1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
4 years ago
14

What are the advantages of technology ​

Computers and Technology
1 answer:
mel-nik [20]4 years ago
5 0

Save Lives

Explanation:

ICU and other life savung machines run with technology for example MRI scans would not exist wirhout technology.

You might be interested in
Features present in most GUIs include _____.
atroni [7]
Forms, Icons, Menus, Windows
3 0
4 years ago
Read 2 more answers
What does the poster exemplify?
zloy xaker [14]

Answer:

try D

Explanation:

8 0
4 years ago
Read 2 more answers
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
How is your day going who wants to hit <br><br><br><br> Jk, go find someone else.
kap26 [50]
Lol my days been hectic wby. I’ve been studying
3 0
4 years ago
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
Other questions:
  • Which of the following is not an acceptable way to code a nested structure? Select one: a. nest a for loop inside a while loop b
    15·1 answer
  • Lief wants to keep the information of his chart, but he doesn’t want it taking up space in his page. What should he select after
    7·2 answers
  • Why is it important to consider the readability of a Web page when selecting and applying a background color?
    12·1 answer
  • An attacker sets up a look-alike wi-fi network, tempting unsuspecting users to connect with the attacker's wi-fi network instead
    5·1 answer
  • Which statement is true for a career as a graphic designer?
    8·1 answer
  • Choose the word pair that would best complete this analogy <br> annihilation : obliteration
    7·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • Which key temporarily activates the Hand tool?​
    6·1 answer
  • What do the power key and refresh key do when pressed together
    11·1 answer
  • Convert 10101010 into decimal number system​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!