1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
14

Which Definition Best describes Technology as it Is Used in Science

Computers and Technology
2 answers:
Minchanka [31]3 years ago
7 0

Answer:

technology is the sum of techniques, skills, methods and processes used in the accomplishment of objectives or production of gooods.

Juli2301 [7.4K]3 years ago
5 0

Answer: the best explanation that describes that application of technology in science is the application of new methods or devices to solve problems The definition of technology is science or knowledge put into practical use to solve problems or invent useful tools.

Explanation:

You might be interested in
A data analyst is using the Color tool in Tableau to apply a color scheme to a data visualization. They want the visualization t
alina1380 [7]

Answer:

Color contrast is the difference in light between font (or anything in the foreground) and its background.

Explanation:

In web accessibility, how well one color stands out from another color determines whether or not most people will be able to read the information.

Contrast makes things look different and stand out

6 0
3 years ago
Which of the following is the fastest processor
Nookie1986 [14]
Usually a Xeon is the fastest. Matters what time it was built and the chipset. If its old, the i7 is faster.
6 0
3 years ago
What is that black thing on my wall?
Darya [45]
I'm guessing your television if it's a flat screen
7 0
2 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
A combination check is a data validation rule that tests to ensure that a data item fits the required data type.
barxatty [35]

Answer:

its a

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
    9·2 answers
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • What is software that helps a computer operate efficiently and keeps track of data on a computer?
    14·1 answer
  • Knowing what you know about today’s video games, imagine what it would look like if you had to create a modern-day version of Sp
    6·1 answer
  • Match each career with the education required for each job
    12·1 answer
  • What is the purpose of the making of Nintendo Switch?
    10·2 answers
  • Which method can be used to write data to a text file opened with the BufferedWriter object outfile?
    9·1 answer
  • The type of e-cards that have an antenna built into them are __________ cards.
    10·2 answers
  • Please an urgent answer<br>will give brainliest<br>what is the definition of bucket address.​
    13·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!