what types of activities are ideal for a robot to perform?

Answers

Answer 1

The type of activities that are ideal for a robot to perform are; Repetitive tasks

Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.

Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.

The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.

Read more about robots at; https://brainly.com/question/9145476


Related Questions

what is syllabus of diploma in computer after class 10​

Answers

Answer:

[tex] \: [/tex]

List Of Best Computer Courses After 10th :

Certificate Program In MS OfficeBasic Computer CourseWeb Designing CourseDigital Marketing CourseData Entry CourseGraphic Designing CourseWeb Development CourseAnimation And VFX CourseComputer Science Diploma/EngineeringDiploma In Financial Accounting

Can someone help me please and please answer all the questions and explain :D

Answers

Answer:

1. is A. 2. is C.  3. is A.

Explanation:

Filters remove all data that does not match the requirements.

A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware

Answers

It is a citation for the answer

WHEN IS THE DESIGN PROCESS FINISHED IN ENGINEERING?​

Answers

Answer:

I think answers is it never ends

Ethan is afraid that his poor grades will get him kicked out of his university at the end of the semester. He decided to remotely access the dean's computer and change his grades in the school system. If caught, Ethan will have to confess to committing what?

A.
virtual education

B.
grade hacking

C.
a computer crime

D.
educational fraud

Answers

Answer:

Computer Crime

Explanation:

You're evading someones privacy and gaining access to their computer or device without consent. Therefore, it is a computer crime.

Answer:

Educational fraud

Explanation:

Ethan changed his grades in the school system claiming to have better grades then he really does.

You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.

Answers

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

please answer ASAP!!!!!!

Answers

Answer:

the first constructor invocation will work.

pet temp("mouse", 5.99);

Explanation:

This will create a pet object on the stack, using the constructor.

If you want to create an object on the heap, you would use the new operator:

pet* pTemp = new pet("mouse", 5.99);

Can someone help me with this please

Answers

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

When the logging and managing information flow between management hosts and the managed devices travels on a dedicated management network, this is considered what?

Answers

What must be considered is the number of IPs that are allowed to access the management network.

We can arrive at this answer because:

During the management of information flow, it is necessary to guarantee the security of the system, preventing intruders from attacking.This can be done by restricting authorized IPs to access the management interface.This type of security measure is often neglected in systems that use a dedicated management network, as this type of network can only be accessed by a single device in the same VLAN.

However, the IPs restriction must be considered even in this system, as there are software that can provoke invasions that cause the leak of shared information.

You can find more information about software here:

https://brainly.com/question/24032221

This type of RAID implementation uses its own Central Processing Unit (CPU) for calculations on an intelligent controller card by:

Answers

RAID implementation uses its CPU for calculations on an intelligent controller card by a hardware implementation.

Basically, a hardware implementation refers to a job is done using a physical device or electronic circuit rather than been done automatically by the computer program.

Hence, through a hardware implementation, the RAID implementation is able to use its CPU for calculations on an intelligent controller card

Read more about hardware implementation

brainly.com/question/25803633

Help please

What is an ordered pair?

1. a type of font in Microsoft Word

2. the end of the x-axis on a coordinate grid

3. two numbers that tell the location of a point on a coordinate grid

4. a type of table located in the Table drop-down menu

Answers

Answer:

two numbers that tell the location of a point on a coordinate grid

Explanation:

Answer:

Two numbers that tell the location of a point on a coordinate grid.

Explanation:

An ordered pair would look like this

(0, 4) or (7, 2)

the first number would be on the x-axis and then the second would be on the y-axis

What type of information is appropriate for headers and footers? Check all that apply.

Answers

Answer:

C,  E,F,G  are correct

Explanation:

Answer:

C,E,F,G  are correct.

Explanation:

What are some of the restrictions to muscle wire?

Answers

Answer:

Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.

A student is writing a research paper on astronomy. His teacher has asked that she include a visual aid to explain the scientific concepts in her paper. She has chosen to write about the moon, and she wants to use a visual aid to show what the surface of the moon looks like.

Which visual aid would best support her topic?

Answers

Answer: a map showing the different sizes of the moon's craters

Explanation:

the reason for this is because the student wants to show what the surface of the moon looks like.

