1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
10

Identify two areas of science or technology that make your life easier, safer, or otherwise better than your grandparents lives

were
Computers and Technology
1 answer:
vladimir2022 [97]3 years ago
8 0
Heres some:

Quantum computing
Machine Learning
Medicine
Aeronautical Engineering (Drones, better transportation)
You might be interested in
IPv4 addresses are managed and controlled by Internet Service Providers (ISPs) which operate on a local basis. As such, Internet
klio [65]

Answer:

The following statement is True.

Explanation:

Because the Internet Service Provider is the company that grants users to access the internet and It also controlled and manage the IPv4 addresses which are operated on a regional or a local basis. The map of all the incoming and outgoing Internet Protocol addresses between the ISPs is done by the IXPs(Internet Exchange Points).

7 0
3 years ago
The temperature in toronto canada was-4°c and tje temperature in brixton,england was 6°c warmer. what was the difference in temp
Oksana_A [137]

Answer:

It is 10°c difference between them

7 0
3 years ago
Each of the following programs has errors. Find as many as you can. 65. // Find the error in this program. #include using namesp
Serggg [28]

Answer:

There are two error in this program--

  1. In header file inclusion, file is not defined.
  2. In the statement "result = ++(num1 + num2);" , bracket is fixed after the increment operator.

Explanation:

  • For the first error, the user needs to add the file because "#include" is used to add the library for the program which states about the function and symbols used in the program.
  • The second error is because there must be a variable with the increment operator ( increment operator is being used to increase the value of a variable by 1), but there is a small brace fix in between the operator and operands.
7 0
3 years ago
A programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a s
Setler [38]

Answer:

Patent violation.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

In this scenario, a programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a solution that has already been granted intellectual property protection.

Hence, this is an example of a patent violation because she was not given the permission or rights by the intellectual property owner to modify the software.

4 0
3 years ago
A computer that is running Windows Server 2016 has scheduled backups every night. However, reports show that some of the compute
iren2701 [21]

Answer:

Answer to the following question is The DCS Properties of Schedule tab i.e "schedule Performance Monitor".

Explanation:

During the collection of the data and the creation of the data set, you have to configure the following schedule, firstly we have to open the property for the set of the data collector.

After the collection of the data and the creation of the data set, by clicking the right data collector name you can successfully scheduled the options in the MMC(Microsoft Management Console) pane and then you select the properties.

3 0
3 years ago
Other questions:
  • ____________ approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is o
    7·1 answer
  • What are the ethical implications of online social media after someone has died?
    13·1 answer
  • What's one way to engage teens in technology?
    8·1 answer
  • The file type blank identifies a word 2013 document
    12·1 answer
  • which part of a computer takes the text and picture on your on your screen and prints them onto paper ​
    7·2 answers
  • The roll out, roll in variant of swapping is used ____."
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly. How is it possible to access data from any location? Storing data
    12·1 answer
  • Mr. Stevens is the principal of a high school. Why might he want to export data from a database of students’ exam scores?
    14·2 answers
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!