1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
4 years ago
5

Evaluate one example of technology how is technology different from science

Computers and Technology
1 answer:
Alexxandr [17]4 years ago
5 0

Though Technology and Science are closely interconnected, there are some differences in both. In simple words we can say technology is the practical application of science in our daily lives to make life easy.<span>
<span>For example the connection of light and human eye in explained in scientific terms but using that process to invent a contact lens for human eye is the work of technology.</span></span>

You might be interested in
Chris has received an email that was entirely written using capitalization. He needs to paste this text into another document bu
dem82 [27]

Select the text you want to alter.

Press Shift+F3. Word changes the case of the selected text.

Continue pressing Shift+F3 until the case is the way you want it.

hope this helps

8 0
3 years ago
Read 2 more answers
What technology would you like to use or see developed that would help you be a "citizen of the world"?
Aneli [31]

Answer and explanation:

While traveling abroad the main barrier to be considered is language. Entrepreneurs should focus special attention on developing mobile apps that interpret people's segments accurately so regardless of the country and language they can communicate through the app and make them feel they are "<em>citizens of the world</em>".

3 0
4 years ago
What functionality can a vulnerability scanner provide that a port scanner cannot?
Rina8888 [55]
<span>Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
</span>port scanner<span> allows testing of open </span>ports and firewalls. It d<span>iscovers open UDP </span>ports<span> on your target system by </span>scanning with NMAP and by doing so it is<span> the first step of a complete </span>vulnerability<span> assessment. </span>
7 0
3 years ago
What are 3 key factors in defining cost on cloud storage
gregori [183]

i'm not sure sorry

I hope someone else can help you with this question

3 0
3 years ago
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
3 years ago
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
    8·1 answer
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • Which type of DNS zone resolves host names to IP addresses?
    8·1 answer
  • In the context of machine learning, an artificial neural network (ANN) is most likely used for:a.supplying explanations for solu
    9·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    13·2 answers
  • How does lower latency benefit the users connected to a network?
    14·1 answer
  • Language is Python
    15·1 answer
  • if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should yo
    6·1 answer
  • Anyone here good with Alice? I need help ASAP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!