what is robotic technology

Answers

Answer 1

Answer:

according to britannica :

"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"

Explanation:


Related Questions

Helllllllllppppppppppp

Answers

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.

Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"

Answers

Answer:

Using javascript, explanation with javascript comment

Explanation:

function guessNumber(){

var randomize= math.random()*10;

var roundrand= math.floor(randomize);

var getInput= prompt("guess number from 1 to 10");

var x= 3;

do(

if(getInput>roundrand){

Console.log("your guess is too high");

guessNumber();

}

if(getInput<roundrand){

Console.log("your guess is too high");

guessNumber();

}

else{

Console.log("you are correct pal!");

break;

}

)

while(x<=3)

}

/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/

Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As

Answers

Answer:

Explanation:

#include <stdio.h>  

int main(void)  

{    

   int num, rem;

   printf("Enter a number: ");

   scanf("%d", &num);

   printf("Roman numerals: ");        

   while(num != 0)

   {

       if (num >= 1000)       // 1000 - m

       {

          printf("m");

          num -= 1000;

       }

       else if (num >= 900)   // 900 -  cm

       {

          printf("cm");

          num -= 900;

       }        

       else if (num >= 500)   // 500 - d

       {            

          printf("d");

          num -= 500;

       }

       else if (num >= 400)   // 400 -  cd

       {

          printf("cd");

          num -= 400;

       }

       else if (num >= 100)   // 100 - c

       {

          printf("c");

          num -= 100;                        

       }

       else if (num >= 90)    // 90 - xc

       {

          printf("xc");

          num -= 90;                                              

       }

       else if (num >= 50)    // 50 - l

       {

          printf("l");

          num -= 50;                                                                      

       }

       else if (num >= 40)    // 40 - xl

       {

          printf("xl");            

          num -= 40;

       }

       else if (num >= 10)    // 10 - x

       {

          printf("x");

          num -= 10;            

       }

       else if (num >= 9)     // 9 - ix

       {

          printf("ix");

          num -= 9;                          

       }

       else if (num >= 5)     // 5 - v

       {

          printf("v");

          num -= 5;                                      

       }

       else if (num >= 4)     // 4 - iv

       {

          printf("iv");

          num -= 4;                                                            

       }

       else if (num >= 1)     // 1 - i

       {

          printf("i");

          num -= 1;                                                                                    

       }

   }

   return 0;

}

list three social implications of the wider range of piracy​

Answers

Answer:

Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

write a short note about applications of computer

Answers

Answer:

Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......

what are binary code​

Answers

Answer:

Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

A binary code is a two-symbol system that represents text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently utilised as the two-symbol system.

How can the Column settings be accessed?

Layout tab, Page Setup group
Layout tab, Paragraph group
Layout tab, Arrange group
Design tab, Document Formatting group

Answers

Your answer would be LAYOUT TAB, PAGE SETUP OR GROUP

what is technology in computer​

Answers

Answer:

she is right or he :)

Explanation:

Answer:

well its somthing

Explanation:

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

A college student borrowed his roommate's notebook computer without permission because he needed to write a term paper that was due the next day. While the computer was sitting open on the student's desk overnight, a water pipe in the ceiling began leaking and water dripped down on the computer, rendering it inoperable. A computer repair service estimated that it would cost $500 to repair all the damaged components. At the time it was damaged, the computer was worth $700. If the roommate sues the student for the damage caused to the computer, what will be the extent of his recovery

Answers

Answer: $700

Explanation:

Based on the information given in the question, if the roommate sues the student for the damage caused to the computer, the extent of his recovery will be $700.

In this scenario, the student has committed a conversion as the right of possession of the roommate's computer was interfered with by the student as he took it without the roommate's permission, which later sustained damage that was more than 70% of the computer's value. In such case, the extent of the recovery will be the fair market value which is $700.

ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do

Answers

Answer:

Enable the Erase data optionDisable the simple passcode option

Explanation:

Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.

Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.

state 4 & circumstances under which warm
booting of a computer may be necessary​

Answers

Answer:

to close an open application

How to save a file for the first time?​

Answers

Answer:

i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it

An open area is one that has something in the path of travel that blocks the continuation of travel in that lane. a) True b) False 2 Questions 2 A driver's emotions usually have no impacton his or her ability to effectively implement a search system. a) True b) False 3 Question 3 Glare is enhanced by heat and impairs a driver's visibility. a) True b) False 4 Question 4 A driver must maintain which of the following to ensure implementation of an effective space management system

Answers

Answer:

Question 1. B) False

Question 2. B) False

Question 3. A) True

Question 4.

a) Looking ahead

b) Lookout for hazards

c) Focus on the big picture

d) Ensure visibility of her or his vehicle

e) Always have an exit route for safety

Explanation:

Question 1. An open area or condition is a availability of a large area space to drive unrestricted. In an open area, the road ahead is open space and there is continuation of the lane of travel and there is nothing that blocks the road

Therefore, the correct option is B) False

Question 2. A drivers emotion such as anger has remarkable influence on the behavior while driving such that it can impact on his or her ability for appropriate search system implementation which is response based

Therefore, the correct option is B) False

Question 3. Glare sensation is exacerbated by the presence of increased heat, an obstructs the view

Therefore, the correct option is A) True

Question 4. Effective space management is implemented by a driver through;

a) Looking ahead of the vehicles n front

b) Maintaining constant lookout for hazards

c) Ensure that the big picture is in focus

d) Ensure that the vehicle he or she is driving can be seen

e) Ensure that an escape route is always available

what is local technology ? give examples​

Answers

Answer:

the technologynwhich is used in our locality os calleg local technology

ex. biogas farm , modern methods of 1transport etc

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations

Answers

Answer: Identifying sequences

Explanation:

Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.

