What are three examples of automation?

Answers

Answer 1

The three examples of automation are Automated teller machines (ATMs), Automated warehouse robots, and Automated home appliances, such as washing machines and refrigerators

What is automation? what are the advantages of automation?

Automation is the use of technology to control and monitor the production and delivery of products and services.  It involves the use of computers, robots, and other forms of technology to carry out tasks that would otherwise require manual labour. Automation can be used to reduce costs, increase efficiency, and improve accuracy. Automation can also be used to increase the speed of production and to reduce the amount of time needed to complete a task. Automation has several advantages, including increased productivity, improved accuracy and precision, increased safety, increased speed, and decreased manual labor. Automation can also help to improve customer service, reduce costs, and improve the overall quality of a product or service. Additionally, automation can help to reduce waste and increase efficiency.

To learn more about automation refer to:

https://brainly.in/question/53276335

#SPJ4


Related Questions

Explain what Fahd did wrong in the scenario below. Fahd is running ten programs at once on his laptop when it suddenly freezes up. To fix this problem, Fahd buys a new battery for his laptop.

Answers

Answer:

Well first off. if the laptop froze that doesn't mean the battery is dead to the point where a simple rest of the laptop wouldn't work out.

What do fair use and copyright laws help you understand ?

Answers

Explanation:

we can understand about the systematic laws and surely we can be aware of such things also it promotes the correct use of our technology and innovations.

In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. ... In other words, fair use is a defense against a claim of copyright infringement.

Select the correct answer.
Which principle of animation is prominent in this picture?
A.staging
B.arcs
C.anticipation
D. timing

Answers

The principle of animation reflected in the image is the arcs principle.

What is animation?

Animation refers to the action of recreating actions and movements by using drawings or models.

What are the principles of animation?Animation is regulated by specific principles, some of them include:Anticipation: Showing the movement or position that anticipates an action.Timing: Making an action fast or slow by using a specific number of frames.Staging: Using specific elements to stage one action and avoiding unnecessary elements.Arcs: Showing the natural movement of a specific action.

Based on this, the principle used in the image is the arcs because it emphasizes the natural curve or natural movement of someone playing golf.

Learn more about draw in: https://brainly.com/question/4853831

Answer:

B. arcs

Explanation:

What is strFirst? def username (strFirst, strLast): return strFirst + strLast[0] answer = username ('Joann', 'Doe') print (answer) strFirst is a A. Parameter B. Return value C. Function

Answers

The answer is B as in Boy

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

In this class, it is very common for your computer screen to look like this. What is this?​

Answers

theres no Picture???

Your aunt owns a store and hired you to analyze the customers. You recorded the estimated ages of customers who shopped in the store and whether they made a purchase. Some of your data values are followed. What types of analysis could you do with this data? Select 4 options.

Answers

Answer:

-percentage of customers who made a purchase

-minimum age

-average age

-maximum age

Percentage of customers who made a purchase, minimum age, average age and maximum age are the types of analysis could you do with this data. Hence, option A, B, C and E are correct.

What is data values?

A data value is the material that fills the space of a record. For instance, one of the database's numerous data fields might contain a number that indicates the weight of a certain integer.

Data, such as statistics, phone numbers, or inventory counts, are undoubtedly pieces of information that a person would understand as numbers.

Data provides useful information that enhances business decisions. This information is the result of an effective data analytics strategy. Businesses may create a data culture far more easily because of the monetary worth of data.

Thus, option A, B, C and E are correct.

For more information about data values, click here:

https://brainly.com/question/16612044

#SPJ2

BRAINLIEST WILL BE GIVEN

which technique can you use on your pages to improve ratings in search engines

a. on-page
b. search review
c. off-page
d. off-site

Answers

Answer:

mine is search review

Explanation:

so u can know if its bad or good rewiev s are very helpfull

You should contact your references _____ a job interview.


only if the interviewer asks for your references

before and after

before

after

Answers

Answer:

My research suggests that it is before and after.

You should contact your references before and after a job interview.

What is Interview?

A planned interaction in which one party asks questions and the other responds is known as an interview. A one-on-one chat between an interviewer and an interviewee is referred to as a "interview" in everyday speech.

The interviewee answers the interviewer's questions by typically supplying information. Other audiences may utilize or receive that information right away or later.

This characteristic is common to many different types of interviews; even though there may not be any other people present during a job interview or an interview with a witness to an occurrence, the answers will still be given to other people later on in the hiring or investigative process.

Therefore, You should contact your references before and after a job interview.

