1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
13

Historically, development of a new technology often:

Computers and Technology
2 answers:
andrew-mc [135]3 years ago
7 0

Answer:

2. Leads to increases in productivity only once firms learn how to use it.

Explanation:

Technology is an all new or improved way of doing things to enhance effectiveness and efficiency that will lead to increase output. But the new technologies can not improve a business output if they don't grow with the trend of new technologies by updating their knowledge regularly

slava [35]3 years ago
4 0

Answer: 2. leads to increases in productivity only once firms learn how to use it.

Explanation:

The development of a new technology creates new products, processes and services through innovation.

The new technology improves safety, reduce energy, increase water usage efficiency, lower overall production cost, enhance product qualities and increase in company's ability to recover value from its activities.

All these cannot be achieved if the new technology is not well studied thereby giving room for its optimal usage.

You might be interested in
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
What are hard ware and software requirments in multimedia computer system
marishachu [46]

Answer:

Some hardware requirement: Monitor, keyboard, mouse, sound card, memory, processor, graphics display card. Some software requirement: Windows XP/Vista, Video for Windows, Quicktime.

Explanation:

BRAINLEST

4 0
3 years ago
Suppose we have two String objects and treat the characters in each string from beginning to end in the following way: With one
Simora [160]

Answer:

If all the character pairs match after processing both strings, one string in stack and the other in queue, then this means one string is the reverse of the other.                            

Explanation:

Lets take an example of two strings abc and cba which are reverse of each  other.

string1 = abc

string2 = cba

Now push the characters of string1 in stack. Stack is a LIFO (last in first out) data structure which means the character pushed in the last in stack is popped first.

Push abc each character on a stack in the following order.

c

b

a

Now add each character of string2 in queue. Queue is a FIFO (first in first out) data structure which means the character inserted first is removed first.

Insert cba each character on a stack in the following order.

a   b   c

First c is added to queue then b and then a.

Now lets pop one character from the stack and remove one character from queue and compare each pair of characters of both the strings to each other.

First from stack c is popped as per LIFO and c is removed from queue as per FIFO. Then these two characters are compared. They both match

c=c. Next b is popped from stack and b is removed from queue and these characters match too. At the end a is popped from the stack and a is removed from queue and they both are compared. They too match which shows that string1 and string2 which are reverse of each other are matched.

6 0
3 years ago
Shannon wants to work with renewable energy. She is researching what it would take to become a geochemist. A geochemist is someo
Liula [17]

Answer:

Critical thinking

Explanation:

Shannon needs to be a Critical thinker to be effective in this position. Critical thinking has to do with giving deep and good thoughts while doing analysis, or assessment in other to come up with good judgements about a subject or topic.

Since she is going to be studying water and elements in it, she would be doing a lot of analysis and assessments and In other to do good in her field she must learn to think critically before arriving at her conclusions.

3 0
3 years ago
Which Tab contains the paragraph attributes?
alexgriva [62]

Answer:

b insert

Explanation:

7 0
3 years ago
Other questions:
  • Given the following code, what is output by the method call, mystery(6 * 8)?
    8·1 answer
  • You are provisioning a server with eight-core 3 GHz CMP that can execute a workload with an overall CPI of 2.0 (assuming that L2
    5·1 answer
  • A program that interacts with another piece of software as it if were a human user is known as a(n) ________.
    5·1 answer
  • if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
    10·1 answer
  • Describe how mendeleev organized the elements into rows and columns in his periodic table.
    12·1 answer
  • Which of the following is a name for the place an information services and support professional might work? software development
    15·2 answers
  • You must. place a child in a federally approved child restraint device. if the child is
    5·2 answers
  • . Write a toString method for this class. The method should return a string containing the base, height and area of the triangle
    10·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • Write any two disadvantage of First generations computers​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!