Briefly explain the mapping of human thinking to artificial intelligence components?

Answers

Answer 1

Answer:

The technique is mind mapping and involves visual representation of ideas and information which makes it easier to remember and memorize facts even in complex subjects. Here is an example of a mind map with the essential elements of AI and the industries where Artificial Intelligence is applied.

Answer 2

Artificial is a term utilized to elaborate something that isn't natural or we can say unnatural (opposite to natural). Whereas, definition of "intelligence" is a bit complex as the term enclose many different and specific corporeal tasks, like learning, problem-solving, reasoning, perception, and language understanding.

Mind mapping technique involves the representation of information and ideas visually which concludes in much easier and friendly way to remember and imprints the facts even in complex subjects.

Below is the example in how the A.I applies in fields like health care, educations, financials etc.

Learn More:

https://brainly.com/question/23131365?referrer=searchResults

 Briefly Explain The Mapping Of Human Thinking To Artificial Intelligence Components?

Related Questions

Identify the correct statement regarding HTTP. a. Basic HTTP is a stateful protocol. b. In HTTP tunneling, some protocols travel inside HTTP traffic. c. It has been replaced with IPv6. d. It was developed by Al Gore.

Answers

Answer:

b. In HTTP tunneling, some protocols travel inside HTTP traffic.

Explanation:

a. HTTP is not a stateful protocol. It is a stateless protocol since the receiver is not allowed to store the state from previous requests. In other words, there is no need to keep track of the session information or status. Other examples of stateless protocol are UDP (User Datagram Protocol) and DNS (Domain Name System).

b. In HTTP tunneling, some protocols travel inside HTTP traffic. HTTP tunneling allows two devices to be connected together using network link with or without restrictions such as firewalls and access control lists. One way of implementing this HTTP tunneling is by using the regular HTTP methods such as POST, GET, PUT and DELETE.

In other words, HTTP tunneling allows certain protocols travel inside HTTP traffic.

c. HTTP has not been replaced with IPV6. They are different protocols performing different functions. IPV6 is an internet protocol addressing scheme invented to replace its predecessor IPV4.

d. HTTP was not developed by AI Gore. It was developed by Tim Berners-Lee and his team.

HEEELLPPPPP, ILL GIVE THE BRAIN THING

Which entry by the user will cause the program to halt with an error statement? # Get a guess from the user and update the number of guesses. guess = input("Guess an integer from 1 to 10:") guess = int(guess)
7
-1
5.6
36​

Answers

Can you explain more please??!

What is the purpose of this parallelogram shape in a flowchart?

Answers

Answer: Parallelogram A parallelogram is used to read data (input) or to print data (output). Rectangle A rectangle is used to show the processing that takes place in the flowchart. Diamond A diamond with two branches is used to show the decision making step in a flowchart.

HOPE THIS HELPS!!

Claire needs to make an SRS document. Help her identify the given section and subsection.

The ___ subsection mentions the list of factors that may influence the requirements specified in the SRS. This subsection is part of the section named ___

Blank 1:
A. Scope
B. Purpose
C. Assumptions

Blank 2:
A. Introduction
B. General Description
C. Specific Requirements

Answers

Answer:

C and B in that order

Explanation:

Write a program second.cpp that takes in a sequence of integers, and prints the second largest number and the second smallest number. Note that in the case of repeated numbers, we really mean the second largest and smallest out of the distinct numbers (as seen in the examples below). You may only use the headers: and .

Answers

Answer:

The program is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

   int n;

   cout<<"Elements: ";

   cin>>n;

   vector <int>vectnum;

   int numInp;

   for (int i = 1; i <= n; i++){        cin>>numInp;        vectnum.push_back(numInp);    }

   int big, secbig;

   big = vectnum.at(0);      secbig = vectnum.at(1);

   if(vectnum.at(0)<vectnum.at(1)){     big = vectnum.at(1);  secbig = vectnum.at(0);   }

   for (int i = 2; i< n ; i ++) {

     if (vectnum.at(i) > big) {

        secbig = big;;

        big = vectnum.at(i);

     }

     else if (vectnum.at(i) > secbig && vectnum.at(i) != big) {

        secbig = vectnum.at(i);

     }

  }

  cout<<"Second Largest: "<<secbig<<endl;

  int small, secsmall;

  small = vectnum.at(1);       secsmall = vectnum.at(0);

  if(vectnum.at(0)<vectnum.at(1)){ small = vectnum.at(0);  secsmall = vectnum.at(1);   }

  for(int i=0; i<n; i++) {

     if(small>vectnum.at(i)) {  

        secsmall = small;

        small = vectnum.at(i);      }

     else if(vectnum.at(i) < secsmall){

        secsmall = vectnum.at(i);      }   }

  cout<<"Second Smallest: "<<secsmall;

  return 0;

}

Explanation:

See attachment for explanation

what are three limitations of computer?​

Answers

Answer:

Explanation:

Three limittaions of computer are:

It requires reqular power supply to operate .

