1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
12

describe the impact of technology in your life . how does it affects your human relations with other people .​

Computers and Technology
1 answer:
Jlenok [28]3 years ago
5 0

Answer:

Technology has a huge impact on my life, it has helped me visit places, talk to people, and captivate me. For example, using a car I have visited my friends and family. This is making a stronger bond with those people I visited. And, using my phone I can call and text people. this has led to making lots of friends and stronger relationships. Technology is important for human contact unless you want to ride carriages around the streets.

You might be interested in
What is a protocol and what are the types of protocol​
wlad13 [49]
A protocol is a set of rules that governs the communications between computers on a network.

1. HTTP or HTTPs. This stands for Hypertext Transfer Protocol or Hypertext Transfer Protocol (secure).

2. FTP (File Transfer Protocol)

3. Email Protocols (POP3, IMAP, SMTP)

4. TCP(Transmission Control Protocol) and UDP(User Datagram Protocol)

Hoped that helped
3 0
4 years ago
Read 2 more answers
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
A cathedral hull allows the boat to do what
Hoochie [10]
It allows power boats to have stability while cruising. The cathedral hull  is like a trimaran in terehat it has one main  and two side hulls stuck together so that has a somewhat square to rectangular shape and therefore exhibits greater stability than a single hulled boat. It became more popular with the advent of fibreglass boats in the 1960's and '70s.
5 0
3 years ago
How many possible password of length four to eight symbols can be formed using English alphabets both upper and lower case (A-Z
Fynjy0 [20]

Answer:

In a password, symbol/characters can be repeated. first calculate the total

symbols which can be used in a password.

So there are total 26(A-Z),26(a-z),10(0-9) and 2(_,$) symbols.

that is equal to 26+26+10+2=64.

Total number of password of length 4:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64=16777216

Total number of password of length 5:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64*64=1073741824

Similarly,

Total number of password of length 6:

64*64*64*64*64*64=68719476736

Total number of password of length 7:

64*64*64*64*64*64*64=4398046511104

Total number of password of length 8:

64*64*64*64*64*64*64=281474976710656

Hence the total number of password possible is:285,942,833,217,536

7 0
4 years ago
shana is keeping track of the expenses as deductions for her business when she files paperwork at the end of the year. What is s
Monica [59]

Shana I think is working on taxes

6 0
4 years ago
Read 2 more answers
Other questions:
  • public class BaseballTeam { private String city, mascot; private int numberOfPlayers; @Override public boolean equals(Object obj
    10·1 answer
  • How many nibbles are in 18 bytes??
    5·1 answer
  • Which is missing in most areas that do not have Karst topography?
    10·2 answers
  • 50 points, and brainliest if u get it right!
    13·1 answer
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to
    12·1 answer
  • Justify the need for branching and jump codes in the instruction set using real world scenarios
    6·1 answer
  • Definition of the term social factor and explain why texting while driving can be classified as a social factor causing accident
    6·1 answer
  • True or False: Reader Accounts are able to extract data from shared data objects for use outside of Snowflake.
    14·1 answer
  • How has the internet improved business communication worldwide
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!