1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
5

Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio

ns engineering product adaptation
Computers and Technology
1 answer:
just olya [345]3 years ago
8 0

Answer: Leveraged creativity

Explanation:

Improving functionality and performance of any technology through new and unique methods so that it can lift above the competing organization and technologies. Experts and guides try innovating the technology through various attempts which is caused by maximizing advantage through creativity.

  • Other options are incorrect because application engineering, adaptation of product and state of art breakthrough does not influence the technology  to rise above the competing companies.
  • Thus, the correct option is leveraged creativity
You might be interested in
What are the guided and unguided transmission media and what are the differences?
Ludmilka [50]

Answer:  They are forms of of carrying data from communication devices. The difference is the medium where the signal travels.

Explanation:

Hi, the difference between guided and unguided media is that in the guided media, the signal travels through a physical medium whereas, in unguided media, the signal travels through the air.  

Guided and unguided media are types of transmission media.

The transmission media carries electromagnetic signals, that transmit data between communicating devices like computers.

4 0
3 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
A thick black line around the outside edge of a page is a _____.
Montano1993 [528]
B. Border. It borders the outer page.
7 0
3 years ago
Read 2 more answers
What are the consequences of digital footprint ?
tekilochka [14]

Answer:

The digital footprint that is left behind can have repercussions in all areas of your teen's life, potentially resulting in missed job opportunities, public sharing of personal information, ruined relationships — or, in what is likely more relevant to them right now: Their parents finding out what they've been up to

Explanation:

8 0
2 years ago
Universal Containers has a requirement to integrate Salesforce with an external system to control record access. What option sho
Inessa05 [86]

Answer:

C. Use the SOAP API to maintain the related SObject_share records

8 0
3 years ago
Other questions:
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • By changing the field size for text to the maximum number necessary,
    6·1 answer
  • Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
    7·1 answer
  • Which of the following jobs is considered part of the information technology industry?
    15·2 answers
  • Select the correct answer
    11·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • "Na2SO3” represents sodium sulfite.
    13·2 answers
  • Suppose a family has had a house fire in which
    7·2 answers
  • which of these tools stick to the edge of an image, thus making it easy to select the shape of an image
    6·1 answer
  • What plugs into this?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!