1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
8

What technology has had the most significant influence on engineering?

Computers and Technology
1 answer:
egoroff_w [7]3 years ago
6 0
Probably a computer has had the most significant influence on engineering.
You might be interested in
Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
UkoKoshka [18]

Answer:

The answer is " Run the software on the original web browser practically".

Explanation:

The Virtual servers enable you to run programming not programmed to the devices. Let's all presume which Henry's software will operate on computers but not on the mac. Since Mac is unable to run this software, it can practically install Linux on MC and install this.

  • The several common software applications such as parallels, VMware, and Virtual machines could be practically used during mac to install windows.
  • Its platform operating system from a macOS software perspective is a true physical computer with almost everything set.
5 0
3 years ago
Which if the following is an effect of intellectual property theft?
Leno4ka [110]
Record companies lose money because people download songs for free.
8 0
3 years ago
Read 2 more answers
Which of the following is not a true statement? You can import a table or a query directly from an Access database into an Excel
Lilit [14]

Answer:

does anybody know this answer?

Explanation:

no nobody does

5 0
4 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
4 years ago
What option would you choose in order to store the database on a dedicated sql server?
Ganezh [65]
<span>Single processor servers offer high performance and locked-down security for any website or application. Upgrade to a bundle and save on services like backups and DDoS protection.</span>
7 0
3 years ago
Other questions:
  • 1. Which of the following should NOT be in a tagline?
    12·1 answer
  • How can I make a website login system with only using php?​
    6·1 answer
  • What are Manuscript signs​
    8·1 answer
  • 3. Discuss microprocessor components, chips,
    15·1 answer
  • List any three importance of computer points​
    8·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the inf
    11·1 answer
  • 1.Which one of the following buttons returns a window to its original size?
    11·1 answer
  • What are the characteristics of Instant Search in Outlook 2016? Check all that apply. A)Typing whole phrases makes your search m
    12·1 answer
  • You want to connect to a user desktop to review windows 10 configuration settings when the user is not present. which technology
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!