1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
11

What is technology?

Computers and Technology
1 answer:
Anestetic [448]3 years ago
5 0
D. the application of scientific discoveries 
You might be interested in
You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
GalinKa [24]

Pre-production is vital to all members of the crew. It ensures that the entire crew knows exactly what's going on. If they need to know why we're shooting in a certain way, or why we're shooting in a certain place, they can see the entire process that we've gone through in order to get to where we are.

7 0
3 years ago
The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
aliya0001 [1]

Answer:

Index Finders

Explanation:

* The search engine keeps the data in an index that is known as index finders which consist of the information almost all query and searching keyword.

* when we search for any website in Google, Yahoo or Bing, it searches from the keyword in the index finder and provides the correct matches.

* Index finders make the searching process too easy otherwise it is too difficult to search for different queries too fast from different pages.

5 0
3 years ago
Effective presentations vary the color scheme on each slide.<br><br> True<br> False
KengaRu [80]

Answer:

TRUE

Explanation:

7 0
3 years ago
Read 2 more answers
What is an administrator?
Drupady [299]
A person responsible for running a business, organization, etc.
3 0
3 years ago
How can public-key encryption be used to distribute a secret key?
navik [9.2K]
If you encrypt the secret key with someone else's public key, then only that person can decrypt it with his private key. The encrypted content can be freely shared with anyone, however only the intended recipient can retrieve the secret key since he is the only one with the proper private key.
8 0
3 years ago
Other questions:
  • In a right triangle, the square of the length of one side is equal to the sum of the squares of the lengths of the other two sid
    10·1 answer
  • How can I sent a message?
    13·1 answer
  • ⭐️⭐️⭐️ what Network is larger in size? MAN or WAN? Thank you ⭐️⭐️⭐️
    5·1 answer
  • Your sister is considering purchasing a tablet computer that utilizes RT as the
    11·1 answer
  • Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren
    13·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • If there are 18 people in your class and you want to divide the class into programming teams of 3
    7·1 answer
  • You press the F9 key to convert an object to a symbol true or false​
    12·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
  • Plagiarism is considered
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!