In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.

Therefore, the best option is B.

What is a status update?

A. An automatic enhancement to a computer's performance

B. Any new software that can be downloaded for free

C. A short post in which users write what they are doing

D. A news flash that announces new government posts

Answers

It should be letter c i hope this help let me know if you need help
the correct answer should be C above ^

i was able to solve the question :))

Answers

Answer:

ill take the points anyway

Explanation:

Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security

Answers

it’s exercise tax $5 tax on a cable television line

hope this helped

~ mo

Capital gains tax - 10% profits from sale of the house

Consumption tax - 6% tax on all sales

Excise tax - 5$ tax on cable tv line

Payroll tax - 15% tax to pay for social security

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

how to convert binary number into decimal number​

Answers

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworkers hotspot but is still unable to connect to the internet.What is the cause of the issue?

Answers

Answer:

Airplane mode has been set on the tablet.

Explanation:

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.

This is because the Airplane mode has been set on the tablet.

Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.

a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)

b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.

c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?

d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.

Answers

Answer:

C

Explanation:

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

10 ICTs that encourage reading...?​

Answers

10 ICTs that encourage reading are given below:-

laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .

Hope it is helpful to you

What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language

Answers

Answer:

A computer software application that translates a computer programming language into a binary computer machine language

Explanation:

ita in the answer

Answer:

c

Explanation:

im god

Write a program to input value of three sides, to check triangle is triangle is possible to form of not​

Answers

Answer:

Explanation:

import java.util.Scanner;

public class KboatTriangleAngle

{

  public static void main(String args[]) {

      Scanner in = new Scanner(System.in);

      System.out.print("Enter first angle: ");

      int a1 = in.nextInt();

      System.out.print("Enter second angle: ");

      int a2 = in.nextInt();

      System.out.print("Enter third angle: ");

      int a3 = in.nextInt();

      int angleSum = a1 + a2 + a3;

       

      if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {

          if (a1 < 90 && a2 < 90 && a3 < 90) {

              System.out.println("Acute-angled Triangle");

          }

          else if (a1 == 90 || a2 == 90 || a3 == 90) {

              System.out.println("Right-angled Triangle");

          }

          else {

              System.out.println("Obtuse-angled Triangle");

          }

      }

      else {

          System.out.println("Triangle not possible");

      }

  }

}

OUTPUT:

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.

Answers

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)

Answers

Answer:

Following are the differences two the given questions:

Explanation:

DVD-R:

DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.

DVD-RAM:

This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.

Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"

Answers

Answer:

Explanation:

The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println(starOut("sm*eilly"));

       System.out.println(starOut("ab**cd"));

   }

   public static String starOut(String str) {

       String output = "";

       for (int i = 0; i < str.length(); i++) {

           if ((i != 0) && (i != str.length()-1)) {

               if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {

                   output += str.charAt(i);

               }

           } else {

               if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {

                   output += str.charAt(i);

               } else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {

                   output += str.charAt(i);

               }

           }

       }

       return output;

   }

}

Other Questions
SOMEONE, PLEASE HELP, 35 POINTS TO WHOEVER CAN HELP.Instructions: Your own recipe. using imperative formal commands, tell your mom how to make your favorite recipe. Use the image to help with this assignment. Pauls Pizza Parlor bakes pizza pies according to Q = 3 L 0.3 L 2. If labor costs $6 and pizza sells for $10, the optimal amount of labor is: what type of family do you like ? small family Any help here please What is the midpoint of AB?AF GHIB+-9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 33 4 5 6 75 6 7 8 9++point Fpoint Gpoint HO point Analyze the diagram below and complete the instructions that follow.Quadrilateral LMNO is a rectangle. Find MN.A.7B.10C.18D.27 The CPU is considered to be the............of a computer system State the counting number in the periodic table of elements of the element considered to be the heaviest gas. (the answer should consist of numbers only) What is the area of trapezoid DEFG with coordinates D (4, 3), E (4, 0), F (2, 1), and G (2, 3)?10 square units5 square units3 square units2 square units Which is the best definition of federalism? using trig solve for the missing angle Sodium and chlorine combine to form table salt.2Na(s) + Cl2(g) 2NaCl(s)Does this reaction obey the law of conservation of mass? What steps can a reader use to figure out unknown words in a story? Check all that apply.think of other words that are similarlook around the word to see how it is usedlook for how often the word is usedreplace the word with a more familiar wordlook for smaller words within the word Successful readers ask themselves what is happening, why it is happening, and what it means, even though they do not always have the answers. What are the most important art forms in Africa? what is government and why is it important? Which expression is equivalent to8x^7y^8? Assume x>0. The ___ in an experiment is the factor that is beingchanged, or tested.- control group- dependent variable- independent variable- constant The graph shows the percentage of the US population that were obese in 1960 to 2010. A graph titled U S Obesity Trends over Time shows years on the horizontal axis and percentage of populate obese on the vertical axis. The graph shows an upward trend from 13% in 1960 to 36% in 2010. Which statement best describes the obesity trend in the United States from 1960 to 2010? Obesity has almost tripled. Obesity has doubled. Obesity has quadrupled. Obesity has remained the same. Solve for x in this equation: 3/4+|5-x|=13/4