It needs instructions to perform a task.

It cannot memorize and recall.

Question # 6
Fill in the Blank
Complete the following sentence.
The World Wide Web launched to the public in

Answers

CERN released the code for the World Wide Web to the public on April 30, 1993. Subsequently, CERN made a release available under an open licence, which was a more reliable strategy for maximising its reach.

Which year was India's introduction to the World Wide Web?

The first time the world wide web was ever made accessible to the general public on the Internet was on August 6, 1991. It has changed so little in 26 years from how it was then.

In 1994, what was invented?

The IBM Simon, the first smartphone in history, goes on sale on August 16. The first PlayStation game console is made available in Japan on December 3. The first high-brightness blue LED is created, and the researchers are awarded the 2014 Nobel Prize for their discovery.

To know more about World Wide Web visit:-

https://brainly.com/question/20341337

#SPJ1

Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract { public abstract double findArea ( ); } public abstract class Rectangle { public abstract double findArea ( ); } public class Rectangle { public abstract double findArea ( ); } public class abstract Rectangle { public abstract double findArea ( ); }

Answers

Question

Which of the following class definition defines a legal abstract class Group of answer choices

(a)

public class Rectangle abstract {

   public abstract double findArea ( );

   

}

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

   

}

(c)

public class Rectangle {

   public abstract double findArea ( );

   

}

(d)

public class abstract Rectangle {

   public abstract double findArea ( );

   

}

Answer:

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

}

Explanation:

When a class is declared with the abstract keyword, the class is called an abstract class. Abstract classes cannot be instantiated and may include one or more abstract methods. If a class contains an abstract method, then it (the class) must be declared abstract.

In Java, abstract classes are defined using the following format:

[access_modifier] abstract class [name_of_class]

[access_modifier] specifies the access modifier of the class which could be public, private, e.t.c

abstract is the keyword that specifies that the class is an abstract class.

class is a keyword used for defining classes

name_of_class specifies the name of the class.

The only option that fulfils this format is option b where;

(i) The access modifier is public

(ii) The name of the class is Rectangle

Option a is not correct because the abstract keyword is supposed to come before the class keyword.

Option c is not correct because the keyword abstract is missing. In other words, the class must be declared abstract since it contains abstract method findArea();

Option d is not correct because the abstract keyword is supposed to come before the class keyword.

Write a program that allows the user to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentage of the total votes received by the candidate. Your program should also output the winner of the election.
i have this
#include
#include
#include
using namespace std;
int findMax(int votes[]);
void main()
{
int votes[20];
string name[10];
int total=0;
float percent[10];
int m, i, loc;
cout<<"Enter the names of candidates in local election and number of votes:"< for(int i=0;i<5;i++)
{
cin>>name[i];
cin>>votes[i];
}
for(i=0;i<5;i++)
{
total=total+votes[i];
}
for(i=0;i<5;i++)
{
percent[i]=((votes[i]/total)*100);
}
cout<<"Candidate"<<'\t'<<"VotesReceived"<<'\t'<<"% of Total Votes"< cout< for(i=0;i<5;i++)
{
cout< }
cout<<"Total:"< m=findMax(votes);
cout<<"Winner of the election is"< system("pause");
}
int findMax(int votes[])
{
int i,max,loc;
max=votes[0];
for(i=1;i<5;i++)
{
if(votes[i]>max)
{
max=votes[i];
loc=i;
}
}
return loc;
}
But, it is saying that loc is not initialized, and it is also not calculating % of total votes or the winner of the election and I don't what to do to fix it.

Answers

Answer:

The following fix were made to the program

Change void main() to int main(), then set a return value at the end of the main function;  e.g. return 0Remove system("pause");  It's not neededFor each of the array, change their lengths to 5 i.e. int votes[5];  string name[5];   and float percent[5];Lastly, calculate the percentage using: percent[i]=((votes[i]*100.0/total))

Explanation:

(1) void main implies that the main function will not return any value. So, you change it to int main() and then set the return value

(2) There is no need to pause the program, so system.("pause") is not necessary.

