1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
4 years ago
8

Why is technology seen as “a social obstacle

Computers and Technology
1 answer:
aliina [53]4 years ago
3 0

Answer:

Technology can be misused, and technology is very powerful. If it is achieved by an evil-minded human, that human can become a very big threat to the human race. And this can result in an insecurity feeling among the people. And that is why technology can be a social obstacle. However, it is also true that a society cannot flourish without technology. Like today, we are starving for a cure for Corona. A vaccine has been found but testing will need time. And hence, we are bound to opt for prevention. And we have lost so many out of us. If the vaccine would have been available, we would have been able to save them. And hence we cannot live without technology. The vaccine is a fruit of medicine technology. And I am sure we will soon have the vaccine for Corona available. However, for now we must adopt prevention option, and follow the government guidelines.

Explanation:

Please check the answer section.

You might be interested in
What do you think is the meaning of the saying "Sticks and stones may break my bones, but words can never hurt me"? Do think tha
Alchen [17]

Answer:

Thing will come at you but you need to let them pass and keep going.

Explanation:

I think that saying is true.

5 0
3 years ago
What can I do with this? Lol
nikitadnepr [17]
Do with what? If you have a question please contact me ;)
3 0
3 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Como se diz saia em inglês​
Montano1993 [528]

Answer:

I believe the translation would be "get out", but I'm not sure.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
    12·2 answers
  • Consider the following code segment:
    5·1 answer
  • Task:create a struct that looks like:typedef struct person{ int age; double height;} Person;Create an array of Persons. Read dat
    13·1 answer
  • What are some effects of the holocaust? She walked along the river until a policeman stopped her. It was one o'clock, he said. N
    8·1 answer
  • Problem 3. Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(
    5·1 answer
  • True/False: The American Standard Code for Information (ASCII) is a code that allows people to read information on a computer.
    9·2 answers
  • Necessary component of creativity
    11·1 answer
  • Write a program that takes a first name as the input, and outputs a welcome message to that name.
    9·1 answer
  • The one who will defeat me in this typing race I will mark the one brainliest:
    5·2 answers
  • How can a search be narrowed to only search a particular website????
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!