1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
4 years ago
12

As new technological systems develop, old systems become obsolete. False True

Computers and Technology
2 answers:
uysha [10]4 years ago
7 0

Answer:

true

Explanation:

garik1379 [7]4 years ago
3 0
Answer: true




Explanation
You might be interested in
URGENT!! Ronald wants to search for an image of a sports car. Ronald doesn’t have to remember the specific name of the image to
vaieri [72.5K]

Answer:

Ronald will use a search engine

Explanation:

Ronald will use a search engine to find an image of a sports car, like he would do to search information to help him with his homeworks.

He could use keywords to identify some features he wants to see in the picture.  For example "red sports car" or "Ferrari sports car".  The results might come from a general Web spider fetch job or from specialized sites in terms of stock photos for example.

Then, Ronald will be able to see many images matching its request... and choose the one most appropriate for his needs.

5 0
4 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
What is a file explore?
Tcecarenko [31]
File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems.
7 0
3 years ago
By default, the pfsense firewall allows unrestricted outbound access from the lan interface. true or false?
Sav [38]

The statement "By default, the pfSense firewall allows unrestricted outbound access from the lan interface" is true.

pfSense is free and open source firewall and router that can be installed on a physical computer or a virtual machine. Teh goal is to make the machine a dedicated firewall/router for a network.

 It features unified threat management, load balancing, multi WAN etc.


8 0
4 years ago
Read 2 more answers
Alright Just Bought A Sig Sauer BB Pistol Model P365 Compact And Field Stripped It Now The Slide Is Broken Please Help
viva [34]

Answer:

I'm sure you'll find the answer your looking for on a diffrent site other than brainy

6 0
3 years ago
Other questions:
  • In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
    9·1 answer
  • 1. If you are 15% years old, you are old enough to obtain
    10·2 answers
  • In order to install a device, the operating system needs the required __________ for that device.
    15·2 answers
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
    9·1 answer
  • According to the presentation, integrity and ethics are particularly important for careers in which of the following pathways?
    5·1 answer
  • When should you save your document?
    15·2 answers
  • If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All com
    15·1 answer
  • You want to read input from the user to know how many apples they would like
    10·1 answer
  • Write a recursive decent algorithm for a java while statement, a Javas if statement , an logical/mathematical expression based o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!