(3) The question says there are 5 candidates. So, we set the arrays to accommodate inputs for 5 values

(4) percent array is declared as float; 100.0 will ensure that it calculates the percentage as a float value.

See attachment for updated code

Does anyone know how to fix this? Everytime i make a new page it only types in the middle of the page. I want to type at the top

Answers

Answer:maybe start a new page or try hitting delete

Explanation:

give one word • pressure exerted by a stationary liquid _______. • force in a direction perpendicular to a given surface area _______. • a pair of forces whose resultant is zero _______.​

Answers

Answer:

1. Hydrostatic pressure.

2. Pressure.

3. Equilibrium forces.

Explanation:

1. Hydrostatic pressure: pressure exerted by a stationary liquid. It is simply the pressure in a liquid such as water at a specific depth.

Mathematically, hydrostatic pressure is given by the formula;

[tex] H.P = rho * g * d [/tex]

Where:

H.P is the hydrostatic pressure of a liquid.rho represents the density of a liquid.g is the acceleration due to gravity.d is the depth (height) of a liquid.

2. Pressure: it is the force in a direction perpendicular to a given surface area. Thus, it's typically measured in Newton per meters (N/m²).

Mathematically, pressure is given by the formula;

[tex] Pressure = \frac {Force}{area} [/tex]

3. Equilibrium forces: a pair of forces whose resultant is zero. It is also referred to as balanced forces because the resultant of all the pair of forces acting on a body or system is at equilibrium (balanced).

Rewrite the following function so that it returns the same result, but does

not increment the variable ptr. Your new program must not use anysquare brackets, but must use an integer variable to visit each double in the array. You may eliminate any unneeded variable.

double computeAverage(const double* scores, int nScores)

{
const double* ptr = scores;
double tot = 0;
while (ptr != scores + nScores)

{
tot += *ptr; } ptr++;

}
return tot/nScores;

Answers

Answer:

одиннадцать обречены и

Explanation:

переписать это как один из следующих

three basic components to cloud computing are client, internet

Answers

Answer:

the basic components of cloud comuting in a simple topology

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

a. The amount of time it takes guest users to send and receive large files is likely to decrease.
b. The number of packets required for guest users to send and receive data is likely to decrease.
c. Guest users will be prevented from having fault-tolerant routing on the Internet.
d. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Answers

Answer:

The correct option is d. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Explanation:

Bandwidth can be described as the maximum data transfer that an internet connection or a network has. It gives a measure of the amount of data that can be transmitted over a particular connection in a particular amount of time. For instance, the capacity of a gigabit Ethernet connection is 1,000 megabits per second (Mbps) (which also translates to 125 megabytes per second).

Therefore, when a local router is configured to limit the bandwidth of guest users connecting to the Internet, it will restrict the the maximum amount of data that they can transmit per second.

Therefore, the correct option is d. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Welcome to XYZ computing Enter username: jones Invalid username Enter username: b. Welcome to XYZ computing Enter username: smith Enter password: password Invalid access Enter username: c. Enter username: smith Enter password: password Invalid access Enter username: smith Enter password: FpQr56 Welcome to XYZ computing

Answers

Answer:

because the password being used is of high quality

Explanation:

Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.

Write a program to prompt the user for hours worked to compute a gross pay for an employee, and he is paid 100/hour. If he worked for 50 hours in a week then he will get overtime pay for the extra hours he worked i.e. he will be paid 1.5 times of M100.00 for 10 hours (50-40)

Answers

Answer:

rate = 100

hours_worked = eval(input('enter number of hours worked'))

gross_pay = hours_worked * rate

if hours_worked <= 40 :

print(gross_pay)

else:

print(gross_pay + (1.5*rate*(hours_worked -40)))

Explanation:

Using python 3 :

The rate of pay is defined using the rate variable

The user is the prompted to enter the number of hours worked.

Gross_pay gives the mathematical evaluation of the amount paid base in rate and hours worked.

Since hours beyond 40 are paid as overtime. Then we have to add that to those who worked above 40 hours.

If hours_worked is 40 and below, then use gross pay

If gross pay is above 40 ; then the overtime fee is added to gross pay using the rate provided.

Write a program named split_me.py that accepts a string in the format Age.FirstName and returns the value FirstName is Age years old. Length of Mary is X. Example: 22.Mary >> Mary is 22 years old. Length of Mary is 4

Answers

age,name = input('Enter a string: ').split('.')

print(name+' is '+age+' years old. Length of '+name+' is '+str(len(name)))

I wrote my code in python 3.8. I hope this helps.

