1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka57 [31]
3 years ago
11

What would be the most popular piece of technology on Earth?

Computers and Technology
2 answers:
spin [16.1K]3 years ago
8 0

Answer:

the smart phone

Explanation:

It is the most widley used and accepted

melisa1 [442]3 years ago
4 0
I’d say smartphone based on how most everyone owns one
You might be interested in
In 2007, __________ Floridians died in alcohol-related collisions. A. 501B. 1,051C. 5,015D. 10,839
wel

1000 people died of an alcohol addiction

4 0
3 years ago
Codehs dartboard 3.12.4
allsm [11]

Answer:

Whats the question?

Explanation:

7 0
3 years ago
When testing an abrasive wheel by tapping the wheel gently with a light, non-metallic instrument you notice that the wheel sound
elena-s [515]
No. If it  is cracked or damaged THROW IT AWAY. I can tell you from personal experience, not much worse than a wheel breaking apart while spinning and embedding chunks of the wheel in your chest and face.
3 0
3 years ago
Read 2 more answers
Write a QBASIC program to calculate and display the simple interest.​
Ugo [173]

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

8 0
3 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
Other questions:
  • When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
    15·2 answers
  • Which type of cell references are locked and NOT automatically updated when it’s copied
    8·1 answer
  • Given the variables isfulltimestudent and age, write an expression that evaluates to true if age is less than 19 or isfulltimest
    12·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast gpu and 1gb of memory onboa
    15·2 answers
  • True false) ther are five arrow keys on the keborad​
    9·1 answer
  • An error occured trying to answer a question on brainly. What should I do?
    11·2 answers
  • Convert the following four unsigned binary numbers to decimal and show your work:
    14·1 answer
  • In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested cond
    6·1 answer
  • Define operating system?explain the types of operating system on the basis of use.​
    7·1 answer
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!