1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
7

How has science fiction influenced technology

Computers and Technology
2 answers:
nadya68 [22]3 years ago
7 0
Well thinking of it people could've wrote books based of of technology because they would have facts and have a bit of the future
BlackZzzverrR [31]3 years ago
5 0
<span>www.smithsonianmag.com/science.../ten-inventions-inspired-by-science-fiction-1280...</span><span>this web address should answer your question</span>
You might be interested in
Buying an existing business
HACTEHA [7]
Goin to make great profit
8 0
3 years ago
)How to extract a specific element of item in a list?
pogonyaev

Answer:

List items are usually accessed using the indexing operator.

Explanation:

Depends on the language, and what you mean with extracting? Do you mean accessing or removing?

3 0
3 years ago
What does a transistor do?
mixas84 [53]

It Transmits electrical currents. You can use it as an amplifier or switch of currents.

5 0
3 years ago
Read 2 more answers
Why is it hard for some people to keep a promise even one that they make to themselves​
tresset_1 [31]

Answer:

Awww what happened? Sometimes its hard for me to keep a promise.

Explanation:

7 0
3 years ago
Read 2 more answers
Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha
Dennis_Churaev [7]

Answer: Answer below.

Explanation:

I'm not fully sure myself, so don't agree with me fully.

I believe what she may have done wrong is tell the technician about a "program." A program doesn't have to do anything with physical hardware.

5 0
3 years ago
Read 2 more answers
Other questions:
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • ____ is an iterative software development process that focuses on team productivity and delivers software best practices to all
    13·1 answer
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • Can someone please give me example of three types of loop in pascal (It has to has randomize in it too)
    15·1 answer
  • .In Python, comments begin with the comment marker and continue ______.
    14·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • How will you identify a file type on your computer?
    5·1 answer
  • Read the introduction (paragraphs 1-3].
    7·1 answer
  • Can i eat chicken and you shut
    14·2 answers
  • What types of company functions are aided by ERP?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!