Which of the following are properties of dictionaries? (check all that apply) nestable accessed by key iterable ordered

Answers

Answer:

Both are mutable.

Both are dynamic. They can grow and shrink as needed.

Both can be nested. A list can contain another list. A dictionary can contain another dictionary. A dictionary can also contain a list, and vice versa

Explanation:

hope it's help

In computers, language dictionaries are the unordered collections of the data set. Dictionaries can be nestable. Thus, option a is correct.

What is nestable?

Nestable is the ability to get nested that is the fitting of many objects together at a place. The items like the files, documents, folders, etc. can be placed and stacked within each other.

The different or the same type of computing items can be embedded and arranged in a hierarchical form. The other words do not fit with the computing dictionaries.

Therefore, option a. nestable is the correct option.

Learn more about dictionaries here:

https://brainly.com/question/15288419

#SPJ2

Which of the following passes an int argument into a method named print? Chose one option and explain why.

o print();
o print()+5;
o print("5");
o print(5);

Answers

Answer:

print(5)

Explanation:

Passing an int argument into the method named print ;

print() ; Here, the print method has no argument as it is empty

print()+5; Here also, the print method has no argument and adding +5 is an invalid syntax.

print("5") ; Here, print takes in an argument, however, the argument is a string due to the fact that 5 is enclosed by quotation marks.

print(5) ; Here, the integer is 5 is passed to the print method.

A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.

Answers

The answer for the question is butt

Please help it’s timed

Answers

Answer:

2nd, third, and the 5th one

Explanation:

In a finite state machine, state transitions happen only: a. When the reset causes a clock pulse on the D outputs of the flip-flops. b. When the latches cause the Q inputs of the flip-flops to toggle. c. When there is a clock pulse. d. When the present state is the same as the next state. e. When the present state is causes the next state to reset.

Answers

Answer:

When the present state is causes the next state to reset. ( e )

Explanation:

A finite state machine is a machine that can only be a certain state out its finite number of states at a given time. Hence state transitions occurs in a Finite state machine when the present state is causes the next state to reset.

An Example of a Finite state machine is a Coin-operated turnstile :

In this Finite state machine the Input of Coin unlocks the machine hence resetting the next state ( i.e. the lock state ), while to activate the lock state you push the arm of the Turnstile which in turn will as well reset the unlock state ( previous state ).

With this S/MIME function, anyone can view the message content, but only those with S/MIME capabilities can verify the message signature.

a. enveloped data
b. signed and enveloped data
c. clear-signed data

Answers

Answer:

The correct option is c. clear-signed data.

Explanation:

Clear-signed data enables a digital signature to be created by encrypting the message digest of the material to be signed using the signer's private key. But only the digital signature is encoded with base64 in this scenario. As a result, recipients who do not have access to S/MIME can see the content of the message but the message signature cannot be verified by them.

Based on the explanation above, the correct option is therefore c. clear-signed data.

tool that help to monitor the ongoing performance of the platform for Accenture​

Answers

Answer:

MyConcerto

Explanation:

Accenture may be described as an industry leader which renders professional services capable of solving various business problems by leveraging the use technology involving data and business intelligence to proffer solutions to their clients needs. The MyConcerto firmly known as the Accenture Intelligence Enterprise platform is designed to continously help businesses measure performance, identify shortfalls and proffer solutions using data driven insight. It offered a fully automated platform with predefined solutions geared at accelerating business decisions and adaptive solution.

MyConcerto is a tool which helps to monitor the ongoing performance of the

platform for Accenture​.

Myconcerto is a digital platform which brings together and incorporates

innovation and leadership qualities. It involves the use of technology and

solutions which results in exponential business outcomes.

These qualities help in the monitoring process of ongoing performance

which is available on Accenture.

Read more about Accenture here https://brainly.com/question/24937450

Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and ending number y Implements a while loop that counts from x (start) to y(end). Inside the loop , print to the screen rather the current number is even or odd If the number is even , multiply by the number by 3 and print the results to the screen. If the number is odd , add 10 and print the results to the screen. Use at least 1 increment or decrement operator.

