1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
9

Are chairs and tables considered technology? A) true B) false

Computers and Technology
2 answers:
kumpel [21]3 years ago
6 0

Answer:true

Explanation:

By definition technology is the skills methods and processes used to achieve goals

Mashcka [7]3 years ago
5 0

Answer:

true

Explanation:

this is true because technology is anything that is ment to help mankind. chairs and tables help people. something as simple as the wheel, or shows is also technology.

You might be interested in
Match the elements of a web page with their descriptions?
enyata [817]
The last one is audio, the third one is animation and the first one is graphics so
5 0
3 years ago
Read 2 more answers
What is the purpose of using variables in programming?
Sedbober [7]
Variables are used to store information to be referenced and manipulated in a computer program. ... It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.
6 0
3 years ago
A newspaper wants to estimate the proportion of Americans who will vote for Candidate A. A random sample of 1000 voters is selec
Finger [1]

Answer:

The correct answer to the following question will be "NORM.S.INV".

Explanation:

  • The NORM.IN.V function in Excel determines the opposite of the Cumulative Standard Distribution Function for just a value of x which is given, and the standard deviation and mean of the distribution provided. The probability of NORMINV(mean, probability, standard deviation).
  • In Excel 2010, the standard. S. Inv function is new and is therefore not easily accessible in Excel's earlier versions.

Therefore, NORM.S.INV is the right answer.

5 0
3 years ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
1 year ago
A computer program that enables users to create and work with files and folders is called what?
murzikaleks [220]

Answer:

File manager

Explanation:

From the list of options 1 to 4, only option (2) is correct

Explaining the options one after the other

  • Web browser: It lets users access the internet
  • File Manager: Used to create and manage files/folders
  • User Interface: Means which the user of a computer interacts with the computer
  • File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.

Having explained the options one after the other, <em>the file manager </em>is the answer to this question.

3 0
3 years ago
Read 2 more answers
Other questions:
  • In a database, a collection of related fields that describes some object or activity is referred to as a ____.
    9·1 answer
  • What is after Windows 8.1
    11·2 answers
  • Which information is considered free for use?
    9·2 answers
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • Jason Has A Science Video Project, As He Creats His Project, He Saves, Then Comes Back A Minute Later. The File Is Now Unreadabl
    8·2 answers
  • A computer has a pipeline with four stages. Each stage takes the same time to do its
    8·1 answer
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
  • James root lol ........................
    12·1 answer
  • Suppose a large group of people in a room were all born in the same year. Consider the following three algorithms, which are eac
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!