A technology ____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

Answers

Answer 1

Answer:

A technology __cycle __ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

Explanation:

Hope its help


Related Questions

TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.

Answers

Answer:

True

Explanation:

"Bomb threat checklists are extremely valuable and should be made available at all workstations. If your organization does not have a bomb threat checklist, print the sample for future reference. Keep a copy of the checklist at your workstation at all times."

Conceptually, a page table is an array. What is found in each element of the page table array, and how is it interpreted?.

Answers

An array is the group of data structure which has a similar data elements of the same data type. In this type of data structure, the information can be quickly recalled by making use of the index number so that each individual data can be retrieved.

With this in mind, we can see that a page table has to do with the data structure which is stored in a virtual memory so that the Operating System can access their virtual and physical address.

See attached image for a better visual description.

Please note that your question is incomplete so I gave you a general overview so that you would better understand the concept.

Read more about page table here:

https://brainly.com/question/15409133

what is the kybert satellite

Answers

Answer:

i dont know....there is nothing on that piece of technology

Explanation:

What is the complete path and filename of the file where ports and their associated protocols are defined

Answers

The /etc/services is often found in Linux/Unix.

The complete path and filename of the file where ports and their associated protocols are defined by /etc/services.

Linux Services files is known to save a lot of well-known ports. UNIX operating systems is known to save a services file at /etc/services.

It does save information about a lot of services that client applications can use on the computer.

Looking into the file, you will find the service name, port number, and protocol it uses, and other applicable aliases.

the work of the configuration file /etc/services is to help programs to be able to do a getportbyname() sockets call in their code so as to know what port they can use.

Learn more about Computer services from

https://brainly.com/question/3837126

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

Answers

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

________ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures. Group of answer choices Object-oriented Structured Unstructured Content-markup

Answers

Considering the programming layout, Structured programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.

Definition of Structured Programming Technique.

This is because Structured Programming techniques are a method that is employed to enhance the reliability and simplicity of the program code.

Configurations of Structured Programming Technique.

Structured Programming Techniques generally takes three structures body which include the following:

IF THEN ELSE DO WHILESequence

Hence, in this case, it is concluded that the correct answer is option B. "Structured."

Learn more about programming techniques here: https://brainly.com/question/17180300

Choose the correct function to yield the shown result.
>>>____(3)
3.0

- int
-round
-float
-str

Answers

Answer:

int

Explanation:

Correct on edg test 2021

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

An agile team has which two characteristics? (choose two. ).

Answers

A SAFe Agile teams are often known to be Scrum Master and Product Owner. An Agile team characteristics are:

A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value.

A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value.

A SAFe Agile team is a cross-functional group  as they are made up of about of 5-11 people who set apart, build, test, and deliver an increment of value in a short time box.

Agile team are known to be cross functional as they can define, build , test and Deploy.

See full question below

An Agile team has which two characteristics? (Choose two.)

A) A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value

B) A stand-along unit of individuals who do not require input fro other teams to complete their tasks

C) A large group of individuals who all work together to create value for the client

D) A group of dedicated individuals that work in phase-gate steps to complete their PI Objectives

E) A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value

Learn more from

https://brainly.com/question/24390635

Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change the messages if you like). Once this works, add other pets. (Iguana, Pig, Rabbit...)

Answers

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.

Answers

Answer:

Virtualisation

Explanation:

The correct answer would be virtualisation software, this is because it allows more computers to be "created" in the form of virtual machines. These virtual machines contain everything that a regular computer would have, i.e networks, storage devices, and processors except that it is virtual. You just need to have hyper v enabled in system settings.

Hope this helps!

The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done.

Answers

The first part of a data packet that comprises the source and destination addresses of a network is called a: header.

In Computer networking, the transmission control protocol/Internet protocol (TCP/IP) model refers to a standard networking protocol that allows network devices and host computers to interconnect and communicate with one another over a network, especially through the transmission of data packets and an Internet protocol (IP) address.

Generally, an IP address is typically designed and developed to hold information about data packets. Thus, a header is the information at the beginning of a data packet that comprises the source and destination addresses of a network.

In conclusion, a header is the first part of a data packet that comprises the source and destination addresses of a network.

Read more on header here: https://brainly.com/question/20629962

_____ is a privacy issue relating to the responsibility of those who collect data must ensure that the data is correct.

Answers

Answer:

Virtual private network

Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attached. Which setting must molly change?.

Answers

A computer is made up of different network. The setting that molly must change is network type.

A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.

A computer network can be classified based on their sizes. A computer network is of four types. They are:

LAN(Local Area Network)

PAN(Personal Area Network)

MAN(Metropolitan Area Network)

WAN(Wide Area Network)

Learn more from

https://brainly.com/question/14200752

When it is being used to make a telephone call, your smartphone is an example of which part of the communication process

Answers

In the communication process, when your smartphone is being used to make a telephone call, your smartphone is an example of a: medium.

Communication refers to a process which involves the transfer of a message (information) from an individual (sender) to another (receiver), through the use of semiotics, symbols and signs that are mutually understood by both the sender and the receiver.

The Sender Message Channel Receiver (SMCR) model of communication is composed of four (4) main components and these are;

Sender (S).Channel (C) or Medium.Message (M).Receiver (R).

In the communication process, a smartphone which is being used to make a telephone call is an example of a medium or channel because it provides the pathway for the transmission of a message (information) from an individual (sender) to another (receiver).

Read more: https://brainly.com/question/17438207

PLEASE HELP! (NO LINKS)

The US Copyright Act gives computer programs the same status as what kinds of work?

Answers

Answer:

C.

Explanation:

In image below.