To learn more about Interview, refer to the link:

https://brainly.com/question/13073622

#SPJ2

What is the output from main (below) after the following function is called. void calculateCost(int count, double& subTotal, double& taxCost) // definition { if ( count < 10) subTotal = count * 0.50; else subTotal = count * 0.20; taxCost = 0.1 * subTotal; } int main() { double tax = 0.0, subTotal = 0.0; calculateCost(15, subTotal, tax); // function call cout << "The cost for 15 items is " << subTotal << ", and the tax for "<< subTotal << " is " << tax << endl; return 0; }

Answers

Answer:

     

Explanation:

2ND LAST QUESTION

the purpose of the ___________ element is to group together a set of one or more [h1] element so that theyre treated as a single heading

a. header
b. hgroup
c. h1group
d. group

Answers

Answer:

B

Explanation:

1. What is used to change the appearance of a cell's value based on parameters set by the user?

Answers

conditional formatting

list the first prime minister of St Vincent and the grenadines​

Answers

Robert Milton Cato (June 3rd, 1915 - February 10, 1997)

Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.

Answers

Answer:

A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

Explanation:

Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.

I’ll mark brainliest, thanks

Answers

Answer:

if that is a tutorial, than just hit submit, the teacher doesn't see it.

Explanation:

i do online schooling on the same website

\Yeah man, what the last guy said. On that website, teachers can't see tutorials so you can just submit it blank if you want. :)

differentiate between tabular and column form layout​

Answers

In tabular form the data is displayed in a table layout following a continuous series of records. In this almost all the records are displayed in a single layout. While in columnar form the data is displayed one record at a time.

What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
A separate data sheet opens in which to enter data for the chart.
The user is prompted to link to an external Excel spreadsheet
The user can edit the chart directly
Nothing happens

Answers

Answer:

A (because you can't have a chart without information, right?)

brainliest plz

Explanation:

2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face communication.
B.Keep messages short.
C.Never text or send an instant message when you are angry.
D.Use it for casual conversations.​

Answers

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps

13. Place where names, addresses and email information
is stored

Answers

Answer in ur email

Explanation:

Describe an association or rhyming phrase you have used to remember information. Was this a useful technique for you? Why or why not?

Answers

Answer:

I used the names George Clooney and Tim Allen to remember the pairs of nitrogenous bases in DNA.

Explanation:

DNA is composed of nucleotides, however the nucleotides are formed by nitrogenous bases called Adenine, Guanine, Cytosine and Thymine. Each nucleotide has a nitrogenous base, but these bases form pairs, allowing the nucleotides to come together. The pairs are formed solely by Timine and Adenine or Guanine and Cytosine.

As I needed to remember the formation of the pairs to do my biology test, I associated the first letter of each base, with the initials of two famous names.

As Guanina is paired with Cytosine (G-C), I associated this pair with the initial letters of the name George Clooney. As Timina is paired with Adenina (T-A), I associated this pair with the initials of the name Tim Allen.

A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the user experience and introduce unfair advantages to some players. The application is deployed in every AWS Region it runs on Amazon EC2 instances that are part of Auto Scaling groups configured behind Application Load Balancers (ALBs) A solutions architect needs to implement a mechanism to monitor the health of the application and redirect traffic to healthy endpoints.
Which solution meets these requirements?
A . Configure an accelerator in AWS Global Accelerator Add a listener for the port that the application listens on. and attach it to a Regional endpoint in each Region Add the ALB as the endpoint
B . Create an Amazon CloudFront distribution and specify the ALB as the origin server. Configure the cache behavior to use origin cache headers Use AWS Lambda functions to optimize the traffic
C . Create an Amazon CloudFront distribution and specify Amazon S3 as the origin server. Configure the cache behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic
D . Configure an Amazon DynamoDB database to serve as the data store for the application Create a DynamoDB Accelerator (DAX) cluster to act as the in-memory cache for DynamoDB hosting the application data.

Answers

Yetwywywywywywyyw would

One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data transmissions required by the Internet. while it works well for television signals, it is ineffective for data transmissions required by the Internet. none of the available options are true. none of the available options are true. it is incompatible with most modern communication systems. it is incompatible with most modern communication systems. systems used by many providers require customers to share bandwidth with neighbors. systems used by many providers require customers to share bandwidth with neighbors.

