1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
6

Is techonalygy harmful or useful

Computers and Technology
2 answers:
dexar [7]3 years ago
4 0

Tech can be both harmful and useful. Some techs you can use for school or educational purposes. Some apps can harm your brain.

EleoNora [17]3 years ago
3 0

Answer:

both

Explanation:

both because tech. can be useful to anyone depending on what they need but harmful because you are hurting your eyes by looking at the scree for way to long, along with physical heath by sitting there for way to long and not being active.

You might be interested in
The declarations and statements that compose the method definition are called the __________.
Fiesta28 [93]

Answer:

a. method body.

Explanation:

A method contains the following components:

  • method name
  • method arguments
  • method return type
  • method implementation code

All of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.

Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.

8 0
3 years ago
Of the following, the greatest advantage of a database architecture is that
Zina [86]

Answer:

c.

Explanation:

Of the following, the greatest advantage of a database architecture is that data redundancy can be reduced. This refers to data being unintentionally repeated within the database causing space to be taken up unnecessarily. Database architecture allows for this problem to be addressed and prevented.

3 0
3 years ago
What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
LuckyWell [14K]

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

4 0
3 years ago
Default color html ​
Marrrta [24]

Answer:

black for font...

and

white for bg color

Explanation:

i think this is enough for ur question...

3 0
3 years ago
What is the benefit of using the AND logical function instead of the IF function?
masya89 [10]

Answer:

Determines True if both conditions are met

Explanation:

If both inputs are true then the output is true, if one is false then it becomes false, if both are false it is also false

3 0
3 years ago
Other questions:
  • Which two statements are true regarding the user exec mode? (choose two.)?
    6·1 answer
  • n macOS, what launch point provides access to almost all the settings needed to administer a macOS system?
    5·1 answer
  • In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu
    9·1 answer
  • What is the purpose of the BBC option in a email?
    7·1 answer
  • A hierarchical topology is also called a _____ topology.
    9·1 answer
  • Compressing a file is also called
    9·2 answers
  • Machu Picchu is located in modern day _______<br><br>​
    14·2 answers
  • Impact of information technology in the society​
    11·1 answer
  • Imagine that you wanted to write a program that asks the user to enter in 5 grade values. The user may or may not enter valid gr
    10·1 answer
  • What are the paparazzi?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!