1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
2 years ago
14

State and explain five misused of science and technology​

Computers and Technology
1 answer:
Nonamiya [84]2 years ago
5 0

Answer:

1. Perpetration of violence

2. Breach of privacies

3. Replacement of human labor

4. National threats

5. Devotion of excessive time to technologies

Explanation:

The advent of science and technology have come with lots of benefits to man. Some of these benefits include, the invention of phones, electricity, the internet and social media, satellites, drones, etc. However, science and technology have been misused in the following ways;

1. Perpetration of violence: Weapons of war have caused the mass destruction of more people than was obtainable before. To aid these activities the fast means of communication and transportation cause seamless operations.

2. Breach of privacies: People with technical knowledge have the ability to intrude into the privacies of others. They can obtain information that was not originally meant for them.

3. Replacement of human labor: Machines and equipment have reduced the number of humans that were gainfully employed prior to the advent of these technologies.

4. National threats: Nations and governments now threaten their counterparts with the deployment of missiles. These attitudes aid international conflicts.

5. Devotion of excessive time to technologies: Teenagers most especially have developed an overdependence on technologies. A lot of time is now spent on phones, thus causing the neglect of social relationships.

You might be interested in
The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
baherus [9]

Answer:

thanks

Explanation:

5 0
3 years ago
You would like to put the data in order by product number. What should you do?
Dafna11 [192]

If someone wants to put data in order (ascending or descending) they should sort the data.

c. Sort

<u>Explanation:</u>

Sorting is the process of arranging the data on the basis of some property or attribute. Using the find command, conducting a query, and mapping the data would not help.

There are various sorting algorithms like the bubble sort, selection sort, insertion sort, quick sort, and merge sort. Out of all the attributes, one or a combination of attributes can be selected to serve as the basis for sorting.

8 0
3 years ago
Question #4
Nataliya [291]
A is your answer.............
3 0
3 years ago
When listing columns in the select list, what should you use to separate the columns?
Gala2k [10]
The answer is commas.  <span>When listing columns in the select list, commas should be used to separate the columns.</span>
6 0
3 years ago
Under which command group will you find the options to configure Outlook rules?
stiks02 [169]

Answer:

Move

Explanation:

I hope that helps :)

4 0
2 years ago
Read 2 more answers
Other questions:
  • The ____ contains methods that allow you to set physical properties such as height and width, as well as methods that allow you
    14·1 answer
  • If num is an int which expression always evaluates to true if num holds an odd number
    14·1 answer
  • What are interpersonal skills?
    12·2 answers
  • What do you think was the immediate effect of the introduction of handheld consoles and video games?
    6·1 answer
  • What are the four common tags used on webpages?
    11·1 answer
  • Devon would like to install a new hard drive on his computer. Because he does not have a SATA port available on his motherboard,
    7·1 answer
  • T F Changes to a function parameter always affect the original argument as well.
    15·1 answer
  • Explain the term information security?​
    9·1 answer
  • The field names in a database are also known as__?
    12·2 answers
  • A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!