1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
15

1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?

Computers and Technology
1 answer:
Mrrafil [7]3 years ago
8 0
It mainly just depends on if you "misuse" them.
You might be interested in
True or false. Every word has only one correct spelling and pronunciation.
iren2701 [21]
<span>Every word has only one correct spelling and pronunciation.
This is a false statement.
</span>
6 0
4 years ago
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
Examples of domain names and usernames<br><br><br><br>​
svp [43]

Answer:

examples are:

com or .edu is a top-level domain name (TLD)

cornell.edu is a second-level domain name (SLD)

bigred.cornell.edu is a third-level or three-part domain name

project.bigred.cornell.edu is a fourth-level or four-part domain name

hope this helps you.

4 0
3 years ago
Implication of technological literacy to a teacher training today
Dafna1 [17]

<u>Implication of technological literacy to a teacher training today :</u>

  • First of training has to be under technology literacy before training starts. Trainer also should have enough knowledge on technology literacy.
  • Trainer can take printed materials to share the document on the topic which to be covered and circulated to trainers
  • Since it given as general topic, training teacher has to cover the following topic, general on computer and purpose of computer today's life, life cycle of computer grown from old PC to laptop and tablet.
  • Next topic such be covered operating system and explain about the operating system and different technology is used.
  • Revolution on technology should be also covered and explained in details.
8 0
3 years ago
10. This famous designer’s sister took over his clothing line after his assassination in 1997.
rewona [7]

Please find the answers in attached file.

Download docx
8 0
3 years ago
Other questions:
  • How to you put a color into a cell? <br> a.Shading<br><br> b.Fill<br><br> c.Color<br><br> d.Insert
    8·1 answer
  • A security administrator is required to submit a new csr to a ca. what is the first step?
    11·1 answer
  • How to use javascript libraries in javascript code?
    9·1 answer
  • Study and compare the tables and draw conclusions.
    13·1 answer
  • "Once a business operations analysis is completed and change needs to
    7·2 answers
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Liquid water can change into a gas and become part of the air. When water is a gas, what is it called?
    7·1 answer
  • What is the difference between a design pattern and a DLL?
    12·1 answer
  • Relation between training and occupation with examples in points . Plz tell fast<br> ​
    5·1 answer
  • The amount of blank space between each line of text line spacing
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!