Which field uses computer programs to automate tasks so that they can be performed better than by humans ?
Bioinformatics

Robotics


Telecommunications

Network administration

Answers

Answer 1

The field uses computer programs to automate tasks so that they can be performed better than by humans is known to be Robotics.

Which field uses computer programs to automate tasks?

Robotics is seem as a field of engineering that is known to be based on the design and making of robots.

Note that Robots are often used to carry out tasks that are said to be hard for humans to perform and as such, the field uses computer programs to automate tasks so that they can be performed better than by humans is known to be Robotics.

Learn more about Robotics from

https://brainly.com/question/13515748

#SPJ1


Related Questions

My monitor, every time I try to turn it on says this "reboot and select proper boot device or insert boot media in a selected boot device and press a key" I've already tried to press all the keys to enter BIOS but since before this problem happened I enabled ultra-fast boot so it doesn't give me time to press any of them and I don't know what to do I've seen so many videos and I just can't find any that could possibly help me

Answers

You may have a corrupt system or your hard drive may be loose. (it used to be a common issue for me when I upgraded my computer to SSD, that computer is only used for backup purposes)

Although Access does not have stored procedures, you can achieve some of the same benefits with _____.

Answers

The benefits of storing procedures can be achieved with; Indexes

What are Indexes?

You can use an indexes to help Microsoft Access find and sort records faster. An index stores the location of records based on the field or fields that you choose to index.

Finally, After Microsoft Access obtains the location from the index, it can then retrieve the data by moving directly to the correct location.

Read more about Microsoft access at; https://brainly.com/question/1538272

what is destination email address​

Answers

Answer:

Explanation:

The E-mail Destination allows you to send data from your forms in text format to various different email addresses.

which choice is not a form of antivirus scanning that compares known virus patterns to scanned files

Answers

The choice that is not a form of antivirus scanning that compares known virus patterns to scanned files is called; Heuristic scanning

Antivirus Detection

The correct answer is Heuristic Scanning from the options seen online. This is because Heuristic scanning is a method utilized by many computer antivirus programs to detect previously unknown computer viruses, as well as new variants.

Thus, heuristic scanning doesn't compare known virus patterns to scanned files.

Read more about antivirus detection at; https://brainly.com/question/17209742

You start the line with a

Answers

Answer:

what line

??????

Explanation:

Why won't this program work? I have no solution for this.

LANGUAGE: Python, CodeHS; 4.11.4: Snake Eyes

Answers

Explanation:

hope it helps,Godbless

A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date, time, and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?
a. Determining the chronological order of the photos.
b. Determining the number of clouds in a particular photo.
c. Determining whether a photo is suitable for printing in black-and-white.
d. Determining whether two photos were taken at the same location on different days.

Answers

Analyzing the metadata would be more appropriate than analyzing the data when: determining the likelihood that the photo was taken at a particular public event.

What is a data?

A data can be defined as a representation of instructions or information in a formalized manner, especially as a series of binary digits (bits).

What is a metadata?

A metadata can be defined as the data that provides information about one or more aspects of a given data, so as to provide a structured reference that helps to sort and identify all of its attributes such as:

AuthorDate createdDate modifiedFile typeFile size

In this scenario, analyzing the metadata would be more appropriate than analyzing the data when determining the likelihood that the photo was taken or created at a particular public event.

Read more on data here: brainly.com/question/25558534

Which of the following groups on the Home tab contains the commands to insert delete and format cell width and height? Question 1 options: Styles Cells Editing Number.

Answers

The cells feature is used to format the cells. The features in this section are insert, delete, and format cells. Cell size can be edited using this section.

What are the features available on the home screen of excel?

Excel is a tool that is used to create sheets or tables to show data. It is capable of performing some complex tasks also. The home screen of excel contains many features.

Some of the features are:

Font: It is used to format the style and size of the characters. It also includes bold, italic, etc formattings.Alignment: This feature is used to align the text in the cells. The option included in this are merge cells, wrap text, center/left align, etc.Style: It is used to format or design the table or group of cells. it includes features like conditional formatting, format as a table, cell style.Cells: Cells feature is used to format the cells. The features in this section are insert, delete, and format cells. Cell size can be edited using this section.Editing: It is used to edit or use filter in the cell or cells.Number: This section defined the type of content present in the cell and its significant figures. The common types are currency, number, date, time, etc.

Therefore, The cells option has the commands insert, delete, and format options.

Learn more about excel here:

https://brainly.com/question/25879801

The ____ reads the MSIL code and causes the program instructions to be executed. a. ARD b. RAD c. CLR d. CAD

Answers

the clr reads and executes

hope this helps

scav

how does the x-ray involve with science, technology, math, and engineering

Answers

Answer:

hope it helps

Explanation:

engineering: to show flaws that cannot be detected by bare eye

technology: to automatically control the density or thickness of layers of substance

science: to generate images of tissue and structure inside the body

Which of the following keyboard shortcuts should be pressed to hide the columns which are selected in a worksheet? Question 2 options: Control 7 Control 9 Control 0.

