1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
9

What technological invention was used in the battle of san juan hill?

Computers and Technology
1 answer:
monitta3 years ago
5 0
Gps <span>Global Positioning System i hoped this helped.</span>
You might be interested in
why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard
salantis [7]

Answer:

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model

Explanation:

The following show how business affected the OSI model as a standard:

WRONG TIMING

When OSI was made, TCP / IP was already in use. Also nobody wanted to be the first to start using OSI.

POOR TECHNOLOGY

Both the presentation and session layer that was dedicated in OSI was very little.

The technology used was very difficult to understand.

BAD IMPLEMENTATION

The initial implementation of OSI model was very slow and the OSI layer 7 model had bad quality.

POLITICS

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model. They where rumors that the OSI was for the European and US government.

5 0
3 years ago
1. To type a capital "C", you would use the ring finger of your left hand.
Anna11 [10]
False, keyboard, Hypertext Transfer Protocol
5 0
3 years ago
Read 2 more answers
What social impact did the gunpowder have on society?
olga2289 [7]
It had a huge impact people could use other things than bows and arrows to fight in wars.
8 0
4 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
Which statement describes the relationship between science and technology?
Elden [556K]
Answer: science is the study of the world, and technology changes the world to solve problems.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which certification can help enhance your job prospects in the role of a computer programmer?
    6·2 answers
  • Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
    7·2 answers
  • A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness.
    5·1 answer
  • Manuel has set up his network so that some employees can open and view files but are unable to edit them. Others can open, view,
    10·1 answer
  • What’s an example of software?
    6·2 answers
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • 8.5 Edhesive Code Practice
    14·1 answer
  • computer is an electronic machine that is used for data processing to produce meaningful information explain in statement​
    5·1 answer
  • Can somebody PLEASE help me cancel my subscription I have tried so many different things and contacted support - they are no hel
    14·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!