa vs VR

Explanation:


Related Questions

what is network and also how many types of network are there as well

Answers

Answer:

Summary:

Type of computer networks can categorize according to their size as well as their purpose

PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant

LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area

WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area

A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region

WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.

SAN is a storage area network is a type of network which allows consolidated, block-level data storage

System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications

POLAN is a networking technology which helps you to integrate into structured cabling

Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home

Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations

Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area

A VPN is a private network which uses a public network to connect remote sites or users together

Explanation:

Answer: Network is what is making you ask these questions.

Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering

Answers

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}

Answers

Answer:

Following are the code to this question:

RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value  

resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value

Explanation:

In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal"  is defined, that holds a value that is 0.

In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.

please find the attachment of the code file and its output.

Help me what is that my phone I will mark brainslist

Answers

Answer:

Following are the ways to resolve this error:

Explanation:

To solve this error there two methods, that is available, which can be defined as follows:

The First way by the turn off screen time:

To turn off screen time goto the setting app on your iPad, iPhone, or other devices.In this, there is a screen time option in which we click on turn off the screen time, and confirm it.After that, go to the apps store and download the app.

The Second way by the re-login on apple id:

To re-login on apple id first, we log out it and for logout go to setting inside this go to iTunes & app store.After open this option click apple id after the click, this click in the sign-out option after sign out re-login in by your id and password. To install the app first delete the app by a tap on the app this provides the option to delete the app, then go to the apps store. In this go to the purchase option then select the option that not in the device then download the file.

Give two examples of a large databases that might be used to help members of the public

Answers

Answer:

Examples of large database that might be used to help members of the public are;

1) Apple Healthkit, Carekit and Researchkit

2) IBM Deep Thunder

Explanation:

1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records

2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

state the function of font group in the home tab​

Answers

Explanation:

This group provides access to all the Character Formatting commands.

can anyone please help me with this

Answers

Answer:

This should do it. I assume the alignment of the numbers is not important?

<!DOCTYPE html>

<html>

<head>

<style>

table {

 border-collapse: collapse;

 font: 15px Verdana;

 font-weight: bold;

}

table, td {

 border: 1px solid black;

}

td {

 width: 80px;

 height: 80px;

 text-align: center;

}

</style>

</head>

<body>

<table>

 <tr>

   <td>1</td>

   <td>2</td>

   <td>3</td>

   <td>4</td>

 </tr>

 <tr>

   <td colspan="2">5</td>

   <td>6</td>

   <td rowspan="2">7</td>

 </tr>

 <tr>

   <td>8</td>

   <td>9</td>

   <td>10</td>

 </tr>

</table>

</body>

</html>

You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?

Answers

Answer:

The answer is "Between the website tags immediately after the global site tag".

Explanation:

The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.  

These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.

Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the hard drive activity light is staying on. You discover that the hard drive is nearing its maximum capacity. The computer contains a single 150 GB hard drive. What should you do

Answers

Answer:

Delete unnecessary apps

Explanation:

If you don't need it and its installed it's just using up memory the system could be using for something else

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

last option: When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated.

Explanation:

A function, when it is called, uses the stack to allocate local variables. When it exits, those variables are no longer needed (since they are local), so the stack pointer is reset to the position it had before calling the function.

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:

What do you mean by Bandwidth? Pls give full explanation

Answers

Answer:

In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.

Explanation:

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge

Answers

Answer:

The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".

Explanation:

The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.

In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.

Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective

Answers

the board if not try a restart a couple more times and we see what happens from there

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

How can artificial intelligence be used in learning science?

Answers

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

how can i earn money?​

Answers

Answer:

You could get a job.

Explanation:

I know that it is sometimes impossible to get a job, because you are unable to get to anywhere, maybe because your family does not own a car, and it is too far to walk, so you could ask your neighbors if they need anything done, and they might pay you. If these don't work, then you could see if you could get a friend to drive you, and get a job, and see if they will be your taxi, but you pay them money for gas.

Hope that helps.

Answer:

maybe babysit

Explanation:

i earned a lot of money

What is computer Network?​

Answers

Answer:

[tex]\boxed{\sf {view \: explanation}}[/tex]

Explanation:

A computer network is a network of computers that can share data among the computers.

Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual test score d. Average of a series of test scores

Answers

Answer:

The correct option is;

d. Average of a series of test scores

Explanation:

Information is defined as the knowledge or news which has been sent by one person and received by another such as the reply for a request for the current weather at a specific geographical location

Information is data that has been interpreted, processed, organised, put into a structured and presented within a given context that can be intelligible, meaningful and useful to people.

When developing a new software package, logically, the software must be designed before the code is written, and the code must be written before it is tested. These activities are dependent on each other by _________ constraints.

