1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
8

Technologies are having a negative impact on businesses.

Computers and Technology
1 answer:
Aloiza [94]3 years ago
4 0

Answer: False

Explanation: I think its false because technologie has had a good impact on businesses.

You might be interested in
One way to prepare for filing the PROFILE is to:
kozerog [31]
I think I am not sure that it is probably b
8 0
3 years ago
Read 2 more answers
A collection of related files that serves as a foundation for retrieving information is a: byte
dem82 [27]
<span>c. database  is the answer.</span>
3 0
3 years ago
Does anyone know how many Brainliests you need to be able to send a private message to someone??
White raven [17]

Answer:

no idea sorry...

Explanation:

8 0
2 years ago
Read 2 more answers
How does climate research depend on digital technology
vodomira [7]
Together We Can Create Digital Systems That Provide Scale, Speed & Enable GrowthCohesive Digital Strategy · Secure IT Infrastructure · Secure Digital Foundation · New Digital EconomyTypes: Digital Business, Digital Operations, Digital Systems, Digital Technology<span>Digital Systems & TechDigital OperationsDigital Business<span>Latest Thinking</span></span>
8 0
3 years ago
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
3 years ago
Other questions:
  • "what is the name of the ipsec configuration file"
    9·1 answer
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • When powering off your computer is best down using?
    8·2 answers
  • Martha wants to invite her coworkers to her birthday party. She uses the mail merge feature to compose and send the invitations.
    6·1 answer
  • A provides an easy way for workers to interact with their computers
    9·1 answer
  • Why computer process faster than humans?​
    10·2 answers
  • Whats yall favv scary movie
    11·1 answer
  • Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
    5·1 answer
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
  • What is an automatic update and when should you use it
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!