1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rufina [12.5K]
3 years ago
14

2) List three (3) negative impact of Technology on society

Computers and Technology
1 answer:
Nataly [62]3 years ago
5 0

Answer:

1. social media and mobile devices may lead to psychological.

2. They may contribute to more serious health conditions such as depression.

3. The overuse of technology may have a more significant impact on developing children and teenagers.

Explanation:

may this help you have a good day

You might be interested in
How can these requirements be met? Universal Containers conduct evaluations of their sales reps using a custom object consisting
Rudik [331]

Answer:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security

Explanation:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security.

The reason the answer is B is because if access is provided through a hierarchy, it will give access to all the users at the higher manager role for the records of every executive. Also the options provided do not state clearly if Grant access using hierarchy is also checked so we cant assume that.

4 0
4 years ago
You are in the process of replacing the toner cartrige for a laser printer. however, you notice that toner particles have been s
makkiz [27]

Answer:

Toner vacuum

Explanation:

In the process of replacing the toner cartrige for a laser printer, whenever you notice that toner particles have been split inside the printer, what you should use to effectively remove these particles is a TONER VACUUM, it is a device specially created for that purpose, after using a toner vacuum, you can use the activated toner clothe to clean the rest, after which I will advise you to use an aerosol spry to get the best result.

8 0
3 years ago
Which statement is true with regard to project scheduling?
Lubov Fominskaja [6]
A is true because sometimes scheduling doesn’t work out. It’s all about how you plan your project out.
8 0
2 years ago
Read 2 more answers
Determining which computer platform (operating system) would be best for a particular student often depends on what the student
leva [86]

Answer: Window OS

Explanation:

Based on the information given, it should be noted that the students who plan to study graphic design should consider the Window OS platform since it is considered to be the industry standard in those fields.

Microsoft Windows, also refered to as the Windows OS, is a computer operating system that's developed by Microsoft to run personal computers. It has the first graphical user interface and also, the Windows OS dominates the personal computer market.

4 0
3 years ago
When someone uses your personal information to pose as you this is
Alborosie

Answer: identity theft

Explanation: identity theft is when somebody poses as you, not to be confused with identity fraud, which is when somebody takes your personal information (such as a credit card) to do things in your name.

7 0
2 years ago
Other questions:
  • Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
    5·1 answer
  • Networking Gadgets, Inc. currently employs eight people but plans to hire 10 more in the next four months. Users will work on mu
    10·1 answer
  • What are the data types used in C programming with examples
    5·1 answer
  • Which of the following could result from heat being transferred to a substance?
    14·1 answer
  • Write a program that asks the user to input a set of floating-point values. When the user enters a value that is not a number, g
    7·2 answers
  • What are the advantages of businesses using Twitter ?
    12·1 answer
  • The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
    6·1 answer
  • In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote acce
    15·1 answer
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!