1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
12

Discuss positive and negative impacts of computers to our economy

Computers and Technology
1 answer:
NeX [460]3 years ago
4 0
Positive: they have enable individuals,small groups,visibility and opportunities as big businesses

Negative: poor eye sight, obesity & weight loss and premature aging
You might be interested in
Which type of financial institution typically has membership requirements?
zheka24 [161]
The answer is online commercial banking :)
7 0
4 years ago
Read 2 more answers
Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data
Katena32 [7]

Answer:

Data management.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

7 0
3 years ago
For what reason can security risks never be fully eliminated?​
raketka [301]

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

7 0
3 years ago
Have you ever tried using such a camera?​
guapka [62]

Answer: yeah i mean i use my canon camera

Explanation:

7 0
3 years ago
In Joan Woodward's study of the relationship between technology and structure, the structure that was the most technically compl
Arturiano [62]

Answer:

<em>Continuous Process Production</em>

Explanation:

In a study on the relationship between  industrial structure and performance, conducted by <em>Joan Woodward</em> from 1950 to 1959,  

she classified technology into <em>three groups</em>:  

  1. <em>Small batch and Unit technology  </em>
  2. <em>Large batch and Mass production </em>
  3. <em>Continuous process production </em>

She came to a  conclusion that the <em>continuous process production was the most complex</em> and  unit technology as the least.

4 0
3 years ago
Other questions:
  • The North American Free Trade Agreement (NAFTA) among Canada, Mexico, and the United States is intended to _____.
    5·2 answers
  • How do media and networks interact
    11·1 answer
  • In a system using the relocatable dynamic partitions scheme, given the following situation (and using decimal form): Job Q is lo
    5·1 answer
  • 1. What is JavaScript?
    15·1 answer
  • Today's Apple Mac computers run with the same internal hardware as the Windows-based PC.
    10·2 answers
  • An organization is conducting a study to see if hazardous waste sites pose health risks for cancer or other conditions, such as
    12·1 answer
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • All the network nodes are connected to each other
    8·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!