1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
8

If you had a chance to see what your life would be like in 20 years

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
8 0
I meaaaannnn in my opinion to me there just no future for me anymore ٩( ᐛ )و

But I mean if I was to be alive somehow, I would say, coronavirus is gone perhaps, but now there some bigger issue going on?

That’s my opinion ︎
You might be interested in
Describe the inter-relation and linkage in between traditional knowledge, indigenous knowledge and modern technology.​
xz_007 [3.2K]
Traditional knowledge is knowledgeable u know
5 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
4 years ago
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
kramer

Explanation:

1

Ex: If the input is:

z Today is Monday

the output is:

0

Ex: If the input is:

n It's a sunny day

the output is:

2

Case matters.

Ex: If the input is:

n Nobody

the output is:

0

n is different than N.

Learning Python

8 0
3 years ago
Read 2 more answers
What are two specific Netstumbler features that are related to cybersecurity? Name one feature that is related to improving cybe
NikAS [45]

The feature that can improve cybersecurity is the detection of interferences, and the one that can be used by hackers is checking the configuration of networks.

Netstumbler is a program used to identify surround wireless networks. This program is mainly available for Window systems and includes the following features:

  • Detecting wireless networks.
  • Detecting interferences.
  • Checking the configuration of networks.

These features have both a positive and a negative side as they can be used to increase cybersecurity, which is positive, but they can also be used by hackers to attack networks and the devices in them.

One positive feature is the detection of interferences because this can be used to detect possible external or threatening networks. On the other hand, checking the configuration can be a negative feature because hackers can use this information to enter and hack the networks.

Learn more in:  brainly.com/question/17021829

4 0
3 years ago
Other questions:
  • Assume that the system has a multiple level queue with a variable time quantum per queue, and that the incoming job needs 80 ms
    14·1 answer
  • Which of the following is real job title on the interactive media career pathway?
    12·2 answers
  • Complex machines are defined by...
    14·2 answers
  • Hidden-surface removal is the process of:
    14·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
    14·1 answer
  • 18. Hard skills can be used on almost any job. (3 points)<br> A. True<br> B. False
    13·2 answers
  • Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fai
    12·1 answer
  • What tasks should a laptop accomplish?
    15·1 answer
  • How am i supposed to add subtitles to a video without have to waist money???
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!