1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
7

How has science fiction influenced technology

Computers and Technology
2 answers:
nadya68 [22]3 years ago
7 0
Well thinking of it people could've wrote books based of of technology because they would have facts and have a bit of the future
BlackZzzverrR [31]3 years ago
5 0
<span>www.smithsonianmag.com/science.../ten-inventions-inspired-by-science-fiction-1280...</span><span>this web address should answer your question</span>
You might be interested in
Communication competence is _____.
posledela
Communication competence is the ability to interact with others in a manner that is honest and appropriate for the situation, individuals, and task.
5 0
3 years ago
If your teacher is out of the office, what is the best way to reach them, or get help?
liberstina [14]
Send your teacher a portal message, or call them.
8 0
3 years ago
Like this post if u hate edhesive
Charra [1.4K]

Answer:

I hate Adhesive.

Explanation:

Adhesive is something of or relating to the molecular force that exists in the area of contact between unlike bodies and that acts to unite them. And that is just ridiculous.

5 0
3 years ago
It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half op
solong [7]

Answer:

SYN flood attack.

Explanation:

Doing this is a symptom of an SYN flood attack. Attackers performing this type of DoS attack will try and open as many connections as possible but never fully finish the connection. This ultimately causes the system to use all of its computing power to try to resolve these failed connections which would cause the system to crash or become unresponsive. Therefore, denying service to potential clients if done correctly. This is just one of the many types of DoS attacks that exist.

8 0
3 years ago
What type of stud is placed below a windowsill to support its weight
Vesnalui [34]
A <span>cripple stud is what is use for windows and doors 

</span>
6 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Write a Python function called validateCreditCard that takes 8-digit credit card number as the input parameter (string value) an
    8·1 answer
  • Select all that apply. To assist in document sharing, you should?
    12·2 answers
  • Justify the statement "The same job title can have different job roles and different qualification criteria in different organiz
    7·1 answer
  • 2. Name the three building blocks of design that pertain to form.
    7·1 answer
  • Displays unsolicited advertisements in banners or pop-up windows
    5·1 answer
  • What device connects a lan's switch to the next network? qizzlets?
    5·1 answer
  • PLEASE HELP WILL GIVE BRAINLIEST!!!’
    15·1 answer
  • Inappropriate use of technology makes it easier for cyber bullies to <br> others.
    13·2 answers
  • A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, sav
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!