1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
4 years ago
11

Computing devices are everywhere and sometimes taken for granted in our lives. As a business professional who uses technology, y

ou will likely encounter technology in many places. Think about your future career and the types of technology you might encounter. What types of computer technology do you think you will encounter in your chosen career in the next 10 years? Why do you think it is important to understand and be proficient with this technology?
Computers and Technology
1 answer:
slava [35]4 years ago
7 0

Answer:

There are many computer technologies that are growing exponentially on daily basis and will be the need of almost every person in the future. Few of them are given below.

  1. Block Chain Computing
  2. Big Data
  3. Cloud Computing
  4. Artificial Intelligence
  5. Internet of things
  6. Augmented reality
  7. Machine Learning
  8. Super computing
  9. Image processing
  10. 3D Printing

Explanation:

All the above mentioned technologies are growing technologies and will be helpful to grow your career in next ten years.

As a computer Engineer, I think, I should be expert in the fields of Artificial intelligence and Internet of things. The reason to choose these field is that all the future products that are comprised of electronic components have a significant involvement of artificial intelligence and internet of things. These technologies will help to grow my career and will lead to make me successful in my life.

You might be interested in
IF SOMEONE HELPS ME BY ANSWERING I WILL BECOME FAMOUS AND SO WILL YOU
Darya [45]

Answer:

A

Explanation:

If complete information means it has evidence and data as well as information and observations then yes, that is your answer. If it does not, then D would be your answer

7 0
3 years ago
Need this!!
Galina-37 [17]

Answer

Peer-to-peer network

Explanation

Social media video sharing networks a platform which is an entertainment based where members can share videos in a site. it allows easy integration with other social networking platforms to share and watch videos. To start  a social media video sharing network, Rebecca  is required to set up a Peer-Peer Network.

Peer-Peer network is created when two or more computers are connected and they are sharing resources without going through separate servers. That is a couple of computers are  connected via a Universal Serial Bus to transfer files.


3 0
4 years ago
Read 2 more answers
Write a program that asks the user for two file names. The first file will be opened for input and the second file will be opene
Wewaii [24]

Answer:

#include <iostream>

#include <fstream>

#include <string>

using namespace std;

int main()

{

//First we declare string variables to store file names for input and output

   string inputName;

   string outputName;

   string sentence;

// Then declare char variable to get current char

   char ch;

//The following section will prompt theuser to enter the file names and read

   cout << "Enter input file name:\n";

   cin >> inputName;

   cout << "Enter output file name:\n";

   cin >> outputName;

//ignore newline character left inside keyboard buffer

   cin.ignore();

//Next we define the input and output files to be opened

   ifstream inputFile(inputName);

   ofstream outputFile(outputName);

   if(!inputFile && !outputFile){

       cout << "Error while opening the files!\n";

       cout << "Please try again!\n";

       //end program immediately

       return 0;

   }

//Using this loop to get lines one by one, delimited by '.'

   while(getline(inputFile, sentence, '.')){

       //bool variable to store if we have already

       //printed capital first letter

       bool alreadyCapitalized = false;

       //Using of for loop on all characters of sentence

       for(int counter = 0; counter < sentence.length(); counter++){

           //if not alphabetical character,

           //so whitespace or newline, print as is

           if(!isalpha(sentence[counter]))

               outputFile << sentence[counter];

       //Condition statement for if it is alphabetical and no capitalization has been done, print it as uppercase

           if(!alreadyCapitalized && isalpha(sentence[counter])){

               outputFile << (char)toupper(sentence[counter]);

               alreadyCapitalized = true;

           }

           //otherwise print this condition as lowercase

           else if(alreadyCapitalized)

               outputFile << (char)tolower(sentence[counter]);

       }

       //Printing of the output sentence with period in the end

       outputFile << ".";

   }

   //Closing the files

   inputFile.close();

   outputFile.close();

   return 0;

}

5 0
3 years ago
Available in insert tab name them​
Vladimir [108]
What? Is there a question or attached work?
5 0
4 years ago
5.Give an example of a situation in which ordinary pipes are more suitable than named pipes and an example of a situation in whi
rodikova [14]

The use of ordinary pipes is effective when you want to establish communication between two processes on the same machine. The use of named pipes is more suitable when you want to establish communication with a network.

<h3 /><h3>What is a pipe?</h3>

Corresponds to a unidirectional communication technique between processes with a common ancestor in Linux and UNIX operating systems. Each pipe is able to communicate by sending a sequence of bytes to the other system.

Therefore, to communicate with a network, it is necessary to use named pipes that are used for requests from other processes similar to TCP/IP ports.

Find out more information about computer programming here:

brainly.com/question/23275071

4 0
3 years ago
Other questions:
  • Describe three ways to protect the computer and all peripheral devices from damage
    5·1 answer
  • How did people find the first ever piece of tech?
    6·1 answer
  • How can development in ICT be utilized to speed up the development and integration efforts
    5·1 answer
  • Fallon is a new student on campus. Everywhere she goes, she is asked for her 12-digit student number. To memorize her new studen
    10·1 answer
  • Intranets:
    8·1 answer
  • Karen wants to create a program that will allow the user to input their age. Which of these lines of code should be used?
    11·1 answer
  • I think i have a virus on my computer what am i supposed to do
    10·1 answer
  • Jjhb ft fv tuning Denise l Debbie
    9·1 answer
  • How to remove a course from your canvas calander feed.
    11·1 answer
  • Question 5 of 50
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!