1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
3 years ago
6

What are two characteristics of simple technology and two characteristics of complex technology?

Computers and Technology
1 answer:
grin007 [14]3 years ago
4 0

The two characteristics of Simple Technology are : KNOWLEDGE & DEVELOPMENT.  Technology uses and produces technological knowledge. Technological communities endorse technological knowledge as valid when it is shown to support the successful development of technological outcomes.  The two characteristics of Complex Technology are :  ADAPTIVE & NON PREDICTABLE.  Complex Technology is adaptive. They can (re)organize their internal structure without the intervention of an external agent.  Since the interactions are rich, dynamic, fed back, and, above all, nonlinear, the behavior of the system as a whole cannot be predicted from an inspection of its components.

You might be interested in
The letters G, H, T, Y, B, and N are what type of keys?
andrey2020 [161]
Lower row keys. Your welcome
5 0
3 years ago
Read 2 more answers
Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
grin007 [14]
Are their answer chocies 

3 0
4 years ago
An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me
shusha [124]

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

8 0
2 years ago
Pleaseeeeee help me or I’m going to fail &amp; I really want to graduate :(!!!
zysi [14]

Answer:

Konrad Zuse

Explanation:

KONRAD ZUSE (1910-1995) 1935-1938: Konrad Zuse builds Z1, world's first program-controlled computer. Despite certain mechanical engineering problems it had all the basic ingredients of modern machines, using the binary system and today's standard separation of storage and control.

7 0
3 years ago
You need to store product quantities, and you want to minimize the amount of storage space that is used. Which data type should
Inga [223]

Answer:

win-RAR or other kind of compactor

Explanation:

Also you may use Cloud or Dropbox

7 0
4 years ago
Other questions:
  • For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has
    13·1 answer
  • What file formats can you safely use in a video presentation
    14·1 answer
  • Which of the following resources is an example of a web-based application?
    15·1 answer
  • What is needed to create a good problem statement?
    10·1 answer
  • Match the Windows installation technique to its description.
    15·1 answer
  • Dawn needs to insert a macro into a Word document. Where can she find the Insert Macro dialog box?
    11·1 answer
  • What is hardware?
    10·1 answer
  • Assume your sketch has a variable named silo, which stores an object that is defined by a class you have created. The name of th
    15·1 answer
  • Why is it saying I don’t have a subscription when I paid for it and it shows deducted from my account? I can’t find any phone #
    7·1 answer
  • HURRY- I’ll give 15 points and brainliest answer!!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!