Answers

Answer:

systems used by many providers require customers to share bandwidth with neighbors

Explanation:

One of the disadvantages of cable technology is that systems used by many providers require customers to share bandwidth with neighbors. This ultimately causes many problems since cables would need to be extended to reach every single user that will be sharing the bandwidth. This would mean cables all over the place. Also, it is very difficult to limit the bandwidth per person, meaning that if anyone is using up all of the bandwidth through the cable, the rest of the individuals connected would not have the bandwidth that they need or are paying for.

what is the main reason for adding somebody into the BCC list for an email?​

Answers

Answer:

protecting email address privacy

Explanation:

for securing and privacy reasons and it is for the best

Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Accountants? Select four options

mathematics
reading comprehension
equipment maintenance
quality control analysis
active listening
writing

Answers

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

O*NET is the short for Occupational Information Network and it is a comprehensive online database that is uniquely designed to provide information about job requirements, staff competencies, work styles, abilities, skills and other resources. Thus, O*NET is the primary source of occupational information for the private and public sector of the United States of America. Also, it helps to identify and develop the work styles, skills, activities and abilities of various occupations of the American workforce.

According to O*NET, some common skills needed by Accountants include the following;

I. Mathematics: an accountant is required to have a good knowledge of different mathematical concepts such as arithmetic, calculus, algebra, statistics, etc., as well as their application to the field of accounting.

II. Reading comprehension: he or she should be able to read and understand the informations contained in all work-related documents.

III. Active listening: accountants are required to pay adequate attention to the informations that are given by the customers without interjections.

IV. Writing: they should be able to compose well-written and clear textual informations about work-related activities.

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE elements. This constant has been declared for you in main, and you should leave it in main. Set each array element to the value i*multiplier, where i is the element's index. Next create two functions, called PrintForward() and PrintBackward(), that each accept two parameters: (a) the array to print, (b) the size of the array. The PrintForward() function should print each integer in the array, beginning with index 0. The PrintBackward() function should print the array in reverse order, beginning with the last element in the array and concluding with the element at index 0. (Hint: for help passing an array as a function parameter, see zybooks section 6.23) As output, print the array once forward and once backward.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

void PrintForward(int myarray[], int size){

   for(int i = 0; i<size;i++){        cout<<myarray[i]<<" ";    }

}

void PrintBackward(int myarray[], int size){

   for(int i = size-1; i>=0;i--){        cout<<myarray[i]<<" ";    }

}

int main(){

   const int ARRAY_SIZE = 12;

   int multiplier;

   cout<<"Multiplier: ";

   cin>>multiplier;

   int myarray [ARRAY_SIZE];

   for(int i = 0; i<ARRAY_SIZE;i++){        myarray[i] = i * multiplier;    }

   PrintForward(myarray,ARRAY_SIZE);

   PrintBackward(myarray,ARRAY_SIZE);

   return 0;}

Explanation:

The PrintForward function begins here

void PrintForward(int myarray[], int size){

This iterates through the array in ascending order and print each array element

   for(int i = 0; i<size;i++){        cout<<myarray[i]<<" ";    }

}

The PrintBackward function begins here

void PrintBackward(int myarray[], int size){

This iterates through the array in descending order and print each array element

   for(int i = size-1; i>=0;i--){        cout<<myarray[i]<<" ";    }

}

The main begins here

int main(){

This declares and initializes the array size

   const int ARRAY_SIZE = 12;

This declares the multiplier as an integer

   int multiplier;

This gets input for the multiplier

   cout<<"Multiplier: ";    cin>>multiplier;

This declares the array

   int myarray [ARRAY_SIZE];

This iterates through the array and populate the array by i * multiplier

   for(int i = 0; i<ARRAY_SIZE;i++){        myarray[i] = i * multiplier;    }

This calls the PrintForward method

   PrintForward(myarray,ARRAY_SIZE);

This calls the PrintBackward method

   PrintBackward(myarray,ARRAY_SIZE);

   return 0;}

What should I watch on Netflix (shows for a 14 year old) ?

Answers

Answer:

The flash

Explanation:

Answer:

Im not a big horse fan but loved this show its called free rein

Explanation:

loved itttttt!

In order to multitask, a computer must have two or more processors. True or False

Answers

Answer:

False

Explanation:

:) brainliest pls

Answer:

True

Explanation:

Enumerate a couple of reasons why it would be impracticable for the external devices to be connected directly to the processor or the system bus

Answers

Answer:

(a) Difference in data transfer rates

(b) Difference in word lengths

(c) Different peripherals with different modes of operation

Explanation:

There are several reasons. Some of them have been listed in the explanation section. A brief explanation is as follows

(a) Difference in data transfer rates

Some peripherals have fast transfer rate while some have slow transfer rates compared to the processor they are being connected to. This difference in the rates implies that a high speed system bus will find it difficult to communicate with a (say) low speed peripheral.

