1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
14

Your eighty-three-year-old grandmother has been using a computer for some time now. As a way to keep in touch, you frequently se

nd emails of a few lines to let her know about your day. She calls after every email to respond point by point, but she has never emailed a response. This is best described as _________________________.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
3 0

Answer:

Cultural lag

Explanation:

Cultural lag is a situation where by a society experiences technological development at a rate faster than the development that occurs in culture and general way of life.

A very good example is that it takes a longtime before cultural development can match up with technological developments and advancements thus leading to social problems due to lag. The cultural lag theory was formed in 1922 by William F Ogburn a sociologist.

You might be interested in
Which of the following are input devices? Check all that apply.
postnew [5]

Answer:

Keyboard,speaker,scanner,mouse,printer and monitor

Explanation:

In computing, an input device is a piece of equipment used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones.

7 0
3 years ago
Read 2 more answers
A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless.
Olegator [25]

Answer:

RFID scanning or Barcode reader

Explanation

Smart refrigerators have inbuilt RFID scanning technology that help monitor the stock that is inside your fridge. Once you pass your items through the inbuilt RFID scanner in the fridge, the barcode of your items is cross-referenced with a database and given a unique tag for identification. This technology helps detect and track the stock that is inside your fridge and when you start running low, the RFID can be triggered to send a reminder as a notification on your email or a text message.

3 0
3 years ago
Which of the following is the most reliable way to check the accuracy of a website?
ELEN [110]

Answer:

Examine the sources cited by the website

Explanation:

Due to the ability for everyone to create a website, and that there are no governing standards on the quality of information given on websites, it is important when conducting research to ensure that the sources on the web are up to date, accurate, and provide an objective view

Therefore, it is important to go through and examine the website critically using the the following criteria

1) The website coverage

2) The currency of the website's information

3) Weather the website is objective or not

4) The identity of the author of the website and the ability to contact the author

5) The accuracy of the information contained in the website

3 0
3 years ago
Find the area of square whose perimeter is 260.8m​
inessss [21]
4251.04

The perimeter (260.8) over 4 is equal to each side length (65.2)

65.2^2 = 4251.04
5 0
3 years ago
A technician has been notified of a problem on the network. After investigation, the technician determines that a specific inter
bogdanovich [222]

Answer:

Virus is a type of malware which is used in this case.

Explanation:

7 0
3 years ago
Other questions:
  • Navigational signs on the highway are often which colors?
    10·2 answers
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • Show a single view of an object, but show it in a way that makes it look 3-D, as your eye would see it.
    10·1 answer
  • What steps might a company or organization need take in order to keep its digital data secure online?
    8·1 answer
  • Which of the following is NOT a reason to include comments in programs
    10·2 answers
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • What is the difference between EPROM and EEPROM, explain why​
    11·1 answer
  • Can anyone figure this out???? I need help ASAP!
    8·1 answer
  • oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!