1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
2 years ago
10

3) How ash traditional technology and modern

Computers and Technology
1 answer:
Fynjy0 [20]2 years ago
4 0

Answer:

While the developed world benefits from the modern explosion of technology, countries like Ethiopia continue to rely on their forefathers' methods for important daily tasks such as farming, cooling, and providing clean water. These activities are often physically challenging, time and energy intensive, and are often carried out by female family members in many such societies. Furthermore, they can damage the local ecology and climate, such as deforestation and soil erosion caused by the use of trees for firewood. Western technologies are often too complicated, expensive, unacceptable, and difficult to maintain in developing societies, so they are of little or no use in these situations.

You might be interested in
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
11 months ago
Hat is the limit of virtual machines that can be connected to a virtual network?
skad [1K]

<u>Unlimited </u> of virtual machines that can be connected to a virtual network.

<h3>What is a virtual machine employed for?</h3>

Virtual machines (VMs) allow a business to run an operating system that conducts like a thoroughly separate computer in an app window on a desktop.

<h3>What is a virtual machine in simple words?</h3>

A virtual machine (VM) is a virtual domain that functions as a virtual computer system with its CPU, memory, network interface, and storage, constructed on a physical hardware system (located off- or on-premises)

To learn more about Virtual machines , refer

brainly.com/question/26771683

#SPJ4

4 0
1 year ago
Please Help Me <br> Why is IT important to different businesses?
Vesna [10]

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

Explanation:

your welcome but ew..

6 0
3 years ago
Kurtz &amp; Kemeny created an easy-to-learn programming language called?
vampirchik [111]

BASIC

(Beginners' All-purpose Symbolic Instruction Code)

4 0
3 years ago
List 4 (four) applications you have used that most likely employed a database system to store persistenet data
ANEK [815]

Four applications that most likely employed a database system to store persistent data are:

  1. Banking
  2. Airlines
  3. Universities
  4. Online news sites

<h3>What is a persistent data?</h3>

A persistent data can be defined as any type of data that comprises an information that is durable, rarely accessed and isn't likely to be modified, even when the parent application is accessed and altered.

In Computer technology, four (4) real-life applications that most likely employed a database system for the storage of persistent data include the following:

  1. Banking
  2. Airlines
  3. Universities
  4. Online news sites

Read more on data here: brainly.com/question/14788007

#SPJ1

6 0
1 year ago
Other questions:
  • Select Packet 10 in the Wireshark top pane and then answer the following questions: Did this handshake complete properly? What i
    7·1 answer
  • A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of m
    9·1 answer
  • which of the following statements about matter is true a.matter is anything that occupies space and possesses mass b.matter can
    5·2 answers
  • Random Access Memory is tempory computer memory that stores works in progress
    7·1 answer
  • I need help with cisco please
    12·1 answer
  • ______________ is a raw fact about a person or an object
    6·1 answer
  • ⣠⣤⣤⣤⣤⣤⣶⣦⣤⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀
    12·2 answers
  • In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynom
    10·1 answer
  • Pie charts are best used for
    5·1 answer
  • Input two numbers and print their sum products difference division and remainder​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!