1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
4 years ago
8

What is the digital revolution and how did it change society? What are the benefits of digital media?

Computers and Technology
1 answer:
Rama09 [41]4 years ago
7 0

Hello!

Before Social Media , Many people liked the old classical way and they had there own way to communicate with people. With social media everything changed . Companies started to grow and real face to face communication was  shrinking slowly . Kids locked themselves in there rooms to text friends and play games instead of playing outside. But technology does have a good affect for example if it wasn't for technology i wouldn't be able to help you right now ! If it wasn't for social media Wendy's wouldn't be able to Roast people . And contact over the phone would be limited .

HOPE I HELPED HAVE A BLESSED DAY!!


You might be interested in
Earthquakes _____.
rosijanka [135]
<span>B: can be caused by volcanic eruptions</span>
7 0
3 years ago
Read 2 more answers
Enlist few database you use often.
sveticcg [70]

Answer: Oracle Database

MySQL

Microsoft SQL Server

social media

Explanation:

4 0
3 years ago
Read 2 more answers
The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
Kamila [148]

Hello, Mochacon, so to answer this question, we must understand what and ids is. A intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. So according to this definition, this statement is true since and ids does detect intrusions, detects suspicious events indeed, and sends alerts when intrusions happen.

Hope this helped!

3 0
3 years ago
Which best describes TPM?
rodikova [14]

Answer:

Encryption used on hard drives

Explanation:

TPM is a hardware chip. It is a type of module that is used to authenticate the hardware devices with the help of encryption keys (passwords). It is the short form of Trusted Platform module. The hardware devices that be authenticated through this module may include personnel computer or laptops. There are different keys, password and security codes.

So, the best sentence that describes, TPM is Encryption built into hardware .

4 0
3 years ago
How do you create code on scratch?
lina2011 [118]
On scratch they feature a drag and drop form of coding to visualize it. You can create an account and drag and drop puzzle ties in the order. The first tile you’ll want to drag into the area is the “start program” tile and then you’ll need to connect tiles from there.

Hope this helped!
3 0
3 years ago
Read 2 more answers
Other questions:
  • A touch screen is classified as a special type of scanning device true or false
    15·1 answer
  • You turn your computer on and the computer will not boot up where is something you should do to diagnose the problem?
    12·1 answer
  • Little circles located in front of various website screen options, which can be selected with the mouse, are called ________.
    6·1 answer
  • You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
    5·1 answer
  • A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
    9·1 answer
  • How did the new technologies of WWI affect soldiers fighting on the front lines? Please include at least three examples of new t
    5·1 answer
  • The SPF strategy can be proven to be optimal in the sense that it minimizes average response times. In this problem, you will de
    10·1 answer
  • How do operating system work?
    5·1 answer
  • Is brainly bugging out rn? <br> The site isnt like loading completely
    5·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!