answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
1 year ago
3

What are the pros and Con's of human -computer interaction?​

Computers and Technology
1 answer:
barxatty [35]1 year ago
7 0

Answer:

pros-you can talk to a man made intelligence without the drama except for system crashes lol

-you can have them as a romantic partner.

cons-there are programmed emotions so it isn’t that real.

romantic emotion can be fake.

Explanation:

You might be interested in
Write a loop that outputs the numbers in a list named salaries. The outputs should be formatted in a column that is right-justif
GalinKa [24]

Answer:

Following is the loop statement in the Python programming language

salaries=[93.85967,4232.32,13343.3434] #storing the values in salaries

for k in salaries:#iterating the loop

   print("%12f"%round(k,2))# print the width of 12 and a precision of 2

   Output:

  93.860000

4232.320000

13343.340000

Explanation:

Following is the description of the statement

  • Declared a dictionary "salaries" and initialized some values into it.
  • iterating the for a loop .
  • In this for loop print the width 12 and a precision of 2 .The print statement in python will
  •  print the data with  width 12 and a precision of 2 in the console window

7 0
2 years ago
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
2 years ago
Give the logical function for the following: If cell B7 equals 12, check contents of cell B10. If cell B10 is 10, then the value
ASHA 777 [7]

Answer:

=IF( B7 = 12, ( IF( B10 = 10,"YES", "")), 7) and PRESS ENTER

Explanation:

the above logical if function checks the following

-IF cell B7 is 12, if true, check the value of cell B10, IF cell B10 contains 10 the function should produce YES as output to whatever cell selected, IF B10 is not 10 output of the function should be an empty string, IF B7 is not equal to 12 the the output of the function should be 7.

5 0
2 years ago
The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
olga55 [171]

Answer:

The correct answer for the given question is option(A) i.e File History.

Explanation:

In computer system file history is an backup application which create backup of your data which are stored in your libraries, desktops, contacts, and favorites to another storage location .It creates back up of your data  to another location when your personal files has been changed.

The user can check the file history option in computer system

open control panel >>system and security >> file system

7 0
2 years ago
Annabeth has been using a public cloud to store and access her documents. Which drawback of a public cloud should she be aware o
Flura [38]

<u><em>i just to the test on Plato and it said that A. accessibility is wrong  the correct answer is d  security #homeschoolrocks</em></u>

5 0
2 years ago
Other questions:
  • Which statement regarding dialogues in multiplayer games is true? Dialogues are based only on players’ actions.
    7·2 answers
  • Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows
    15·2 answers
  • Write a statement that reads a floating point value from standard input into temperature. Assume that temperature. has already b
    6·1 answer
  • Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
    6·1 answer
  • Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer
    6·1 answer
  • Write the routines with the following declarations: void permute( const string &amp; str ); void permute( const string &amp; str
    14·1 answer
  • In this assignment, you are provided with working code that does the following: 1. You input a sentence (containing no more than
    14·1 answer
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!