1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
5

Explain four social and ethical implication ofcomputerization in the society (8marks)​

Computers and Technology
1 answer:
V125BC [204]3 years ago
5 0

Answer:

Computing technologies, like most other forms of technology, are not socially neutral. They affect and are themselves affected by society. Computers have changed the way people relate to one another and their living environment, as well as how humans organize their work, their communities, and their time

You might be interested in
Proper __ management is essenciales for meeting project deadlines​
trapecia [35]

Proper  Project management is essential for meeting project deadlines.

4 0
3 years ago
Define a function OutputValues() that takes two integer parameters and outputs all integers between the first and the second par
iris [78.8K]

Answer:

#include <iostream>

using namespace std;

void OutputValues(int n1, int n2) {

 for (int i = n1; i <= n2; i++) {

   cout << i << endl;

 }

}

int main() {

 int num1;

 int num2;

 cin >> num1 >> num2;

 OutputValues(num1, num2);

 return 0;

}

Explanation:

8 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
When does the VB.NET programming environment start to operate?
drek231 [11]

Answer:

B. once a VB.NET project is created in the Microsoft Visual Studio environment.

Explanation:

Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.

5 0
4 years ago
What does the word tolerance mean in textiles?
Firdavs [7]
It means the willingness to respect or except thecustoms, beliefs, or opinions of others
4 0
3 years ago
Other questions:
  • A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
    14·2 answers
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • ?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
    7·1 answer
  • How do u make a bored builder
    8·2 answers
  • Peter wants to protect a confidential document by using a password. He wants to use an asterisk and an ampersand symbol in his p
    10·1 answer
  • Que quiere decir analogico
    6·1 answer
  • What is being identified when antibodies stick to pathogens during immunostaining?
    11·1 answer
  • Sandi wants to check the average grades in her classroom. Which loop or algorithm should she use?
    8·1 answer
  • What is the quickest way to change the format of a table?
    8·2 answers
  • Doctrine Creative is a video production company with its own file server within its business office. The company needs to be abl
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!