Answers

Answer:

control 0

Explanation:

did the quiz on quizzes

Answer: control 0

Explanation: I saw a chance to get 10 points and took it.

What is the size of BIOS?

Answers

Answer:

The size of BIOS is 32 megabytes

Answer:

32 megabytes

Explanation:

how to write an algorithm to find area and perimeter of diamond .

Answers

Find the area of both triangles with 1/2•base•height then add them together

What device is used to centrally connect multiple devices on the local network and transmit data to the correct location

Answers

Answer:

The correct answer is the hub. An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment

Explanation:

Which of the following is not harmful to the computer?
a) Trojan
b) Rootkit
c)Malware

Answers

Answer:

rootkit

Explanation:

because Trojan and malware will both harm your computer trust me

you can turn the Caps lock key on, and that will give you a more _______ curser.

Answers

accurate

hope this helps

scav

write any four commandment of ICT user​

Answers

Explanation:

1) Thou shalt not use a computer to harm other people:

2) Thou shalt not interfere with other people's computer work:

3) Thou shalt not snoop around in other people's files:

4) Thou shalt not use a computer to steal

Darla is going to start writing the HTML code for a web page. What would she start with?

Answers

Answer:

opening

Explanation:

Your answer would be opening

An individual owns a dog grooming business and must pay self-employment tax on individual earnings.
Which type of legal structure makes self-employment tax a relevant concern?
Limited Liability companies C-Corporation
OS S-Corporation
Sole-proprietorship​

Answers

The type of legal structure that makes self-employment tax a relevant concern is a sole proprietorship. It involves one single owner.

What is a sole proprietorship?

The term 'sole proprietorship' refers to a type of business where there is one single owner.

In a sole proprietorship, the personal owner must pay income taxes depending on the amount of money he/she earned.

The sole proprietorship businesses are very common and this type of business increased in the last years.

Learn more about sole proprietorship here:

https://brainly.com/question/4442710

If you want to join all of the rows in the first table of a SELECT statement with just the matched rows in a second table, you use what kind of join

Answers

Answer:

An inner join.

Inner join combines matching rows from 2 tables at one time, so that is the reason I chose this join.

How to reset apple watch after too many passcode attempts.

Answers

Answer:

"Press and hold the Digital Crown, then tap Reset. After the reset finishes and your Apple Watch restarts, you need to pair your Apple Watch with your iPhone again—open the Apple Watch app on your iPhone, then follow the instructions shown on your iPhone and Apple Watch."

Explanation:

How to reset apple watch after too many passcode attempts is mentioned below.

What is passcode ?

A passcode is a string of digits or letters that is used to protect access to a computer, an account, or data. It serves the same purpose as a password but usually only has a short string of digits, making it simpler to enter on gadgets with constrained input options, like a smartphone or tablet. Typically, a passcode is used to unlock a device, grant access to a specific app or feature, or verify a user's identity when making a purchase. To increase security and prevent unauthorized access, passcodes are typically set by the user and can be changed as needed.

Here's a step-by-step process to reset an Apple Watch after too many passcode attempts:

Put your Apple Watch on its charger and make sure that it has a charge.

On your iPhone, open the Watch app.

Tap the My Watch tab, then tap your Apple Watch at the top of the screen.

Tap General, then tap Reset.

Tap Erase Apple Watch Content and Settings.

Enter your Apple ID password, then tap Turn Off.

Wait for the process to finish.

After the reset is complete, you'll need to pair your Apple Watch with your iPhone again and set it up as new.

Note: If you can't reset your Apple Watch using the above steps, you may need to use the Apple Support website or contact Apple support for assistance.

To know more about passcode check:

https://brainly.com/question/14637277

#SPJ6

Phoebe is a Counselor who is trying to schedule a meeting with one of her patients. Which best describes an inappropriate location for a meeting with a patient? a private office a hospital cafeteria a treatment center a family consult room.

Answers

Answer: a hospital cafeteria because there is no privacy and the patient may feel uncomfortable and it can be too noisy

Explanation:

B hospital cafeteria


Explanation:

I took the test

Which tab on the ribbon contains the function library?.

Answers

Answer:

Formulas Tab

Explanation:

You can view excel functions library and defined names.

The ______ tab is a contextual tab and displays only when media content on your slide is selected

Answers

The complete statement is:

The Table Tools tab is a contextual tab and displays only when media content on your slide is selected

How to determine the tab

There are several tabs in Microsoft Office packages

Some of these tabs include

Home Page layoutReview and ViewEtc

Of all the available tabs in these packages, the table tool tab is contextual.

This is so because it is not display unless the media is selected

Read more about tabs at:

https://brainly.com/question/14139335

Tim would like to send a confidential, encrypted message to Kellie using asymmetric cryptography. What key should Tim use to create the message?

