1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
14

Why should technology be used. No plagiarism pls.

Computers and Technology
2 answers:
Anvisha [2.4K]3 years ago
8 0
I have an answer, but it won’t let me type it because it says incorrect answer which is ridiculous. here’s what i had, though
olga nikolaevna [1]3 years ago
3 0

Answer:

Explanation:

mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.

You might be interested in
Write a paper, 2-3 paragraphs that discuss how to defend ideas objectively through effective communication. Include the skills n
mojhsa [17]

Wot in tarnation? -_-

  • how to defend ideas objectively the effective communication
  1. Being clear and concrete so that your point gets across without any ambiguity that might make someone else interpret your idea in the wrong way
  2. Use language that is neutral and does not have any negative or positive connotations that might the listener or reader assume you have a bias
  3. Use evidence and data to back up your claim from reputable sources and not just your own personal opinion

  • Skills to prevent conflicts and promote buy-ins
  1. You need to know how to listen in order to communicate effectively, pay attention to how other people respond to what you say so you can either apologize for your behavior or look out for in the future. Listening also shows that you value the other person's opinion and thus might make them more likely to treat you with the same respect
  2. Encourage other people to buy into your ideas by being confident about them and again using evidence so that people can trust what you're saying has some merit to it.
8 0
3 years ago
Which of the following organizes the commands available in tabs and groups?
xxMikexx [17]

Answer: Ribbon

Explanation:

5 0
3 years ago
An assignment notebook is important because that is where students
lesya [120]
I think it would be D

8 0
3 years ago
Read 2 more answers
Which firmware security standard can be used to store disk encryption keys?A. SLAB. TPMC. UEFID. USB
S_A_V [24]

Answer:

Option B (TPM) is the appropriate choice.

Explanation:

  • A TPM seems to be a specific form of the protected crypto operating system which seems to be a specialized piece of hardware being used to perform cryptographic techniques such as collecting encrypted data to classified material that is typically was used to validate hardware by either the host machine.
  • The pairing is kept or inside the chip as well as therefore can not be software-accessed.

Other alternatives given weren't concerning the circumstance mentioned. So the response to the above seems to be the right one.

4 0
3 years ago
PLEASE HELP ME!!! I NEED THIS ASAP!!!
Brums [2.3K]

Answer:

This rule helps you take eye-catching pictures by using one of the most effective ... If you want to take pictures that have a “wow” factor built in them, the Rule of Thirds is ... Camera shake or blur is something that can plague any photographer and here ... There's no reason why you can't leave it on for all of your photography.

6 0
4 years ago
Other questions:
  • Just giving this a shot, Which of the following statements about RAM are TRUE? Select all that apply.
    10·1 answer
  • Anyone help me with number 41.
    12·1 answer
  • Which layer of the osi model contains tcp protocol, which is used for establishing connections and reliable data transport betwe
    15·1 answer
  • Reversing the elements of an array involves swapping the corresponding elements of the array: the first with the last, the secon
    12·1 answer
  • An important factor to consider when purchasing new software is to investigate how much storage the application and associated d
    8·1 answer
  • During which part of geologic time were dinosaurs most common?
    11·2 answers
  • Which of the following occurs when the amount of money earned is greater than the
    5·1 answer
  • Which of the following is an example of a specialty search engine? a. NexTag b. Wolfram Alpha c. Bing d. Google
    10·1 answer
  • What is the difference between a spreadsheet and word processing software?
    7·2 answers
  • An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!