1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
13

1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve

n greater impact on your life.
2. Identify one environmental and organizational background imperative of a contemporary technology. How might those conditions have influenced that technology’s development?3. Solve (2011) uses the hammer and an example of his concept polypotency; what are some other examples of familiar artifacts?
Computers and Technology
1 answer:
Mnenie [13.5K]3 years ago
5 0

Explanation:

1- The cell phone is a modern technology that has been developing and gaining new features in addition to being just a device for making phone calls. Currently cell phones perform the same tasks as computers, making it possible to exchange information from the internet, share media, etc.

The development of smartphones will still be significant and will impact even more on the lives of all users, as an essential device for communication at work, and through software developed for cell phones that facilitate human life, such as through the possibility of making purchases , order a taxi, carry out bank transactions, etc.

2- A management information system is a technology aimed at organizations, in order to assist a manager in the decision-making process.

An MIS is an intelligent system that uses a large volume of data and information to generate information and solutions so that a manager has a greater chance of analyzing a scenario in the organization, and makes a more effective decision for the company.

The system is derived from procedures and interaction between people, which generates constant learning and improvement focused on organizational decisions.

MIS was created to assist current organizational management, whose processes derive from a large amount of data and information, in addition to the high competitiveness in the market, which requires decisions to be made quickly, effectively and at the lowest cost.

3- The cell phone and the computer are examples of polypotent technologies, that is, those that are used for purposes greater than those for which they were created, for example, the computer was created to compute data, and the cell phone to make telephone calls, but currently perform functions of being media sharing, communication and leisure equipment.

You might be interested in
The set of rules for how computers talk to one another
andrezito [222]
That is program ............
4 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
Given two input integers for an arrowhead and arrow body, print a right-facing arrow.
Zanzabum

Answer:

I don't know the language this is but here is something that will work for all lang

int num0 = 0;

int num1 = 0;

basically just print the ints in the right dimension

Explanation:

Sorry if I am wrong

I don't know much about this someone else's answer might be better than mine

3 0
3 years ago
Write a subclass named 'ReadWrite' with the following additional behavior: Any necessary constructors. a method named 'setVal' t
nataly862011 [7]

Answer:

Java Class given below

Explanation:

class ReadOnly

{

protected int val;

public ReadOnly(int arg)

{

val = arg;

}

public int getVal()

{

return val;

}

}

class ReadWrite extends ReadOnly

{

private boolean dirty;

public ReadWrite(int arg)

{

super(arg);

dirty = false;

}

public void setVal(int arg)

{

val = arg;

dirty = true;

}

public boolean isDirty()

{

return dirty;

}

}

6 0
3 years ago
. Html documents are created by adding what to text?
zvonat [6]
The answer is Tags, sorry about putting the other answer misread question.
7 0
3 years ago
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • What is computer engineering?
    11·1 answer
  • Which task manager tab provides details about how a program uses system resources?
    14·1 answer
  • Consider the following protocol for concurrency control. The database system assigns each transaction a unique and strictly incr
    6·1 answer
  • In order for Dr. Reynolds to send a CPOE from her office computer system to the computer system at the local hospital, a/an ____
    5·1 answer
  • When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a fil
    10·1 answer
  • python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
    5·2 answers
  • "Save" or "save as" can be used interchangeably and have no unique features.<br> True<br> False
    12·2 answers
  • Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exe
    10·1 answer
  • Write down 5 tips that an office can use to be more sustainable and reduce wastage? Write a description of each one and how it r
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!