1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
9

Why does the job market change overtime

Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
4 0

Answer:

As more and more thing are invented more jobs are made to satisfy those said things. For example, since computers are getting better, more people are going to choose programing.

Explanation:

You might be interested in
Nam june paik’s ________ combines recognizable and distorted images made using a synthesizer to modulate video signals.
Alexeev081 [22]
The answer that fits the blank is GLOBAL GROOVE. Global Groove has been one of the most notable work in the history of video art because of the use of distorted images produced from a synthesizer and this modulated signals on the video. The Global Groove is a video from year 1973. 
6 0
3 years ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
3 years ago
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
3 years ago
Read 2 more answers
What type of collection is created with each assignment statement?
lilavasa [31]

Answer:

tuple

Explanation:

at first its a dictionary but then it is reassigned to a tuple

don't forget tuples are immutable

7 0
2 years ago
How can information technology transform the way business processes in an organization
timurjin [86]

Answer:

1. Through cooperation.

2. Understanding the market and the organization.

Explanation:

Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.

An information Technologist can change the way business process if he or her understand the maker of the company and the company.

The major point is this:

1. The company must cooperate.

2. Everybody must accept change for it to grow higher.

3. Understand the market of the company and

4. understand the company and how they operate and then change and replace the parts that need replacement.

6 0
2 years ago
Other questions:
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
    7·1 answer
  • A benefit of flashcards is that they are
    7·2 answers
  • Identifies the row and column that forms the cell
    11·1 answer
  • Which of these is an example of rebranding ?
    6·2 answers
  • The design of a blog refers to:
    8·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • You are a running cable in a new network. You are running a series of cables from the wiring closet to the RJ-45 ports for the c
    6·1 answer
  • PLEASE HURRY!!!!
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!