1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
4 years ago
7

____ is the phase of a technology cycle characterized by technological substitution and design competition. question 9 options:

technological adaptation
Computers and Technology
1 answer:
lilavasa [31]4 years ago
6 0
Innovation streams is the answer i believe


You might be interested in
Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
Neko [114]
The answer is the second answer Increasing the size of the wire.
8 0
3 years ago
The fact that the impact of changes in the elements making up an IT (software) project are not proportional or intuitive is rela
Furkat [3]

Answer:

Multidimensionality

Explanation:

Multidimensionality is the ability to exhibit many diverse characteristics thereby giving programs the ability to manipulate the storage and presentation of data in various ways without disrupting the integrity and reliability of the data. It is very important that users have the capability to customize and change their views of data and user information to suit their specific needs and allow users to carry out any type of analysis within the database.

5 0
3 years ago
Reference variables allow arguments to be passed by ____________.
son4ous [18]

Answer:

Reference

Explanation:

The Reference type variable is such type of variable in C# that holds the reference of memory address instead of value. Examples for reference type are classes, interfaces, delegates and arrays.

We can pass parameters to the method by reference using <em>ref </em>keyword

It’s mandatory to initialize the variable value before we pass it as an argument to the method in c#

For example,

int x = 10;  // Variable need to be initialized

Add(ref x); // method call

If you pass parameters by reference in method definition, any changes made to it affect the other variable in method call.

Here's a sample program:

using System;

namespace ConsoleApplication

{

   public class Test

   {

       public static void Main()

       {

           int i = 10;

           Console.WriteLine("i=" + i);

           Add(ref i);

           Console.WriteLine("i=" + i);

           Console.ReadLine();

       }

       public static void Add( ref int j)

       {

           j = j + 10;

           Console.WriteLine("j="+j);

       }

   }

}

Output:

i=10

j=20

i=20

7 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the docum
nordsb [41]
Your answer would be D,
7 0
4 years ago
Other questions:
  • How to set up a paper format in any type of Microsoft version ????
    11·1 answer
  • Which utility would you use to return the common name of the computer you're at? Execute this command and submit screen shots.
    11·1 answer
  • Write a java program that declares an array "alpha" of 50 elements of type "double". Initialize the array so that the first 25 e
    11·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • Can I get some help thank you
    8·2 answers
  • E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
    8·1 answer
  • The data set monarch from Computer-Active Data Analysis by Lunn andMcNeil (1991) contains the years lived after inauguration,ele
    9·1 answer
  • As an IT specialist you are asked to troubleshoot a problem with two
    14·2 answers
  • The meaning of belt drives
    10·1 answer
  • Write a program that calculates pay for either an hourly paid worker or a salaried worker Hourly paid workers are paid their hou
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!