1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
14

152what is the role of Computer astransforming agent in theInformation society.​

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
8 0
I have a question what grade are you in
You might be interested in
A 'deny any-any' rule in a firewall ruleset is normally placed: a. Nowhere in the ruleset if it has a default allow policyb. Bel
tia_tia [17]

Answer:

D. . At the bottom of the ruleset

Explanation:

The main purpose of firewalls is to drop all traffic that is not explicitly permitted. As a safeguard to stop uninvited traffic from passing through the firewall, place an any-any-any drop rule (Cleanup Rule) at the bottom of each security zone context

6 0
4 years ago
➪ How many types of Engineering are there in the world ?<br>⛄​​
aleksley [76]

There are mainly five types of engineers found in the world. Each of them has a different set of skills and knowledge concerning their relative field.

<h3>Who is called an Engineer?</h3>

An Engineer may be defined as an individual who formats, designs, modifies, and creates machinery or technical equipment like software programs, construction buildings, bridges, etc.

The five types of Engineers are as follows:

  • Civil Engineers.
  • Chemical Engineers.
  • Electrical Engineers.
  • Mechanical Engineers.
  • Computer Engineers.

Civil engineers deal with the construction of buildings, bridges dams, airports, etc. Chemical engineers are associated with developing the products such as medicines, petrochemicals, plastics, etc.

Electrical engineers design and develop the manufacturing of electrical equipment like navigation systems, radar, communication systems, electric motors, etc.

Mechanical engineers always maintain their focus on manufacturing power-producing and power-using machines like electric generators, gas turbines, refrigerators, air-conditioners, etc.

Computer engineers deal with designing, manufacturing, and examining all software operated within an institution's computer system.

All such types of engineers work in their respective fields for designing, and manufacturing products and their delivery which makes the life of an individual easy, efficient, and reliable.

Therefore, it is well described above.

To learn more about Engineers, refer to the link:

brainly.com/question/17169621

#SPJ1

5 0
2 years ago
Read 2 more answers
How does the Lossy file format reduce the file size?
beks73 [17]

The answer is c. I just took it on apex n that’s what I got lol

3 0
4 years ago
Read 2 more answers
5. What will be displayed when this program finishes running?
Vika [28.1K]

Answer:5 i think im not sure though

Explanation:

8 0
3 years ago
Read 2 more answers
5. This is a variable that controls the number of iterations performed by a loop. a. loop control variable b. accumulator c. ite
NNADVOKAT [17]

what is the ropeak??need only one Ans the 2nd Ans will be reported.

4 0
4 years ago
Other questions:
  • LAN security policies center on issues concerning connectivity; this includes determining how devices adhere to the network. Amo
    14·1 answer
  • You are troubleshooting an IEEE 802.11 wireless client device that cannot connect to the wireless network. You notice the client
    14·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • 4. What are five actions you should do to care for your camera?
    15·1 answer
  • Convert 15 from decimal to binary. Show your work.
    14·1 answer
  • Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
    14·1 answer
  • Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able t
    13·2 answers
  • B) Develop a truth table for expression AB+ C.
    10·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
  • he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!