1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
6

Question 2 Unsaved Which of these is NOT an example of an emerging technology? Question 2 options: Sixth Sense Close Range Drone

s Toy Tiles Microsoft's New Envisioning Center
Computers and Technology
1 answer:
alexandr1967 [171]3 years ago
3 0

The answer is <em>B.) Close Range Drones</em>

I just took the test

You might be interested in
What does in-private or incognito browsing do?
Aleks04 [339]

All it does it let you browse the internet, but whatever you look up, it isn't put on your browser history.
5 0
3 years ago
What does Stand for in web design
myrzilka [38]

Answer:

g

Explanation:

h

7 0
3 years ago
What are parts of the prewriting process
Rainbow [258]
The prewriting process should include brainstorming a topic, deciding on which topic on which to write, research of a topic, organizing the research into a comprehensive whole. Check out an APA style textbook, should be available at the library, and it should have more results in the prewriting process. Of course, the writing process itself depends on the individual and his or her cognitive process on writing.

6 0
3 years ago
Read 2 more answers
Which of these options highlights the need for learning algorithms
LiRa [457]

Answer: D.

Explanation:

7 0
3 years ago
Read 2 more answers
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
4 years ago
Other questions:
  • Which of the following are types of formatting you
    12·2 answers
  • 13. The Save As command is useful if you want to copy an open document and
    7·2 answers
  • Professional photographers often use the lowest quality settings on their cameras since this can be reversed in Photoshop.
    7·2 answers
  • [17 PTS] What do you think of puzzle games?
    11·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • Do you think communities or countries can survive without the internet?why or why not?​
    11·1 answer
  • The maximum number of characters that a cell can contain is
    11·2 answers
  • Analog computers are general purpose computers : true ? or false ?​
    8·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
  • Explain how communication facilitate cordination​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!