Suppose you decided to try and make computers more ‘human’ and introduce the ‘random element.’ How would you do that?

What will be an ideal response?


It is possible to make computers random in the sense that we can create random numbers and then use a random number as a means of choosing the outcome of a decision; that is, creating a random element. Random numbers can be generated by taking random noise and converting it into 1s and 0s (random noise is the background hiss present on some radio signals). Random numbers can also be created mathematically by starting with a seed (an initial number) and then applying successive mathematical operations to create a sequence of numbers that appear to be random. These are called pseudo?random numbers because the same seed always generates the same sequence.

It would be possible to model some aspects of human thought processes by using random numbers to ‘make a guess’; for example, to model a decision that is 90% certain you could create a random number in the range 0.0 to 1.0 and then take the decision if the random number is less than 0.9. This speculation belongs to the world of artificial intelligence.

Computer Science & Information Technology

You might also like to view...

What is the correct total time?

What will be an ideal response?

Computer Science & Information Technology

Access gives you the option of printing database reports. Please describe the types of information database reports often include.

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 4-1Tatiana is building out the details of her project in Resource Sheet view for the first time, so she turns to her colleague Angela for help with the trickier aspects of the work.The photographer Tatiana has hired charges by the day. What does she need to do in the Resource Sheet view to accommodate this?

A. Change the Base Calendar to the daily calendar. B. Enter "per day" as the Cost/Use value. C. Override the Std. Rate default with the /d setting. D. Nothing: this is the default setting.

Computer Science & Information Technology

When running ADMT, if the source and target domains are in different forests, you must configure _______________ between the domains in use to ensure data security during the migration process

a. Trust relationships b. Global catalogs c. Email accounts d. New users

Computer Science & Information Technology