Answers

Tim uses the public key is used to create the message

Asymmetric cryptography

Asymmetric (public key) encryption allows the sharing of an encrypted message without a shared secret key. Public key encryption uses two keys, one public and one private. To send a message, asymmetric algorithm with the public key is used to create the message while the private key is used for the message decryption. The encryption function can only encrypt data.

Find out more on Asymmetric cryptography at: https://brainly.com/question/4357828

Please help I have to turn this in immediately!!!​

Answers

Answer:

"This cipher is pretty simple" is sadly the answer. :)

Explanation:

When using a Polybius cipher, one letter is 2 numbers.

11 = A

21 = F

31 = L

41 = Q

51 = V

and so on!

So to say the word question you would use the number sequence: 4145154344243433
to solve, add spaces

41 45 15 43 44 24 34 33

and find corresponding spots on the table/grid.

I hope this was helpful!

Compare and contrast the use of magnetic tapes with removable magnetic disks to make network server backups. [4] ICT IGCSE​

Answers

Answer:

Magnetic Tapes and Magnetic Disks are the types of magnetic memory. Both are called non-volatile storage and used to store data.

Magnetic tape contains thin plastic ribbon is used for storing data. It is a sequential access memory. So the data read/write speed is slower. It is mainly used for data backups.

Explanation:

be happy

You want to determine the total amount of data stored on a server.User A has 3550 GB of data stored on the server.User B stores 4000 GB of data.User C stores 2450 GB.User D stores 1010 GB of data.User E stores 7000 GB of data on the server.Without using a calculator, use the properties of operations to determine the total amount of data stored on the server.
A. 1801 GB
B. 18,010 GB
C. 19,010 GB
D. 1901 GB

Answers

For a fact it’s B because I’m smart

Answer:its b

Explanation:

Emma opened a new document on Microsoft Word and typed her assignment. She is now planning to save the document for the first time. Which function key can she use to save the document

Answers

Answer:

ctrl+s

Explanation:

By hitting the ctrl key at the same time as the s key on the keyboard she can save the document

A list block can be defined under another list is called as _ list

Answers

Answer:

Nested list is the term used to define it..

Answer:

Nested

Explanation:

Your answer is A list block can be defined under another list is called as NESTED list.


I hope it helps! Have a great day!

Lilac~

Other Questions
Please just state if they are agasent, supplementary, or neither!!! I need nothing else!!! When a species consisting of a single large population slowly evolves over many generations into a new species, this an example of:. How did Eugene Talmadge come back into power? A car drives at a velocity of 6.8 m/s for 250 seconds. How far did it travel? What is the slope of the line on the graph below? why is the xo laptop cover in a plastic case Staying motivated tips for success include:(check all that apply) a)keep your eye on your long-term goals while working toward immediate goals. b)break large projects down into smaller tasks or stages. c)plan ahead to avoid last-minute pressure. d)Multitask. What was the issue with Missouri becoming a state? Why might an effective rent control actually increase homelessness in a city?. The first three terms of a sequence are given. Round to the nearest thousandth (if necessary).15,9, 5/27, ...Find the 10th term. Which two numbers is 28 (square root) between?A. 5.0 and 5.1B. 5.2 and 5.3C. 5.4 and 5.5D. 5.6 and 5.7 Cancer (uncontrolled mitosis) is caused by mutations in:a. Proteins b. Nucleic Acids c. Lipidsd. Carbohydrates (50pts) Brainliest to correct answer How did the population of European immigrants in America change in the late 1800s and early 1900s. Question 9 options:A) Most immigrants came from eastern and southern Europe. B) The number of European immigrants decreased.C) The number of Protestant immigrants decreased. D) There was not an increase of immigrants. pls help me I'll give brainliest to the person with the correct answer Why might studying chemistry lead to a better understanding of biology Which excerpt from "good country people" is the best example of figurative language? the reason for her keeping them so long was that they were. . . Good country people. Mr. Freeman was a good farmer but that his wife was the nosiest woman ever to walk the earth. She would make these statements, usually at the table, in a tone of gentle insistence as if no one held them but her. Mrs. Hopewell had no bad qualities of her own but she was able to use other peoples in such a constructive way that she never felt the lack. Write short note on:Exponential growth function of population projection. What is the law of conservation of mass?A. The total mass of materials present after a chemical reaction is the same as the total mass present before the reaction.B. In a given compound, the relative numbers and kinds of atoms are constantC. If two elements A and B combine to form more than one compound, the masses of B that can combine with a given mass of A are in the ratio of small whole numbers.D. Each element is composed of extremely small particles called atoms. A farmer bought a goat for Rs 15000 and cow for Rs 35000. if he sold the goat at 10% profit and cow at 20% loss, find his profit or loss percent in whole transaction What was the conflict between the u.s. and japan that led us to war