1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
3 years ago
13

How do nations mostly use technology in foreign relations? Check all that apply.

Computers and Technology
1 answer:
Andreas93 [3]3 years ago
5 0

Answer:

  • to spy on one another
  • to carry out cyber attacks
  • to improve their public images

Explanation:

Different countries have tools to hack, control and filter information in foreign countries using different devices and techniques that allow them to be aware of any threat that may arise from another country, as well as obtaining information that helps them.

By linking technology with foreign policy, it is possible to strengthen and complement national capacities in these areas, opening the possibility of diversifying and expanding the projection of a country with an excellent image that offers sophisticated technology-based services.

You might be interested in
Which tab is used to insert a hyperlink onto a slide?
babunello [35]

the answer is C. Insert

3 0
3 years ago
Which two computer peripherals are connected to the computer through a port?
chubhunter [2.5K]
Most computer devices are connected to the computer through port
Keyboard through usb port
Printer through usb port
Hand point device through usb port
Also computer equipped with LPT port for printers and COM port for additional devices like external modems e.t.c
7 0
3 years ago
Help help help help help help
Shkiper50 [21]

Answer:

maybe overexposure???

Explanation:

6 0
2 years ago
Consider the university enrollment database schema: 547 Student(snurn: integer, snarne: string, majoT: string, level: string, ag
trapecia [35]

Enroll a student identified by her snum into the class named 'Introduction to Database Systems' is the following transactions, state the SQL isolation level you would use.

1. Enroll a student identified by her snum into the class named 'Introduction to Database Systems'.

<u>Explanation:</u>

Since enroll is unique in the university enrollment database schema and field name is SNUM and it is data type is an integer. To identify student class name and department name and name of student SNUM field is used for searching in university enrollment database schema. Enrollment changing is not possible of the student’s not possible or not good practices in university enrollment database schema.

If a query had been made class wise or department wise enrollment is played an important role.

For  assign, a faculty is made on the class id or  department id.

8 0
3 years ago
What changes the size of a video when played?
Leni [432]

Answer:

D. the browser

Explanation:

it adjusts to the size of your device, including the browser.

hope i helped

8 0
2 years ago
Read 2 more answers
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • For what show did the actor, whose star is located at 6667 Hollywood Boulevard, earn an Emmy Award for Outstanding Supporting Ac
    10·2 answers
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • What TYPE of flash drive is called when it saves your files safely? I'm going to use my friend computer that's why.
    5·1 answer
  • Which of these is a method of selecting multiple items in Impress or PowerPoint? A. holding down the Ctrl key while clicking ite
    9·2 answers
  • Find the Nearest Repeated Entries in an Array People do not like reading text in which a word is used multiple times in a short
    15·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • Primary technology skills are skills that are necessary for success in online education
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!