1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
7

How has the growth of industries that use computer technology changed employment?

Computers and Technology
1 answer:
KIM [24]3 years ago
8 0
Well Member The Industrial Revolution? Well If You Forgot It Was Like Making Goods Like With Your Hands But Every Since The Factories Came Works Been Kind Of Hard To Find And Such , So If The Growth Of Industries That Use Technology Changes Employment Than We Wouldn't Have Work It Would Have Been The Industrial Revolution All Over Again
You might be interested in
When solving a problem in a group situation, which of the following traits should be demonstrated?
kakasveta [241]

Answer:

compromise should be demonstrated

8 0
3 years ago
Choose all of the items that represent functions of the operating system kernel.
babunello [35]

Answer: its all of them

Explanation: I took Assignment over this

6 0
3 years ago
Read 2 more answers
Only the _________ can add users with passwords and limit user access to selected areas.
Iteru [2.4K]

Answer:

The answer to this question is "Quickbooks administrator.

Explanation:

The answer is the Quick books administrator because Quick books is a software that is used for accounting developed. It helps us to keep in mind all the expenses in the business and things like invoicing, reporting.In this software, we can add new users and give them permission. If we want to allow Users to access the software.

In the Quickbooks administrator, we can add the user with limited access also. So the correct answer is Quickbooks administrator.

8 0
3 years ago
The monkey-and-bananas problem is faced by a monkey in a laboratory with some bananas hanging out of reach from the ceiling. A b
elixir [45]

Answer:

a) <u>initial state description</u>

<em>At(Monkey, A) ∧ At(Bananas, B) ∧ At(Box, C) ∧</em>

<em>Height(Monkey, Low) ∧ Height (Box, Low) ∧</em>

<em>Height (Bananas, High) ∧ Push(Box) ∧ ClimbUp(Box)</em>

b)  <u>the six action schemas.</u>

1 - Go from one place to another

<em>Action (Go(x, y),</em>

<em>PRECONDITION: At (Monkey, x)</em>

<em>EFFECT: At (Monkey, y) ∧¬At(Monkey, x))</em>

2 - Push an object from one place to another

<em>Action (Push(b, x, y),</em>

<em>PRECONDITION: At (Monkey, x) ∧ Can Push(b)</em>

<em>EFFECT: At(b, y) ∧ At (Monkey, y) ∧¬At(b, x) ∧¬At(Monkey, x))</em>

3 - Climb up unto an object

<em>Action (ClimbUp(b),</em>

<em>PRECONDITION: At(b, x) ∧ At(Monkey, x) ∧ ClimbUp(b)</em>

<em>EFFECT: On (Monkey, b) ∧¬Height (Monkey, High))</em>

4 - ClimbDown from an object

<em>Action (ClimbDown (b),</em>

<em>PRECONDITION: On (Monkey, b) ∧ Height (Monkey, High)</em>

<em>EFFECT: ¬On (Monkey, b) ∧¬Height (Monkey, High) ∧ Height(Monkey, Low))</em>

5 - Grasp an object

<em>Action (Grasp (object, position, height),</em>

<em>PRECONDITION: Height(Monkey, h) ∧ Height(b, h) ∧ At(Monkey, x) ∧ At(b, x)</em>

<em>EFFECT: Has(Monkey, b))</em>

6 - Ungrasp an object

<em>Action (Ungrasp(b),</em>

<em>PRECONDITION: Have(Monkey, b)</em>

<em>EFFECT: Has(Monkey, object))</em>

<em />

c) <u>general goal state.</u>

<em>Has(Monkey, Bananas, s) ∧ (ЗхAt(Box, x, s₁) ∧ At(Box, x, s))</em>

STRIPS only consider about goal state, there is no relation between two states within the plan, so there is no way to represent this goal.

6 0
4 years ago
Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
Lorico [155]

Answer:

<u>Organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. </u>

Explanation:

The seven domains in an IT structure can be identified as:

  1. User Domain,
  2. Workstation Domain,
  3. LAN Domain,
  4. WAN LAN Domain,
  5. Remote Access Domain,
  6. WAN Domain,
  7. and System / Application Domain

They can be configured as portals for countermeasure failure and intruders, so it is crucial for organizations to look for ways to protect these domains to prevent unauthorized access to private data.

Therefore the relevance of the systematic approach to threats and vulnerabilities, which will assist in organizing the roles, responsibilities and responsibilities for risk management and mitigation.

7 0
4 years ago
Other questions:
  • When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
    13·2 answers
  • Please help will mark brainiest
    8·1 answer
  • Magnetic ram (mram) uses ____ rather than an electrical charge to store data.
    6·1 answer
  • JAVA QUESTION::
    10·1 answer
  • What is the answer 11100+01010​
    8·1 answer
  • What time is it NOW??
    11·2 answers
  • Which is a linear presentation?
    10·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
  • Aii so is anyone pushing P?<br> if u are u a g
    8·2 answers
  • A program that organizes sequences of automated provisioning tasks. A. Application Packager B. Sequence Manager C. Sequence Logg
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!