Question

In: Accounting

what emerging technology do you find most interesting/exciting? since we've discussed that risks accompany the use...

what emerging technology do you find most interesting/exciting?

since we've discussed that risks accompany the use of emerging/newer technology, what do you see as the greatest risk from the emerging technologies discussed in your reading?

Solutions

Expert Solution

I find  artificial intelligence most interesting

ArtificiaL intelligence is the abiltiy to use memory , knowlwdge , experience , understanding , reasoning , imagination and judgement to solve problems and adapt to new situations . the ability described above when exhibited by machines is called a s artificial intelligence , it is intelligence exhibited by machines

the risks are

1) Artificial intelligence relies heavily data it gets. incorrect data can lead to incorrect conclusion

2) Artificial intelligence carries a security threat . countries are discussing to have a KILL button in artificial intelligence capable machines . This is important otherwise someday machine may start controlling humans

3) Artificial intelligence in long term may kill human skills of thinking the unthinkable . all data should be processed in a structured manner , where machine should provide solution based learning over a period of time . these machines shall not have capability of thinking out of box


Related Solutions

What technology out there do you find the most exciting and interesting currently? Why? What interests...
What technology out there do you find the most exciting and interesting currently? Why? What interests you the most about it? It can be in any area... medicine/health, space exploration, robotics, food, etc.
What managerial accounting concept or procedure did you find most interesting? Most challenging? How do you...
What managerial accounting concept or procedure did you find most interesting? Most challenging? How do you see yourself using managerial accounting in the future?
what cultural development of the 1920s do you specifically find the most interesting and important? Why...
what cultural development of the 1920s do you specifically find the most interesting and important? Why was this cultural change a great departure from past American culture? Is this cultural manifestation still affecting modern Americans and how?
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity?
  What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity?
  What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
WHAT do you think is the most exciting breakthrough or discovery in ECOLOGY in the past...
WHAT do you think is the most exciting breakthrough or discovery in ECOLOGY in the past 100 years and WHY do you think this discovery is so exciting? Note: the breakthrough must be somehow related to some field of ECOLOGY (such as population ecology, community ecology, ecosystem ecology, landscape ecology, behavioral ecology, physiological ecology, etc.), not just biology generally or environmental science (which is a different field than ecology!!). In addition, it should also be an ecological "discovery," not a...
What specific concepts from the ones listed below do you find the most interesting and/or impactful...
What specific concepts from the ones listed below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Applications of Cryptography and PKI Trust relationships Password guessing / cracking Public Key Infrastructure Certificates Key Management (creation, exchange/distribution) Common Cryptographic Protocols Types of Attacks (brute force, chosen plaintext, known plaintext, differential...
What specific concepts from the ones listed below do you find the most interesting and/or impactful...
What specific concepts from the ones listed below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Applications of Cryptography and PKI Trust relationships Password guessing / cracking Public Key Infrastructure Certificates Key Management (creation, exchange/distribution) Common Cryptographic Protocols Types of Attacks (brute force, chosen plaintext, known plaintext, differential...
What do you find most interesting about the development and possible effects/benefits of attachment of children...
What do you find most interesting about the development and possible effects/benefits of attachment of children and why?
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain...
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Threats and Adversaries (threat actors, malware, natural phenomena) Common Attacks Malicious activity detection / forms of attack Appropriate Countermeasures Legal issues Attack Timing (within x minutes of being attached to the net) Covert Channels Social...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT