1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
13

Explain use of information and communication technology in our daily life.

Computers and Technology
1 answer:
lions [1.4K]3 years ago
4 0

Answer:

It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.

<em>That</em><em>'</em><em>s</em><em> </em><em>my</em><em> </em><em>answer</em>

You might be interested in
Which of the following is not considered a system component that can be found inside a computer? A-CPU B-RAM C-PCIe graphics ada
Julli [10]

The answer is C) PCIe graphics adapter, because it is not required for the computer to work.

8 0
3 years ago
What is one purpose of an essay’s conclusion paragraph?
vova2212 [387]
The purpose of the conclusion paragraph is not only to wrap up the essay, but also to show the strong and central points in the essay alone. Since you are wrapping up the essay, it's your final paragraph and you have to clearly state all of your points and what and why the essay is written (depends on what you are talking about). But, the one purpose of an essay's conclusion is to clearly state the central points of the essay.
3 0
3 years ago
What does the word strained mean as it is used in paragraph 16 the story is from where the red fern grows but this are the answe
Luba_88 [7]

Answer:

i just  need points sryYY

Explanation

7 0
3 years ago
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
3 years ago
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • Tower defense is included under which genre of game
    15·2 answers
  • In regards to storing folders the computer can be described as a ________________.
    7·1 answer
  • Page No.:
    11·1 answer
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • "In a web app, where is data usually stored? A. Mobile network B. Application storage C. Local computer D. Cloud storage"
    14·1 answer
  • Pleas help 99 points and get brainliest
    9·2 answers
  • What is the gear ratio?
    12·1 answer
  • Write a method that makes the input string of sentences ending with and
    11·1 answer
  • What are the nuclear codes?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!