Answer:
Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.
For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.
It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.
In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.
Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.
Explanation:
You are welcome! ;D
can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)
________ is a computer application that enables a firm to combine computerized functions of all divisions and subsidiaries of the firm into a single, integrated software program that uses a single database.
Answer:
Yash Sharma Hemant Kumar
What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;
Answer:
The output of count would be 1.
Explanation:
The first if statement is true. Since 10 > 5
The second if statement is true. Since 20 > 5
So,
count ++; // That increments the variable count by 1
the else statement is not provoked since the if statements were correct.
What is the name of the type of keyboard that contains a coiled spring and a rocker, and provides both tactile and audible feedback.
Answer:
Buckling Spring
Which insert image option allows a user to compile, modify, and add captions to images?
Answer:
c. Photo Album is correct
Explanation:
Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros
The feature of spreadsheets that will help Rohan decide where to invest his money is;
Option A; Solver
Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".
The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results. The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.
Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.
Read more at; https://brainly.com/question/15032995
which of the following are benefits of designing a scalable system? choose 3 options.
-guaranteed systems access for all users
- users may never know that a site has experienced tremendous growth
- ability to respond to user volume issues more quickly
- system will never need to grow again
-ability to maintain a high level of service for customers
to center data in a cell, click the ____ button on the ribbon.
To center data in a cell, click the center button on the ribbon.
Data in a cell can be aligned either horizontally or vertically .
For the horizontal alignments, we have
against the left border, against the right border, and in the centre.For the vertical alignments, we have
against the top border, against the bottom border, and in the middle.To center data, the following steps should be followed.
1.Click the cell where you want to center the data.
2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.
3.Click the drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.
who plays pokemon shield or sword
Answer: I haven’t played but i wanna
Explanation:
Answer:
no
Explanation:
i don't
The illusion of motion created by the consecutive display of images of static elements
Answer:
The term illusory motion, also known as motion illusion, is an optical illusion in which a static image appears to be moving due to the cognitive effects of interacting color contrasts, object shapes, and position.
Explanation:
first what all this about is about animation the creation graphic of cartoons and some sci fi fiction
Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company's IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database
Considering the situation described above, the rogue AP system detection probe that will allow Bob's company's IT department to monitor the airwaves for traffic, amongst others, is Wireless Device Probe.
This is because the Wireless Device Probe possesses a WiFi interface that occasionally produces a wireless probe procedure through the effective transmission of a control frame.
This process is often referred to as 'probe request''.
The purpose of Wireless Device Probe is to ensure that closer wireless access points transmit information about wireless networks that are accessible for connection.
Hence, in this case, it is concluded that the correct answer is "Wireless Device Probe."
Learn more here: https://brainly.com/question/10249897
Which one of the following is not an advantage of using networks?
Ability to share files
Technical knowledge needed
Central maintenance and support
Easier to back up files
Answer:
sorry i don know
Explanation:
Which of the following is a type of equation which returns a value such as TRUE or
FALSE?
A. Argument
B. Expression
C. Nest
D. Control
Answer:
C
Explanation:
True HOPE THIS HELPS BOY/GURL AH
The type of equation which returns a value such as TRUE or FALSE is logical.
Which formula gives the logical value in the form of true or false?A logical value is known to be The TRUE and FALSE functions
An example is if you type “=TRUE()” into a cell, it is said to often return the value TRUE and when you type “=FALSE()” it will also return as FALSE.
Learn more about equation from
https://brainly.com/question/2972832
When using ________ access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.
When using sequential access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.
________ consists of programs designed to work behind the scenes to handle detailed operating procedures.
How can she change that value so it is reflected in the chart in her presentation?
Answer:
She can change the value in the mini- spreadsheet for the chart in PowerPoint.
Explanation:
Answer:
What she said above or below me
Explanation:
Which Windows Server 2016 core technology provides a single interface for installing, configuring, and removing a variety of server roles and features on your Windows server
Answer:
Server manager
Explanation:
Element of Ghanaian Culture that bind the people together
For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.
Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.
Element of Ghanaian Culture that bind the people together are:
Language Their Artifacts Norms and traditions Religion Work, etc.What are the Basic elements of culture in Ghana?The major elements of culture are said to be:
SymbolsLanguage etc.Note that Language is one effective social interaction that binds Ghanaians together.
Therefore,Element of Ghanaian Culture that bind the people together are:
Language Their Artifacts Norms and traditions Religion Work, etc.Learn more about culture from
https://brainly.com/question/25010777
#SPJ6
A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.
Answer:
An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.
You want to allow RDP 3389 traffic into your network for a group of users to access a particular workstation that has a special application in your office. Which endpoint security tool would you use to make this happen
Firewall Rules often monitor the control information that is present in individual packets. The endpoint security tool would you use to make this happen is firewall rules.
Rules are often known to be guarding looks into the control information.The Rules often block or allow those packets using the rules that are spelt out on these pages.
It is also given mainly to computers or to policies that are assigned to a computer or collection of computers.
Learn more from
https://brainly.com/question/15681183
You are able to add Sheets to your workbook by pressing the + button by the sheet tabs.
O True
O False
Answer:
True
Explanation:
You have a server with Windows Server 2016 installed on Disk 0, a basic disk. You're using the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents
Answer:
Convert the new disks to GPT. Create a spanned volume using Disk 1 and Disk 2.
Explanation:
How will you select the range of cells in excel .
Answer:
just left click the cell that you want and drag your mouse towards how much you want to select I guess
Answer:
To select a range, select a cell, then with the left mouse button pressed, drag over the other cells. Or use the Shift + arrow keys to select the range. To select non-adjacent cells and cell ranges, hold Ctrl and select the cells.
Explanation:
WILL MARK A BRAINLIEST!!! PLS HELP!!!
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Answer:
man, just got rick rolled brb going to cry
Explanation:
Daijōbu desho. Datte Kimi yowai mon.
What steps can be used to run the Accessibility Checker? 1 Click the tab. 2. Go to the group. 3. Click and then Check Accessibility. 4. The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities.
Answer:
file, info, check for issues.:)
Explanation:
The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.
What is accessibility checker?
Your work is compared to a set of standards by the accessibility checker, which highlights any potential issues for users with impairments. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is. Making sure that the content you publish is accessible to users is the essence of accessibility.
Choosing File > Info. Choose "Check for Issues" Look into accessibility. Choose a problem from the Inspection Results. Review the How to Fix in the Additional Information, then edit your document as necessary. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is.
Thus, the Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.
To learn more about accessibility checker, refer to the link below:
https://brainly.com/question/30012324
#SPJ5
You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic
Answer:
hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic
Explanation:
How do i add a picture on a computer? Its a random question but i dont know how to do it. It needs to be a very detailed description.
A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.
Specific tasks such as the remembrance of key information when filling out Web forms can be performed by: personal agent.
A personal agent is also referred to as user agent and it can be defined as a computing software or hardware-based system that is typically designed and developed to perform specific tasks on behalf of an end user.
This ultimately implies that, a personal agent is an intelligent computer hardware or software program that can be configured to perform specific tasks on behalf of an end user.
For example, a personal agent can be configured to remember key information when filling out Web forms.
Read more: https://brainly.com/question/21656851
What is monitor ?why it is necessary for computer system ?
Answer:
Monitor is an output device that displays information in pictorial or text form. A monitor usually comprises a visual display, some circuitry, a casing, and a power supply.
It is important as it allows for proactive response, data security and data gathering and the overall good health of a computer system.
Lists can not hold strings and numbers in the same list.
True
False