1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
5

There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c

onsider it benefit and risks.what benefit does the technology provide?
Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
8 0
Social media is one of the most useful sites in technology it helps get in touch with your colleagues and friends.It helps you also to research on political news and also things that contribute to technology that enhances your knowledge.But it is also bad if used for a long time it can make one to be a fad because of using it for too much.
You might be interested in
A user calls your help desk and says that he is trying to configure his Word document so that the text within his paragraphs is
katrin [286]

Answer:

The best answer would be

Explanation:

To access this command ...

Select the Format tab - Properties - Paragraph properties - Bleeds and spaces

7 0
3 years ago
Which role is responsible for turning the product backlog into incremental pieces of functionality? bookmark this question
Misha Larkins [42]
The answer is the team. Teams are self-establishing which no one not even the scrum master tells the team how to turn product backlog into augmentations of stoppable functionality. Each team member put on his or her knowledge to all of the complications. The interaction that outcomes progresses the entire scrum team’s general competence and usefulness. The optimal size for a scrum team is seven people, plus or minus two. When there are fewer than five team members, there is less interface and as a result less productivity improvement. The product owner and scrum master roles are not comprised in this count. Team arrangement may variation at the end of a sprint. Every time Team membership is altered, the productivity increased from self-organization is reduced.
4 0
3 years ago
Read 2 more answers
What makes manually cleaning data challenging?
Alexxandr [17]

Manually cleaning data is done manually which makes it challenging. This make it prone to mistakes.

6 0
3 years ago
A person interested in a career in digital media should have which qualities? Select all that apply.
emmainna [20.7K]
1.Creativity
2.Leadership
3.Attention to detail
5.Enjoyment to learning new things!
6.Vision
No Problem!
5 0
2 years ago
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
Other questions:
  • Given the following class import java.util.ArrayList; public class RectangleTester { public static void main(String[ ] args) { A
    7·1 answer
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    6·2 answers
  • Successful Web sites such as StumbleUpon ( www.stumbleupon) and Digg ( www.digg) use ____ by inviting their visitors to vote on
    8·1 answer
  • On a Windows network share, if the user can add, edit, and delete files and folders within the LabFiles folder, what type of acc
    14·1 answer
  • Which sentence uses a pair of synonyms? Because there was so much shouting, many of the protestors began screaming in order to b
    6·2 answers
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • Multiple arrays. Jump to level 1 For any element in keysList with a value greater than 40, print the corresponding value in item
    7·2 answers
  • Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
    5·1 answer
  • Explica el empleo de cuentas y contraseñas en archivos
    6·1 answer
  • What commands does SuperKarel know that regular Karel does not?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!