1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
15

Technological uncertainty:

Computers and Technology
1 answer:
Lisa [10]3 years ago
6 0

Answer:

The correct answer is: "b. occurs because an alternative technology could be introduced by competitors".

Explanation:

It is very difficult to assess how technological uncertainty has been developed and maintained throughout the years, although it is possible to state that it may occurs when other alternative technologies are developed and launched, besides other factors. Technology companies and agencies are interested in developing their products as best as possible, therefore, competition increases with marketability and produces uncertainty among all developers, software and hardware engineers, and other Information Technology (IT) workers who are responsible for creating new technological tools which may solve the problem of uncertainty among them all and improve society.

(ps: mark as brainliest, please?!)

You might be interested in
In Word, how can you tell when text is selected?
Anit [1.1K]

Answer:

the text will highlited in gray

Explanation:

5 0
3 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
PLS HURRY!!<br> Look at the image below!
Lady_Fox [76]

Answer:

Line 2: for numF in [3, 5]

Line 1: for numE in [2, 6]

Line 3: print(numE, numF)

Explanation:

From the outputs, the first number of the first output is 2. This means that <em>numE in [</em><em>2</em><em>, 6]</em> would be on the first line.

The second number of the first output is 3, concluding that <em>numF in [</em><em>3</em><em>, 5]</em> is within a nested loop, meaning it would be on the second line.

This leaves <em>print(numE, numF)</em> on line 3.

We can go through the lines step by step to check if we have placed them in the correct order:

Code

for numE in [2, 6]:

 for numF in [3, 5]:

   print(numE, numF)

During the first iteration, numE = 2 and numF = 3.

Output: 2, 3

Since [3, 5] is in a nested loop, we need to finish iterating all of its numbers before numE moves to the next number, so:

numF moves to 5, numE stays at 2.

Output: 2, 5

Since we have finished iterating through [3, 5], numE moves to 6 and numF starts back at 3:

Output: 6, 3

numE still stays at 6 and numF iterates to 5 since [3, 5] is in a nested loop:

Output: 6, 5

The outputs match the outputs on the sheet, meaning we have correctly placed the code in order.

Hope this helps :)

5 0
3 years ago
Write the class definition for a class named Employee. The class should include data members for an employee object%u2019s name
kykrilka [37]

Answer:

see explaination

Explanation:

#include <iostream>

#include <string>

using namespace std;

class Employee

{

string name;

int salary;

public: Employee()

{

}

Employee(string name, int salary)

{

this->name=name;

this->salary=salary;

}

void setName(string name)

{

this->name=name;

}

void setSalary(int sal)

{

this->salary=sal;

}

string getName()

{

return name;

}

int getSalary()

{

return salary;

}

void raiseSalary(int percentage)

{

if(percentage<0)

{

cout<<"Invalid percentage";

}

else

{

salary=salary+((float)percentage/100)*salary;

}

}

};

int main()

{

int percentage;

Employee e1("Satur",1000);

cout<<"Employee details are:";

cout<<e1.getName();

cout<<e1.getSalary();

cout<<"Enter the percentage raise";

cin>>percentage;

e1.raiseSalary(percentage);

cout<<"Raise in salary:";

cout<<e1.getSalary();

return 0;

}

7 0
3 years ago
_____ can be lost or stolen by cybercriminals. Select 2 options.
Mice21 [21]

Answer:

Free WiFi

Computer networks

Explanation:

They cant really take your stuff they can only take virtual objects.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watc
    6·2 answers
  • A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. web-bas
    14·1 answer
  • Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate t
    14·1 answer
  • You've been hired as a consultant to help an online store owner. You need to complete the implementation of conversion tracking
    6·1 answer
  • What is a prototype ?
    9·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as
    5·1 answer
  • What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the contr
    8·1 answer
  • write the implementation (.cpp file) of the gastank class of the previous exercise. the full specifiction of the class is:
    10·1 answer
  • Jorge, a sports statistician for soccer, has kept track of how many shots-on-goal each player on a team made in each game. This
    9·1 answer
  • Explain why it is wise to memorize your social security number.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!