1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
4 years ago
15

What will modern technology be like in 20 years

Computers and Technology
1 answer:
FinnZ [79.3K]4 years ago
4 0
Your answer is A if I’m not mistaken
You might be interested in
Compare and contrast the various write strategy used in cache technologies<br>​
scZoUnD [109]

Answer:

The abiotic factors are non-living factors in an ecosystem that affect the organisms and their lifestyle. In this case, low temperature and low humidity lead to the conditions that are unfavorable for birds. So, the birds must adapt to these factors by hiding the food in the caches.

Explanation:

8 0
3 years ago
is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
AnnZ [28]

Answer: Bandwidth....

6 0
3 years ago
The most important criteria of a good tracking method is that it is ______. a. Comfortable b. Computer compatible c. Portable d.
AnnyKZ [126]

Answer:

Comfortable

Explanation:

The most important criteria of a good tracing method is that it is comfortable. because, if you are not comfortable you cannot pay head to their work properly.You cannot made decision and you can also not to recognize your improvements during tracking.

8 0
4 years ago
Read 2 more answers
Two organizations cannot have the same name for a computer true or false
liberstina [14]
The answer is False.  Two organizations can have the same name for a computer.  <span>Both </span>computers may<span> have the </span>same name<span>, are on the </span>same<span> subnet, and are on the </span>same domain<span>. But each </span>computer<span> has a unique IP address.</span>
4 0
3 years ago
3n - 12 = 5n - 2<br> how many solutions?
Luda [366]
N=-5 sry about the other guy stealing
6 0
3 years ago
Other questions:
  • Which of the following payment types require you to pay upfront? AMoney orders &amp; credit cards BMoney orders &amp; pre-paid c
    9·1 answer
  • Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
    14·2 answers
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Which of the following is something you need to keep an eye out for
    7·2 answers
  • This method of advertising is expensive but can be the most effective method.
    15·1 answer
  • You are an ISP. For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there
    6·1 answer
  • 9
    10·1 answer
  • central, secure database in which Windows stores hardware and software configuration information and system security policies is
    12·1 answer
  • The term that refers to the standard computer language for creating web pages is called:
    6·1 answer
  • "Use onblur and onfocus to add red borders to the input elements when the user leaves without any input, and a green border if a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!