1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
4 years ago
11

Sarah believes that thanks to the ability of science and technology to create progress problems will be solved and life will imp

orve sara would best be desrbied as a_____________.
Computers and Technology
1 answer:
TEA [102]4 years ago
4 0

Answer:

Sarah would best be described as a modernist

Explanation:

A modernist is a person who believe or follow new way of doing things, it could be art work or science and technology. Sarah's believe on science and technology of creating modern way of making progress in problem solving qualifies her to be described as a Modernist.

You might be interested in
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and
sdas [7]

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

8 0
3 years ago
Natalie enjoys talking to people and helping them with their problems. Her friends always tell her that she’s a good listener. B
Akimi4 [234]

Answer:

C and D

Explanation:

The other 3 answers don't even involve talking.

7 0
3 years ago
Read 2 more answers
How many different keys can be used in a single sort?   A. 1   B. 2   C. 3   D. 4
PolarNik [594]
I would belive it be 
C.3
3 0
3 years ago
Read 2 more answers
An attacker on the network intends to overwhelm another computer with icmp packets as follows:
Blizzard [7]
And, the simple answer is to disable ICMP echo requests on either the router or Workstation.
4 0
3 years ago
2. Imagine that the user at computer A wants to open a file that is on computer C's hard disk, in a peer-to-peer fashion. What p
Elis [28]

Answer:

Since there is no server in a peer-to-peer network, both computers will share resources through the network component used in linking them together such as a cable or a switch.

Explanation:

In its simplest form, a peer-to-peer (P2P) network is created when two or more computers (in this case computer A and C) are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files or through an Ethernet cable. A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires using switches as a central connector. Or a P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet.

Please find attached the diagram of the peer-to-peer network of the two computers, computer A and computer. We have two network connections in the diagram.

The first one was implemented using a crossover Ethernet cable to connect both computers through the RJ45 LAN port on their network interface card.

In this network configuration, that will go through the NIC card from Computer C, through the cable to the NIC on computer A and vice versa.

In the second implementation, we used a switch to connect both computers using a straight Ethernet cable.

In this connection, data will go through the NIC card in computer C, through the cable connecting Computer C to the switch, through the switch, then through the cable connecting the switch to computer A and finally through the NIC card on computer A and vice versa

4 0
4 years ago
Other questions:
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Task 2 Design a 1st order low-pass filter with cutoff frequency 1kHz, 1) with roll-off and 2) without roll-off. For each filter,
    10·1 answer
  • Precautionary measures to be observed when using ICT tools​
    15·1 answer
  • What is the definition of Overflow Error?
    5·1 answer
  • Among object-oriented languages, one feature that varies considerably is whether the language allows multiple inheritance. C++ d
    5·1 answer
  • Group of answer choices When declaring a variable, you also specify the type of its values. Variables cannot be assigned and dec
    7·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
    8·1 answer
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!