1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
3 years ago
9

several ways that we commonly use technology today that people couldn't 10 years ago. Are these uses helpful or harmful to socie

ty overall?
Computers and Technology
1 answer:
amid [387]3 years ago
4 0

Answer:

One big thing is the iphone, it came out in 2005 and it was revolutionary as we all see today. Almost all of us have one but it is a tool. you cant say it is helpful nor harmfull becase like msot things it is about how you use it. althouhg we do not know how it will effect us long term with the low levels radiation.

thats 1 do the res yourself good luck

You might be interested in
Which descnptons are examples of Logistics Planning and Management Services workers? Check all that apply.
Aleksandr-060686 [28]

Answer:

The following below are descriptions of Logistics Planning and Management Services workers:

a. Lucreta supervises workers who organize the products in a warehouse

c. Beatrice sells tickets to passengers for trips, and advises them about travel routes

d.Stephane inspects vencies and equipment to make sure they meet safety standards

d. Marcel oversees the transportation activities of an organization

Explanation:

5 0
3 years ago
If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.
abruzzese [7]

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.

6 0
3 years ago
Write the function longest that, given a nonempty list of strings, finds the longest even-length string that ends with ing. It t
lorasvet [3.4K]

Answer:

  1. def longest(L):
  2.    for x in L:
  3.        if(len(x) % 2 == 0):
  4.            if(x.endswith("ing")):
  5.                return x  
  6.    return ""
  7. print(longest(["Playing", "Gaming", "Studying"]))

Explanation:

The solution is written in Python 3.

Firstly, create a function longest that takes one parameter L as required by question (Line 1).

In the function, create a for loop to traverse through each string in L and check if the current string length is even (Line 2 - 3). If so, use string endwiths method to check is the current string ended with "ing". If so return the string (Line 4-5).

At last, test the function by passing a list of string and we shall get the output "Gaming".

8 0
3 years ago
10. When does teasing become cyberbullying?
Vlad [161]

Answer:

A) When the words, images or videos shift from humorous to hurtful.

Unlike kids who are being bullied, kids who are being teased can influence whether it continues or ends. If they get upset, the teaser usually stops.

4 0
2 years ago
Are the people who delete brainly questions bots or are they real people?
Brums [2.3K]

Hello!

I would have to assume there are real moderators who go to heavily reported questions.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following best describes open source software?
    7·2 answers
  • The wired or wireless means of connecting a computer to the internet is called a ________.
    9·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • Which of the following statements about functional programming languages is incorrect?A) In pure functional programming, there a
    5·1 answer
  • Two processes are running the same program on a computer. The operating system can set up an access restriction on the control
    7·1 answer
  • Rectangular box formed when each column meet​
    11·1 answer
  • What is the widest area network?
    15·1 answer
  • Write the code for the method getNewBox. The method getNewBox will return a GiftBox that has dimensions that are m times the dim
    14·1 answer
  • ______ creates a unique and fixed-length signature for a set of data. It involves converting a numerical input into another comp
    15·1 answer
  • You have studied graphic design, advanced math, and programming, and you
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!