1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
14

How does the technology affect you daily living? Give situations where you use technology and how it helped you.​

Computers and Technology
1 answer:
Lena [83]3 years ago
7 0

Answer:

Technology affects the way individuals communicate, learn, and think. It helps society and determines how people interact with each other on a daily basis. Technology plays an important role in society today. It has positive and negative effects on the world and it impacts daily lives. We are living in an era where technological advances are common. The internet and cell phones are some examples. However, with technological advances, there’s a downside to it all.

You might be interested in
11. SQL Output III
borishaifa [10]

Answer:

wertweabcd

Explanation:

The LPAD() function left-pads a string with another string, to a certain length.

LPAD(string, length, lpad_string)

Parameter Description

string: Required. The original string. If the length of the original string is larger than the length parameter, this function removes the overfloating characters from string

length: Required. The length of the string after it has been left-padded

lpad_string: Required. The string to left-pad to string.

In example;

SELECT LPAD("SQL Brainly", 20, "ABC");

Output : ABCABCABSQL Brainly

4 0
2 years ago
Which of the following statements about global variables is true? 1.A global variable is accessible only to the main function. 2
Korvikt [17]

Answer:

A global variable can have the same name as a variable that is declared locally within the function.

Explanation:

In computer program, we refer to a global variable as that variable that comes with a global perspective and scope, ensuring its visibility throughout the program, except it is shadowed. The set of this kind of variable is referred to as global state or global environment. One feature of global environment is that it can have similar name as a variable declared locally within the function.

7 0
3 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
erastovalidia [21]
One challenge is that arranging things in simple folders creates a limited structure that obstructs the way that would perfectly suit your needs. Any information that is dependent on those folders can easily get lost by removing as much as a simple image from that folder, in the events that the information is dependent on the folder structure.
7 0
3 years ago
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
PLZ ANSWER I WILL GIVE BRAINLIEST
scoray [572]

Answer:

The correct answer is A, spreadsheets. Spreadsheet programs are similar to and include Excel, with grids of cells for organizing numerical data

7 0
3 years ago
Read 2 more answers
Other questions:
  • 5. How do vector graphics used with CRT technology work? List at least one of vector graphics’ advantages over raster graphics,
    9·1 answer
  • Which mode can students use to ensure that their information is not saved in their Chrome browser
    15·1 answer
  • Compare and contrast the various options that exist for acquiring software.
    12·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Witch of the following is a malicious program that can replicate and spread from computer to computer?
    13·1 answer
  • Consider the following code segment.
    12·1 answer
  • C++ Proagram
    7·1 answer
  • Why is it important to ensure that your software is up to date?
    13·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·1 answer
  • Given the following: int funcOne(int n) { n *= 2; return n; } int funcTwo(int &n) { n *= 10; return n; } What will the follo
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!