1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
12

Are we too dependent on technology if yes then can you please explain?

Computers and Technology
2 answers:
CaHeK987 [17]3 years ago
7 0
I also agree with yes. We rely on technology for almost everything, including:
-Automatic car wash
-Email
-Online shopping
-Social network
-‘This app’
-Vending machine
-Self serve checkouts

People rely on technology as it makes our lives easier. Technology has changed the world, and has also impacted the amount of work we do.
Veronika [31]3 years ago
3 0
Yes, I believe we have become too dependent on technology. For example, many people will go straight to their phone to do simple math than use calculators. People can't even read a map anymore because of GPS systems. 
You might be interested in
Read the following scenario:
Fofino [41]

Answer:

I think it is the second answer choice honestly

Explanation:

I'm gonna say either the first one or second one because the word film has something to with behind the scenes work not being an actor.

8 0
3 years ago
Read 2 more answers
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
MegaCorp MegaCorp is large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories i
Ivenika [448]

Answer:

Recommended is frame relay architecture with a local loop at each factory supporting the frame relay service connection to the network provider's POP

Explanation:

Frame Relay can be seen as WAN protocol that is said to often operate at both the physical and data layers link of the OSI reference model due to it high-performance and due to the fact that FRAME RELAY are as well use across Integrated Services Digital Network (ISDN) interfaces in which they are designed for cost-efficient data transmission in order to enable effective intermittent traffic between local area networks (LANs) and endpoints in wide area networks (WANs) which is why frame contains all the information necessary to route it to the correct destination.

Therefore type of BN and WAN architecture and WAN service i would recommend based on the above information is FRAME RELAY ARCHITECTURE with a local loop at each factory supporting the frame relay service connection to the network provider's POP.

8 0
3 years ago
What are Layers in computer class 7. no scams please​
Bad White [126]

Answer:

This is your answer please check this ✔

7 0
3 years ago
Read 2 more answers
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
Other questions:
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • Don't pat any attention to this
    7·2 answers
  • Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in
    5·1 answer
  • Which of the following is true about images that are arranged in a collumn
    9·1 answer
  • What does the merge & center button in the alignment group on the home tab do?
    8·1 answer
  • Which of the following pathways relates to the Architecture and construction career cluster
    7·1 answer
  • How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
    14·1 answer
  • List five application programs you recommend, and write a sentence explaining why.
    9·1 answer
  • How does the autosum command calculate data? Need help ASAP​
    5·1 answer
  • true Or False 1. Computer Time is located in Start Menu, b. Ms Word is developed by Adobe Corporation c. Ms-Excel is Presentatio
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!