1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
2 years ago
15

How did technological artifacts evolved over time?

Computers and Technology
1 answer:
adell [148]2 years ago
3 0
With helping us communicate with each other and around the world with the internet and other different types of things like,Tesla’s,phones,touch screen IPads,even having a built in TV plane
You might be interested in
The syntax for accessing a class (struct) member using the operator -> is ____.
weqwewe [10]

Answer:

B. pointerVariableName->classMemberName

Explanation:

The syntax for accessing a class (struct) member using the operator -> is pointerVariableName->classMemberName.

7 0
3 years ago
Read 2 more answers
An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values
bonufazy [111]

Answer: Integrity loss

Explanation:

A set of data is said to have experienced a Loss of Integrity if some event has caused it to be incorrectly altered

7 0
3 years ago
What does the phrase at the drop of a hat mean?
umka2103 [35]

Answer:

When you use the expression 'At the Drop of a Hat' you mean that something is happening instantly, without any delay. Example of use: “We're all packed and ready to go; we can leave at the drop of a hat.”

Explanation:

Hope this helped!!  :)

Pls thank and maybe brainliest??

5 0
3 years ago
Read 2 more answers
There is a feature that allows you to lock the document, to avoid others making changes. True or False
Burka [1]

Answer:

yes there is

Explanation:

6 0
3 years ago
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
Other questions:
  • What role do career pathways play?
    11·2 answers
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • What is it called when you make a reference in the text of a document alerting the reader that you are using information from an
    10·1 answer
  • What is wrong with line 1?
    14·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • A company has its branches spread over five places in a state. It has become difficult for employees to transfer information and
    7·1 answer
  • Use the Windows ________ to check on a nonresponsive program. Select one: A. Backup utility B. Task Manager C. System Restore D.
    10·1 answer
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • Which tool can be used to increase the space between a bullet point or a number and text?
    11·2 answers
  • A small square at the right corner of the table is what?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!