1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
10

Technology has had

Computers and Technology
1 answer:
GalinKa [24]3 years ago
3 0

Answer:

c increase in impact

Explanation:

technology is the thing u using now to ask this question

You might be interested in
Which website is important for hacking
Yuliya22 [10]

Answer:

Here's a few

Explanation:

  • SQL Injection attacks. SQL Injection attack is the most common website hacking technique. ...
  • Cross Site Scripting (XSS) ...
  • Denial of Service (DoS/DDoS) ...
  • Cross-site request forgery (CSRF or XSRF) ...
  • DNS Spoofing (DNS cache poisoning) ...
  • Social engineering techniques.

Glad I could help!!

6 0
3 years ago
Observation and screening data should not influence curriculum development true or false?
Anton [14]

Answer:true

Explanation: we cant rely on computers

8 0
2 years ago
Prepare the truth table for the following boolean expressions: (A+B).(A+C).(B)
KiRa [710]

Answer:

July and December of last month were considered sedt Monday linng

6 0
3 years ago
Which code results in a ValueError?<br><br> int('seven')<br> float(2.5)<br> int(7)<br> 8 / 0
SOVA2 [1]

Answer:

Int(‘seven’)

Explanation:

Took one edg

6 0
3 years ago
Read 2 more answers
Differentiate between childhood socialization and adulthood socialization ​
AveGali [126]

Answer:

In adolescence, socialization is concerned with the development of overarching values and the self-image. In adulthood, socialization involves more overt and specific norms and behaviors, such as those related to the work role as well as more superficial personality features.

6 0
3 years ago
Other questions:
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    5·1 answer
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • A cell in a spreadsheet can contain _________?
    12·1 answer
  • An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
    11·1 answer
  • The countryside presents
    11·1 answer
  • (1) Prompt the user to input an integer between 32 and 126, a float, a character, and a string, storing each into separate varia
    7·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • Which of the following can computer maintenance software determine?
    6·1 answer
  • A computer is made up of hardware and software ​
    5·1 answer
  • Are used in the Excel application to create calculations
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!