1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
6

¿Qué son las tecnologías modernas?

Computers and Technology
1 answer:
Andre45 [30]3 years ago
7 0

Answer:Las tecnologías modernas, son los medios materiales y organizaciones estructurales que sirven para aplicar los recientes descubrimientos científicos. Son un conjunto de instrumentos y de medios que se aplican en los procesos de diferentes ramas de la industria del sector productivo de bienes y servicios.

Explanation:

You might be interested in
Quick Search lets you refine or narrow your search results using links on the right side of the screen. Do a search on nano-mate
Fofino [41]

Answer:

C. by topic.

D. by collection.

4 0
3 years ago
Proxy is a network computer that can serve as an intermediary for connecting with other computers.
Keith_Richards [23]

Answer:Protects the local network from outside access

Explanation:Proxy is a type of serves as the mediator in computer network for connecting the network with the user system. These servers are responsible for maintaining the security against any unauthorized access in the system or internet,privacy and other functions.. It helps in protecting the whole network connection by taking the control at the servers .

8 0
3 years ago
Identify the menu under which you'll find the Header and Footer option.
Genrish500 [490]

The answer is B. View.

4 0
3 years ago
Access fundamentally refers to the ability of a subject and a(n) ___________ to interact.
mars1129 [50]

Answer:

The correct word for the blank space is: object.

Explanation:

Access Control System (<em>ACS</em>) is a computer structure that allows or restricts users to access to features and information of a server. ACS is used to protect confidential data and to make sure the servers are going to be used by authorized users which diminish malfunctions. One of the basic principles of ACS is letting subjects and objects to interact properly.

5 0
4 years ago
Which of these purchases is most likely to be paid for with a credit card
Vesna [10]

Answer:

plane ticket?

Explanation:

7 0
3 years ago
Other questions:
  • What is a good monitor for console gaming? (Any price)
    13·2 answers
  • Universal Containers is setting up an external Business Intelligence (BI) system and wants to extract 1,000,000 Contact records.
    11·1 answer
  • Which does an icon on the desktop signify?
    12·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variabl
    6·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • Match each proofreading mark to the expected result.
    10·1 answer
  • Can someone tell me how to fix the keyboard on ipad?- its in the middle of my screen andd i dont know how to do it
    13·1 answer
  • (True or False) The speed at which data travels on a bus is referred to as the word size.
    6·2 answers
  • This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!