Answers

Answer:

Explanation:

The following program is written in Java. It asks the user for the two inputs and then uses those inputs in a for loop. The loop goes through each number checking to see if it is even or odd. If it is even it prints out Even: and the number after multiplying it by 3. If it is odd it prints out Odd: and the number after adding 10 to it. The output can be seen in the attached picture below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter number 1: ");

       int num1 = in.nextInt();

       System.out.println("Enter number 2:");

       int num2 = in.nextInt();

       for (int x = num1; x <= num2; x++) {

           if ((x % 2) == 0) {

               System.out.println("Even: " + (x*3));

           } else {

               System.out.println("Odd: " + (x+10));

           }

       }

   }  

}

what is mobile computing​

Answers

Explanation:

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage, which allows for the transmission of data, voice, and video. Mobile computing involves mobile communication, mobile hardware, and mobile software. ... Hardware includes mobile devices or device components.

Question: what is mobile computing

Answer:

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage, which allows for the transmission of data, voice, and video. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

Explanation:

Hope it helps

#CarryOnLearning

what is computer software​

Answers

Answer:Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. Wikipedia

Explanation:

what the rule of pattern 1 4 9 16 25​

Answers

(1)² = 1

(2)² = 4

(3)² = 9

(4)² = 16

(5)² = 25

A programmer writes 500 lines of computer code in 17 days. Must there have been at least 1 day when the programmer wrote 30 or more lines of code

Answers

Answer:

The answer is No

Explanation:

Given data

Total Lines of code= 500

Number of days= 17 days

Number of codes written per day= 500/17

Number of codes written per day= 29.4117

If we multiply 29.4117 by 17

=499.9989

=500 approx

Hence there was never a day when the programmer wrote 30 or more lines

Your answer
Antivirus is a ........ software.​

Answers

Answer: True

Explanation:

Software refers to the programs and other instructions which enable us to be able to execute tasks on a computer. Everything you see when you turn on the computer is software from the operating system to the browsers that you use.

An antivirus is no different. It is basically a software on the computer that is able to monitor the activities of other software to ensure that the computer does not get infected by malicious software.

Other Questions
what is oral traditions? dont copy word to word from the internet Which one is equivalent? Ez points A 50 kg child sits on the left side of the bathtub. A small toy boat of 0.5 kg is on the right side of the bathtub. Which part of the bathtub has the greatest pressure Complete each sentence with the correct form of the verb in parentheses.1. Vosotrosla calle donde est el teatro. (encontrar)2. A qu hora tdel centro? (volver)3. Los estudiantesocho horas por da. (dormir)4. inosotros en el nuevo restaurante? (almorzar) Create a new Java program called Flip. Write code that creates and populates an array of size 25 with random numbers between 1-50. Print the original array. Print array in reverse. Plz help me i am stuck Which statement BEST analyzes the purpose of the speaker?esA)* Washington wants to argue for another term of presidency for himself.B)Washington wants to inspire the audience to take up arms against theBritish9Washington wants to convince people that democracy is a good system ofgovernmentD)Washington wants to warn the audience against the dangers of fightingpolitical parties. Help!! 10 points.. test due soon!Which part of the Magna Carta is reflected in the US constitution? Which group of words is a dependent clause?after the rules were set up do you know the way home in a deep funkafter his dream which inequality is graphed in blue Help please!a hurricane with winds around 137 miles per hour is categorized as which of the following?A.Tropical StormB.Tropical depressionC.Category 4D.Category 5 Cytokinesis differs between animal and plant cells. In animal cells, themembrane pinches together to form a cleavage furrow. In plant cells, themembrane cannot pinch together because of theInstead, ais laid down between the two nuclei.This structure develops into the new cell walls and cell membranes.PLEASE HELP please help i keep getting the wrong answers What is the value of 8? NEED HELP ASAP........ Picture below Need help please, It's urgent about the character/ narrator. . No link please, will report. Identify the narrator in the passage below. We were ready for the hurricane . Dad and Steph had spent yesterday boarding up the windows. And Mom and I had gone shopping for emergency supplies. We had bottled water, plenty of batteries, and even extra cans of fuel for a portable generator. When the storm hit, Mom said, OK, this is it. Steph, go around and unplug all the electronics. Beth, fill up the bathtub and sinks with water. a) Bethb) Stephc) Momd) Dade) The narrator is not a character in the story HEYY:) HELP TY LUVSSS what is the result?? Show explanation.A. 4B. 4C. 4-D. 4- 11. (a)What downward force is acting on you when you go down a waterslide? (b)What type of friction ispresent? (c)If the waterslide were dry explain what type of friction in would be and (d)how thatchanges your speed? (4 points) The major advantage of a regular partnership or a corporation as a form of business organization is the fact that both offer their owners limited liability, whereas proprietorships do not. True False