Physical components of a computer system such as a keyboard, mouse, or modem.

Question 25 options:


Software


Network


Browser


Hardware

Answers

Answer:

D

Explanation:

D: Hardware. These are the things like mouse or Modem that you can touch physically.

Software is what the computer runs to make itself useful.

Network is the connection (either virtual or physical) that connects computers together.

Browser is a software program used to navigate the internet

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out


What is the missing line of code?
22
>>> books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}
>>>
dict_keys([294, 931, 731])
O books allo
O books.values()
O books
O books.keys()

Answers

Answer:

books.keys()

Explanation:

I ran the code and the awncers though python and books.keys() is the one that came up with the awncer

books.keys() is the missing line of code with respect to the books with the help of Python language.  Thus, option D is correct.

What is a code?

In a certain programming language, a collection of commands or a collection of rules are referred to as computer code. It's also the name given to the source code just after the translator has prepared it for computer execution.

Code is a developing company that focuses on producing aesthetically pleasing, code-correct internet, application forms, and phone application.

The correct code will be according to the Python language will be in addition to books.keys():

books.keys()

books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}

books.keys()

dict_keys([294, 931, 731])

Therefore, option D (books.keys()) is the correct option.

Learn more about code, here:

https://brainly.com/question/17204194

#SPJ2

Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player

Answers

Interface best describes the layout of the screen.  This is done by designers

in which they help to design the appearance and style of various software

and devices.

These characteristics help to ensure the users find them friendly and easy to

navigate through when performing various operations .

In this scenario, we were told that the layout has blocks on the left, editor in

the middle, and output on the right which are designs for easy navigation on

Tynker.

Read more about Interface here https://brainly.com/question/5080206

Answer:

interface

Explanation:

how many pages is 1500 words double spaced 12pt font?

Answers

Answer:

6 pages

Explanation:

what is a saved link to a particular web page?​

Answers

Answer:

A bookmark

Explanation:

A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.

The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resistance is 48 Ohms.

Answers

Current (I) = 0.25 ampere (A)

Power (P) = 3 watt (W)

Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm =  0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm =  3 watt (W)

many phone fraud scammers are expessily cunning because they approach the target to try to sell

Answers

Answer:

improved computer security programs

Explanation:

Answer:

Improved computer security programs.

Explanation:

Just took the quiz

! (( i > ( f + 1)) es verdadero o falso segun la logica de programación.

Answers

Answer:

yeajadaj

Explanation:

What is my mistake in this case?

Answers

Answer:

I think it suppose to be #print out house

Answer:

i guess take the hint, bro.

Explanation:

Please help please help

Answers

Answer:

Bonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az

ExplanationBonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az:

1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:

A healthcare crisis where millions of patient medication records were tampered with is an example of what type of breach?

A.
integrity breachc.

B.
codependency breach

C.
authentication breach

D.
AIC Triad breach

Answers

A healthcare crisis where millions of patient medication records were tampered with is an example of; A: Integrity Breach.

To answer this question, let us access each of the options;

A) Integrity breach; This is a breach that occurs when where there is an unauthorised or accidental alteration of the personal data of individuals or a group.

B) Codependency breach; This is not really a breach in this context as it happens when there is an imbalanced relationship between two or more people.

C) Authentication breach; This is a type of breach that is more common with a breach of passwords and login details.

D) AIC Triad breach; AIC is Availability, Integrity and confidentiality. So it combines Availabilty breach, integrity breach and confidentiality breach.

In this question, the patient medication records were tampered with which means that they were altered and from our definitions above, this is an example of integrity breach.

Read more about security breach at; https://brainly.com/question/15957125

Which of the following statements best explains how multitasking works in the human mind?

Answers

Multitasking is a myth—everyone can only process information one piece at a time.

Answer: He's right

Explanation: I got the answer too

Open-ended games give players the most freedom to explore other worlds.