Answers

Answer: Technical

Explanation: When making decisions, we may have to follow a certain pattern or order due to restrictions brought about by circumstances rules or conditions. These restrictions or limitations are regarded to as constraints. Technicality may be explained as the knowledge, expertise or initiative required for an operation, production or design. Therfore, we may view technical constraint as limitations or restrictions brought about by the technical guidelines or expertise required for a certain products. From a technical perspective, before a software package can be built, the engineer must know why and what he wants the software to be capable of doing, then he writes the code then tests the code. It is a sequence, a test cannot be performed without a written code and code cannot be written without a planned design.

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

Which decimal value (base 10) is equal to the binary number 1012?

Answers

Answer:

The decimal value of 101₂² base 2 = 25 base 10

Explanation:

The number 101₂² in decimal value is found as follows;

101₂ × 101₂ = 101₂ + 0₂ + 10100₂

We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;

101₂ + 0₂ + 10100₂ = 11001₂

Therefore;

101₂² =  11001₂

We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;

Therefore converting 11001₂ to base 10 gives;

11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰

Which gives;

16 + 8 + 0 + 0 + 1 = 25₁₀.

The decimal value in base 10 that is equal to the binary number 101_2 is; 5

We want to convert 101_2 from binary to decimal.

To do this we will follow the procedure as follows;

(1 × 2²) + (0 × 2¹) + (1 × 2^(0))

>> (1 × 4) + (0 × 2) + (1 × 1)

>> 4 + 0 + 1

>> 5

In conclusion, the decimal value we got for the binary number 101_2 is 5

Read more about binary to decimal conversion at; https://brainly.com/question/17546250

Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that tells the computer how to execute commands. A computer system is a network that allows computers, tablets, smartphones, etc. to connect to the Internet. A computer system is a collection of hardware and software components that work together to meet the needs of the user. A computer system is a group of hardware devices that work together.

Answers

Answer:

I believe it's  A computer system consists of the operating system that tells the computer how to execute commands.

Explanation:

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer demand B. rates of unemployment and inflation C. consumer behavior and preferences D. national income and its sourcesics?

Answers

Answer:

The correct answer is C. Consumer behavior and preferences.

Explanation:

hope it will help :)

Answer: the answer is C consumers behavior and preferences.

Explanation: just took the test please add thanks and brainliest

Other Questions
how many moles of copper are equivalent to 3.44x10^23 atoms of copper? What is an application letter?A: An application letter is used to apply for a specific job and includes keywords from the job posting.B: An application letter describes in detail your schooling, work experience, and any other experience.C: An application letter summarizes your intern experience for potential employers.D: An application letter is used to inquire about open positions or positions that may open in the near future essay on gandgi mukt mera gaon Why would African sculpture not portray the human body as it looks in real life? a shop has a sale and reduces all the prices by 15k in naira.find the sale price of an article of an article marked at 750naira helpppppp! only find the equation of the line. urgent! if you provide home healthcare, you're more likely to provide a access to rehabilitation b accurate bills for insurance needs c diagnoses of illness d analyses of bloodwork The vertex formation of a parabola is x = 8(y- 1)2-76.What is the standard form of the equation? The dog chased the ball down the street is it Active voice or Passive voice What is the sum of the complex numbers9- i and 5 i? An array of solar panels produces 9.35 A of direct current at a potential difference of 195 V. The current flows into an inverter that produces a 60 Hz alternating current with Vmax = 166V and Imax = 19.5A. A) What rms power is produced by the inverter? B) Use the rms values to find the power efficiency Pout/Pin of the inverter. Select the correct answer from each drop down menu.During an experiment, readings for blood pressure in a person's body were found to be constant. However, when measured by adifferent blood pressure cult, the readings differed by 15 points for each reading. This difference indicates that the results arebut notResetNextdimentum. All rights reserved Can someone help me with this? Does it mean cup or is it a typo? Also I need help with the answer. Explain why water, with its high specific heat capacity, is utilized for heating systems such as hot-water radiators. A price-discriminating monopolist having identical costs in two markets should charge a higher price in that market Group of answer choices Can you please help me with these journals on the book How to Break Up With Your Phone by Catherine Price?? (If you cant see the picture just zoom in on it) (Explain what your writing means so I can understand it) This country has one of the lowest poverty rates of all Spanish speaking countries at around 15%. It produces a lot of mineral exports in its mines. Climate it partially mountainous, partially rolling plains and some desert areas. Which of the following is NOT a component of health? A. spiritual B. physical C. mental D. beauty Please select the best answer from the choices provided. A B C D Which of the following sequences is correct for the downhill movement of electrons during cellular respiration? A. glucose citric acid ATP NAD+ B. glucose NADH electron transport O2 C. glucose pyruvate ATP - oxygen D. glucose ATP electron transport - NADH E. glucose Krebs cycle NADH - ATP please help me i offered all my points and this is really important!!! The question is attached.