Trust and autonomous machines

Assignment Help Basic Computer Science
Reference no: EM131549328

Your Aunt Elda, who is 89 years old and lives on her own in a small apartment, is in declining health. She is at the point where she will soon need full-time professional assistance/care, but she is unable to afford the cost of live-in help. Unfortunately, Aunt Elda has no immediate family members or relatives who are able to provide her with the kind of around-the-clock care she will need or to help with the ?nancial expenses for professional care/assistance.

However, a friend tells you about a robotic companion, ElderBot-designed to assist and serve as a companion to the elderly-that would be able to provide the kind of assistance your aunt will soon require. 

Fortunately, you have the money to purchase this robotic companion/care giver for your aunt. 

But you have some reservations about whether you can entrust your Aunt's care to this robot.

1. Faced with the dilemma of either being able to do nothing to assist your aunt or providing her with an ElderBot, what would you do?

2. As you deliberate, consider some of the concerns we discussed regarding trust and autonomous machines (in Section 12.5.2).

Reference no: EM131549328

Questions Cloud

Describe the gpos feature using relevant technical terms : Describe the GPOS feature using relevant technical terms and topic-related details.How the absence of this GPOS feature impacts a business such as TSI.
Configure packet analysis tool to analyze wireless traffic : Configure your chosen packet analysis tool to analyze wireless network traffic. Only capture legally permissible traffic such as your own home wireless traffic.
Relationship between blocks and sectors : The disk is not "zoned." What is the total capacity of this disk? Show your work. (Hint: what is the relationship between blocks and sectors?
What personal quality or life experiences set from applicant : What personal qualities or life experiences set you apart from the other applicants? How do you feel that these qualities or experiences will enable.
Trust and autonomous machines : As you deliberate, consider some of the concerns we discussed regarding trust and autonomous machines (in Section 12.5.2).
How each one fits into a risk management strategy : Create a written report consisting of at least three pages in which you describe the purposes and benefits of each one, the challenges involved in creating.
Entities deserve moral consideration : Assess the arguments we examined for whether we need to expand our conventional moral framework to include at least some AI entities?
Pros and cons of online communities : Describe some pros and cons of online communities.
Write a paper discussing role the computer security act play : Research the following laws that relate to computer crime. Write a 12-16 page paper discussing the role The Computer Security Act play in computer crime.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Elements of risk that you feel need

Choose between a private corporation, government entity, or University and describe three elements of risk that you feel need to be managed on a day-to-day basis. Be sure to define why risk management needs to be in place and what counter measures..

  Write a function called codeit that takes a string txt

It replaces each 'a' with 'z', each 'b' with 'y', each 'c' with 'x', etc. The function must work for uppercase letters the same way, but it must not change any other characters. Note that if you call the function twice like this str = codeit(codei..

  Conduct a chi-square test using r''s chisq.test command

Two students went to a local supermarket and collected data on cereals; they classified cereals by their target consumer (children versus adults) and the placement of the cereal on the shelf (bottom, middle, and top). The data are given in Cereals..

  Threaded program for computing the sieve of eratosthenes

Write a threaded program for computing the Sieve of Eratosthenes. Think through the threading strategy carefully before implementing it.

  Mainframes are perceived as being more robust

QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False

  Additional and changed business requirements

Modify the Week Three Java application using NetBeans IDE to meet these additional and changed business requirements:

  Program on a completely dedicated machine

What are the four steps that are necessary to run a program on a completely dedicated machine?

  Disclosure of a vulnerability by an independent technical

What are the legal and ethical issues governing the disclosure of a vulnerability by an independent technical person (e.g., cyber researcher).

  Differences between systems and os

Describe the steps in troubleshooting, differences between systems and OS (s) and outline safety proceduresInstructions:

  Draw the symbol including outlines of the letters s and i

Draw the symbol, including the outlines of the letters S and I; then use the SOLID command to fill in the letters.

  Why do some block cipher modes of operation only

Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

  A firm is assigned the network part

A firm is assigned the network part

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd