1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
2 years ago
8

Does technology always follow the science, yes or no and explain the reason your choice

Computers and Technology
1 answer:
kari74 [83]2 years ago
7 0

Answer:

<h2>NO</h2>

Explanation:

<h2>because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.</h2><h2>Mark me brainliest plz</h2>
You might be interested in
A cell reference that has only one $ is referred to as a(n) ____ cell reference. alternative mixed relative absolute
Allushta [10]
An absolute cell reference.
4 0
3 years ago
I am a new linux and unix system user. how do i find out the user and groups names and numeric ids of the current user or any us
Paha777 [63]

By using id we can discover out the user and groups names and numeric ids of the current user or any users on my server.

<h3>What is Linux and Unix system user?</h3>

Linux exists as a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux exists typically packaged in a Linux distribution.

Linux is utilized in the following ways: Server OS for web servers, database servers, file servers, email servers, and any other type of shared server. Designed to sustain high-volume and multithreading applications, Linux exists well-suited for all kinds of server applications. Desktop OS for personal productivity computing.

Unix exists as a modular OS made up of several important components, including the kernel, shell, file system, and a core set of utilities or programs. At the heart of the Unix OS stands the kernel, a master control program that furnishes services to start and end programs.

A unique code, often machine-generated, uniquely describes a provided physical device or machine. Often license rights exist locked to a given Computer ID so that those rights stand only valid for that specific machine.

Hence, By using id we can discover out the user and groups names and numeric ids of the current user or any users on my server.

To learn more about Unix system user refer to:

brainly.com/question/9362230

#SPJ4

3 0
1 year ago
What are the two main things an operating system does?
FromTheMoon [43]
Hello,

A computers operating system manages the software and hard ware on the computer.

Thanks for using brainly.
4 0
3 years ago
In this lab, you will create a programmer-defined class and then use it in a Java program. The program should create two Rectang
prohojiy [21]

Answer:

class Rectangle{

//private attributes of length and width

private double givenLength;

private double givenWidth;

// constructor to initialize the length and width

public Rectangle(double length, double width){

 givenLength = length;

 givenWidth = width;

}

// setter method to set the givenlength

public void setGivenLength(double length){

 givenLength = length;

}

// setter method to set the givenWidth

public void setGivenWidth(double width){

 givenWidth = width;

}

// getter method to return the givenLength

public double getGivenLength(){

 return givenLength;

}

// getter method to return the givenWidth

public double getGivenWidth(){

 return givenWidth;

}

// method to calculate area of rectangle using A = L * B

public void calculateArea(){

 System.out.println("The area of the rectangle is: " + getGivenLength() * getGivenWidth());

}

// method to calculate perimeter of rectangle using P = 2 * (L + B)

public void calculatePerimeter(){

 System.out.println("The perimeter of the rectangle is: " + 2 * (getGivenLength() + getGivenWidth()));

}

}

public class MyRectangleClassProgram{

public static void main(String args[]){

//rectangle1 object is created

Rectangle rectangle1 = new Rectangle(10.0, 5.0);

//rectangle2 object is created

Rectangle rectangle2 = new Rectangle(7.0, 3.0);

//area for rectangle1 is calculated

rectangle1.calculateArea();

//perimeter for rectangle1 is calculated

rectangle1.calculatePerimeter();

//area for rectangle2 is calculated

rectangle2.calculateArea();

//perimeter for rectangle2 is calculated

rectangle2.calculatePerimeter();

}

}

Explanation:

Two file is attached: Rectangle.java and MyRectangleClassProgram.java

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
7 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Other questions:
  • In three to five sentences, describe how good e-mail work habits increase workplace efficiency and productivity.
    12·1 answer
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • You have been given the job of creating a new order processing system for the Yummy Fruit CompanyTM. The system reads pricing in
    8·1 answer
  • A. Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter an hourly pay rate and
    8·1 answer
  • Has anyone on here heard from lilkoadkmillines?
    10·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • 9. Which is an example of a function?<br>(1 Point)<br>=A1 +A2<br>=SUM(A1:A3)<br>=ADD(A1:A3)​
    14·2 answers
  • In Outlook 2016, the Tell Me function can be accessed by
    15·2 answers
  • What is computer assisted translation​
    9·1 answer
  • How much do you think it would cost to develop an app?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!