(b) Difference in word lengths

Another consideration is the word lengths. Often times, peripherals and the bus they are being connected with will have a different word lengths.

(c) Different peripherals with different modes of operation

In computer architecture, a processor can not be used to interact with peripheral of different mode of operations. In other word, each peripheral have its own mode and will require different means of connection.

Which of the following is not an example of a source of information that contributes to the accumulation of big data

Answers

Answer:

Law enforcement officials request the driver's license history for a suspect they recently apprehended.

Explanation:

The option that doesn't cause accumulation of big data is that Law enforcement officials request the driver's license history for a suspect they recently apprehended.

What causes accumulation of data?

Data is an information that is processed by a computer and can be stored in the computer for future use or reference purposes.

The quantity of data processed by a computer depends on the volume of the raw data that is collected and prepared before processing takes place.

From the given options;

Law enforcement officials request the driver's license history for a suspect they recently apprehended. This is just the data of a single individual which can not cause big data accumulation.

Receivers in cell phones request position information from nearby cell phone towers, and this location information is communicated to cell phone companies. This involves more that one cell phone company therefore can cause accumulation of big data.

Search engine providers store all search terms entered by users. This can cause accumulation of data.

Hundreds of satellites stationed above the earth capture images of the earth’s surface. This can cause accumulation of data.

Therefore data from a single source cannot cause accumulation of big data.

Learn more about data processing here:

https://brainly.com/question/26642156

The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.

Answers

Answer:

The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.

Explanation:

The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.

In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:

Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.

This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.

Other Questions
HELP!! PLEASE TY Which of the following illustrates the energy transformation that occurs during photosynthesisA Electrical to Leaf to thermal energyB Chemical energy to leaf to mechanical energyC Light energy to leaf to chemical energyD Thermal energy to leaf to light energy Explain why it is important for an exercise physiologist to obtain certification in addition to a kinesiology degree. Jimmy eats seven cookies every three minutes. How long does it take him to eat 28 cookies? The electron transport chain produces much more ATP than glycolysis or the Krebs Cycle but it needs them to happen in order to take place. How do the first two steps make the last one possible? Who ever answers it gets Brainly Which of the following equation represents a linear function how do people show inner strength? Which describes bonding electrons in a polar covalent bond?electrons that are not shared equallyelectrons that are shared in diatomic moleculeselectrons that are shared equally help me pls plz please teachers math simple math lol ok smart wow cool points brainly tiktok Describe the relationship between complex and real numbers. Include acomparison between algebraic and complex arithmetic operations (addition,subtraction, multiplication, and division). Find x to the nearest tenth Guys help Im failing math this assignment is 100 points it will boost my grade find the equation to the line below acellus y= HELPPP WILL GIVE BRAINLIEST!!!Michelle weighs 90 pounds, which is 120% of what she weighed two years ago. How much did she weigh two years ago? A) 108 poundsB) 75 poundsC) 175 poundsD) 88 pounds Which organism described below makes its own food?yoo yoo ill rlly apriciate if someone helps me Please give me the correct answer.Only answer if you're very good at math.Please use the Pythagorean Theorem formula which is a^2 + b ^2 = c^2. Find the height of the pyramid.Volume Find the value of x. This passage, from the Anglo-Saxon Chronicle, tells about a Viking raid on the English region known as East Anglia.1010. After Easter this year the Viking army we spoke of before came to East Anglia. They landed at Ipswich and marched straight to where they had heard [the lord] was with his local forces . . . And the East Anglians ran off at once . . . The Danes held the battlefield. Then they got horses and afterwards took control of East Anglia, and plundered and burned the countryside for four months - they even went as far as the wild fens and killed men and beasts and set fires throughout the fens, and burned down Thetford and Cambridge and then turned south to the Thames . . . Then they turned back to their ships with their plunder. As they were going to their ships, the English army should have come back into the field to prevent them turning inland again. And that's when the English army went home . . . [A]ll the council was summoned to the king to determine how to defend the realm. But whatever was decided on did not last even a month. In the end, there was no leading man who was prepared to call up his forces. Everyone ran off and did the best he could.Why were the English unsuccessful in launching an attack against the Vikings?They did not have enough weapons to attack.They were too outnumbered to defend themselves.They could not agree on how to best defend the region.They decided to negotiate instead. (13) Which part of the digestive system is mainly responsible for absorbing water?A the large intestineB the pancreasC the small intestineD the stomach