1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
13

Can anyone help explain this?

Computers and Technology
2 answers:
alexandr1967 [171]3 years ago
6 0
Today’s technology, we can talk to people easier. We find answers quicker. We have so many more features. Like games our phones for entertainment. What makes technology so unique is that it has easily mobility to bring it anywhere. They education, entertain, and help us communicate...
Idekkkkkkkk
deff fn [24]3 years ago
5 0

Answer:

yes they are more advanced and they continue making more technology

Explanation:

You might be interested in
8.
mario62 [17]

Answer:

<em>Lillipop</em>

Explanation:

If you have your hands correctly placed on the keyboard, the only hand needed to type the word, "lillipop", is the left hand!

<em>Hope I was of Assistance</em><u><em> #SpreadTheLove <3</em></u>

5 0
3 years ago
There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a
spayn [35]

Answer:

The answer is True

Explanation:

Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.

When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.

6 0
3 years ago
Pros and cons of using the internet
MAVERICK [17]
It is easy to find information, but it is not always right.
7 0
3 years ago
Read 2 more answers
Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
AleksAgata [21]

Answer:

Access Office Equipment is implementing a growth strategy.

Explanation:

Growth strategy can be defined as the strategy whose goal is to win market shares in a greater quantity. The earnings in growth strategy might be short-termed. The common growth strategies include:

  • product expansion
  • market expansion
  • market penetration
  • acquisition and diversification

I hope it will help you!

4 0
4 years ago
1. In your own words, describe the purpose of a for a loop.
Talja [164]

A for loop is typically used in situations where the number of cycles for the loop is known before hand. One thing that uses for loops is video rendering software, it uses it to render each file and allocate each rendered file to its specified destination.

5 0
3 years ago
Other questions:
  • Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in
    11·1 answer
  • Create a Flash Card class. Flash Cards have a Question and an Answer, each of which are Strings. Your class should include a con
    6·1 answer
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • I need topics/suggestions for a highschool survey.
    6·1 answer
  • Which century saw the development of letterpress printing?
    10·1 answer
  • The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
    9·2 answers
  • Anyone wanna hop on 1v1.lol<br> party code : usfhb6
    12·2 answers
  • In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to se
    8·1 answer
  • Limited time only for christmas give yourself free 100 points YES YES yes yes yes
    6·2 answers
  • When charlie attaches a file to an email message, the computer's __________ is responsible for managing his access to the locati
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!