                                        Have a wonderful day and mark brainliest if I helped,

                                                                   starkitty052010 of Brainly

                                       

Six months ago, you purchased a new laptop. Since then, you notice that the battery life has been steadily going down. When it was new, and full charge lasted about three hours. Now your lucky to get two hours before the battery charge level drops the 5%. What should be your first step to correct the problem?a. Calibrate the batteryb. Replace the power meter chip on the batteryc. Clean the contacts on the batteryd. Buy a new battery

Answers

Answer:

A. Calibrate the battery

Explanation:

It is unlikely that the battery has deteriorated significantly in the timespan of six months. The laptop is likely being shut down due to inaccurate battery levels to protect the laptop. Battery calibration will ensure accurate battery information is reported.

Choose the response that best completes the following statement.

"If you're not sure if you should be on a site or signing up for a profile, ________."

ask permission
consider the outcome
don't say it online
use the 5-second pause

Answers

Answer:

probably the 5 second pause

consider the outcome?
Other Questions
"The great rule of conduct for us, in regard to foreign Nations is in extending our commercial relations to have with them as little political connection as possible. So far as we have already formed engagements let them be fulfilled, with perfect good faith. Here let us stop." Which of the following is the source of this statement on foreign policy?A) George Washington's Farewell AddressB) The Monroe DoctrineC) Abraham Lincoln's first inaugural addressD) The Federalist Papers Shorten this and put it in your own wordsAround the year 133 BC, Rome was set up as a democracy. Later the Roman people were sovereign. Even the system of voting was weighted to give more influence to the votes of the wealthy. By 14 AD, when the first emperor Augustus died, popular elections had all but disappeared. This was nothing short of a revolution, brought about through a century of constant civil strife, and sometimes open warfare. Many Romans themselves put the key turning point in 133 BC. The course of events is clear enough.In the process, he deposed from office another tribune who opposed the distribution and argued that his reforms should be funded from the money that came from the new Roman imperial province of Asia. Gracchus's land bill was passed. Gracchus's motivation is much less clear. Whatever his motives were, his career crystallised many of the main issues that were to underlie the revolutionary politics of the next hundred years.The consequences of Rome's growing empire were crucial. Tiberius's decision to use the revenues of Asia for his land distribution was a provocative claim - that the poor as well as the rich should enjoy the fruits of Rome's conquests. But Tiberius's desire to stand for a second tribunate also raised questions of personal political dominance. This became an increasingly urgent issue as leading men in the first century BC, such as Julius Caesar, were sometimes given vast power to deal with the military threats facing Rome from overseas - and then proved unwilling to lay down that power when they returned to civilian life. The events of 133 BC were followed by a series of intensifying crises. At the end of the century Gaius Marius, a stunningly successful soldier, defeated enemies in Africa, Gaul and finally in Italy, when Rome's allies in Italy rebelled against her.He held the highest office of state, the consulship, no fewer than seven times, an unprecedented level of long-term dominance of the political process. Marius then came into violent conflict with Lucius Cornelius Sulla, another Roman warlord, who after victories in the east actually marched on Rome in 82 BC and established himself 'dictator'.This had been an ancient Roman office designed to give a leading politician short terms powers in an emergency.Unlike Julius Caesar, however, who was to become dictator 40 years later, Sulla retired from the office and died in his bed.The middle years of the first century BC were marked by violence in the city, and fighting between gangs supporting rival politicians and political programmes.The two protagonists were Gnaeus Pompeius Magnus ('Pompey the Great', as he was called, after Alexander the Great) and Julius Caesar.Caesar promoted radical policies in the spirit of Tiberius Gracchus; Pompey had the support of the traditionalists.Historians in both the ancient and modern world have devoted enormous energy to tracking the precise stages by which these two men came head-to-head in civil war. But the fact is that, given the power each had accrued and their entrenched opposition, war between them was almost inevitable. Not much 'liberty' was to follow. Instead there was another decade of civil war as Caesar's supporters first of all battled it out with his assassins, and when they had been finished off, fought among themselves. Can someone please answer my questions?????????? A student runs 120 meters in 10 seconds. What is their speed?. A 25 kg chair initially at rest on a horizontal floor requires a 165 N horizontal force to set it in motion. Once the chair is in motion, a 127 N horizontal force keeps it moving at a constant velocity.Find the coefficient of static friction between the chair and the floor.b. Find the coefficient of kinetic friction between the chair and the floor. geometry help on 34 please True answer only) branlest) Linda is having trouble in her economics class. Although she understands the material, she often gets low grades on her essays because she uses inaccurate language and her sentences are difficult to understand. Which condition is Linda most likely struggling with In, at, on ahshshshshsjj What is the possible resultant of a 2-unit vector and 4-unit vector? You are solving 5 8/3 =y/3. Which equation will you get if you multiply both sides by 3? Military criminal investigators are also responsible for investigating crimes that occur on the battlefield. Which of the following would likely be the subject of such an investigation? Select all that apply.returning fire when under direct attackinterrogating noncombatants about the location of enemy troopsextended detention of civilian noncombatantsthe use of torture to elicit a confession from a prisoner of war What must a student do to obtain a volume of 12.5 milliliters of liquid in the graduated cylinder shown in the diagram below?AAdd 0.5 mL of liquid.B.Add 1.5 mL of liquid.CRemove 0.5 mL of liquid.DRemove 1.5 mL of liquid. Are all humans capable of true evil? Why or why not? ). If you go to the drug store, ______me a toothpaste Create polynomial functions using the given information: A degree 9 polynomial with at max 5 positive zeros and at max 3 negative zeros What did some fear the Constitution would lead to?An American ParliamentAn American Bill of RightsAn American king Could you find the answer please In the context of the article, what do tragic events such as the Holocaust and terrorist attacks teach us about resilience? Factor the following expression. x^2+9x+8