A.
True
B.
False

Answers

A - trueeeeeeeeeeeeee

is there actually a difference between left and right twix

Answers

one has more caramel and one has more cookie
Other Questions
Aneesha determined that the cost of attending her public four-year college in her first year will be $6,220. If the average cost is expected to increase by 6%, what will be the cost of attending her second year in college?A) $6,226.00B) $6,257.32C) $6,593.20D) $6,820.00 Hola! Mi nombre es Rosita y vivo en Cartagena, Colombia. Tengo 16 aos y estoy en la escuela superior. Todas las escuelas superiores en Colombia tienen cuatro rutas diferentes, desde un ao a cinco aos de estudios: programas tcnicos, tecnolgicos, docentes y profesionales. Los programas docentes y tecnolgicos son los ms largos.Yo estudio en el programa tcnico. Quiero ser jardinera. Cuando terminas los dos aos del programa tcnico, puedes comenzar a trabajar inmediatamente sin ir a la universidad. En las carreras profesionales necesitas estudiar ms que en las carreras tcnicas y necesitas ir a la universidad. En los Estados Unidos hay carreras tcnicas, pero no en todas las escuelas. En Estados Unidos, despus de terminar los estudios tcnicos o generales en cuatro aos, puedes ir a la universidad para los estudios profesionales.Based on the text and what you learned in the lesson, what is similar in high schools in Colombia and in the United States? A. All high schools in both countries offer technical programs. B .Both countries offer general programs in all high schools. C. Both countries require five years of university studies before any technical programs. D. Students need university credits before enrolling in any general program in both countries. Scientists say we should sleep 3/8 of a day.How about many hours is this A student was asked to determine the concentration of ammonia, a volatile substance used in the clinical setting as a respiretory stimulant to prevent fainting. First the student pipetted 25.00 mL of the cloudy ammonia solution into a 250.0 mL conical flask. 50.00 mL of 0.100 mol L' HCl(aq) was immediately added to the conical flask which reacted with the ammonia in solution. The excess (unreacted) HCI was then titrated with 0.050 mol L- Na2CO3(aq). 21.50 mL of Na2CO3(aq) was required. Calculate the concentration of the ammonia in the cloudy ammonia solution. define nuclear energy hi, have a good day! WILL MARK BRAINLIST Drag the words with r-controlled vowel syllables into the box. Choose the four correct words. darkenpouredpressingropesboringserverr-controlled vowel syllable What is quadratic spline? how many number of solutions does 3(x+1)+x+2=2(2x+1)+3 have pls help me out review the proof (not in order) of the identity tan(0/2) = + 1-cos(0)/1+cos(0)which is the correct sequence of steps HELP PLS!I'm studying for UCAT as I want to get into medicine. I don't understand probability diagrams like these, please explain it to me. The ocean regulates temperatures, keeping them mild year-round, in __________ climate regions.A.continentalB.moderateC.polarD.tropical Which equation represents the line through (0,0) and (3, 4)?O A. y = xO B. y = 4xO C. y = 2O D. y = 3x Determine whether each sentence talks about a Jewish belief based on the Ten Commandments or a belief that is not based on the Ten Commandments.Choose Yes for the Jewish beliefs that are based on the Ten Commandments. Choose No for those that are not based on the Ten Commandments.Ask for forgiveness of your sins during Yom Kippur. [ Select ]The relationships in your life are incredibly important,especially those with God. [ Select ]Look toward the coming of the Messiah, who will bring peace to theworld and return the Jewish people to the land of Canaan. [ Select ]Follow the laws found in the Hebrew Bible. [ Select ]Do not take things that dont belong to you. [ Select ]Offer prayers to God, who is the only god you should worship. helllppp pleaseeeeee A white woman says she is not racist but avoids sitting near Black individuals. She hasA.high explicit racism, low implicit racismB.high explicit racism, high implicit racismC.low explicit racism, low implicit racismD.low explicit racism, high implicit racis What usually happens to main characters by the end of the story?a. They fall in love.b. They are defeated by the antagonistc. They grow, change, or learn an important lesson.d. They find treasure beyond their wildest dreams. what are places that are high risk for contamination? if the poins A(-6,-5),B(-3,-2) and C(3,k) is on the same straight line, find the value of k. Reflecting on the memoir Night, what role do you think fear played in Elies life? Whats your opinion of Elie Wiesels overall experiences? What impact did his memoir Night and his interview withOprah have on you? Meaning, what were your takeaways? Why do you think it is so important to study history and thedetails of the Holocaust?