1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
14

Discuss some of the emerging trends in information technology (e.g. computer hardware, software, data analysis). What impact may

they have on your daily life (e.g., workplace, school, recreation)?
Computers and Technology
1 answer:
zzz [600]3 years ago
6 0

Answer:

<u>Artificial Intelligence</u> and <u>IOT</u>

Explanation:

Great question, this is an important topic in the world today.

One huge emerging trend in the world of information technology today is <u>Artificial Intelligence</u> and <u>IOT also known as the Internet of Things</u>. Artificial Intelligence today can be found in just about any smart device. They are capable of searching the internet instantaneously in order to solve a problem and compare hundreds and thousands of scenarios in a couple of seconds in order to answer questions and solve problems.

Combining this with the Internet of Things , which is a worldwide web of interconnected devices. Artificial Intelligence has the ability to change our world beyond recognition in the next decade, by automatizing everything that requires human involvement to complete today.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Local television news networks cover only
Vika [28.1K]

Answer:

12 percent of international news

Explanation:

Just did it

3 0
3 years ago
Read 2 more answers
2 Write<br>a program to and area of<br>4<br>walls. A = 2h (l+b)​
Zanzabum

Answer:

ADGH AVFH VVBLA FDHLAVRGLBHSRGLHFSgh HGK g gH G avoshhbv so bhsf vhbfsb gfsb gb gh g hhow gw

Explanation:

eehhfhsghOhrrbfghedhchggfgsbbfbhdhfhehyfnfnhhsh

3 0
2 years ago
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
An IT department submits a purchase order to buy a new computer from a vendor. "Purchase orders" are documents issued by buyers
Umnica [9.8K]

Answer:

Procurement

Explanation:

Characteristics hardware lifecycle:

  • Procurement- Acquiring new IT hardware assets involves evaluating vendors, purchase orders, receiving, and device labeling.
  • Deployment - Hardware configuration and installment, placing hardware and software assets into production environments.
  • Maintenance & Support - Management of assets include scheduling scans and getting audit history.
  • Upgrade - Before you retire your IT hardware assets, you’ll reach a processing plateau that can be restored with hardware upgrades.
3 0
3 years ago
Select a cybersecurity career that interests you. Describe the job duties and identify the skills required to excel in that care
kykrilka [37]

Answer:

it's business

Explanation:

business you started with small and work for it grow up.

3 0
3 years ago
Other questions:
  • Write a function getPigLatin(pigStr) that accepts pigStr as a parameter (a sentence as input) and converts each word to "Pig Lat
    8·1 answer
  • A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plan
    13·1 answer
  • Which of the following is an Internet supervisory protocol? O DNS IP O both A and B O neither A nor B
    12·1 answer
  • When you copy a formula that contains an absolute reference to a new location, the reference ____. a. has a dotted outline in it
    6·1 answer
  • Why is a high-quality bond typically considered a lower-risk investment than a stock
    10·2 answers
  • What is the model for 2017 Ford Mustang v6
    15·1 answer
  • PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or _________
    12·1 answer
  • I want to get an output picture in python but it says this. I'm using turtle
    12·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!