All of the following describes technology EXCEPT
(a) application of knowledge (b) development of skills
(c) solving of problems (d) prohibiting human capabilities

Answers

Answer 1

Answer: (d) prohibiting human capabilities

Explanation:

Technology can be described as application of knowledge, development of skills or solving of problems.

Technology helps in solving numerous challenges. Technology involves skills and application of knowledge. Every technology used today solves a problem in one way or the other.

Technology prohibiting human capabilities doesn't describe technology. It doesn't limit the abilities of humans but rather improves it.


Related Questions

java Elements in a range Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds). For coding simplicity, follow each output integer by a comma, even the last one. The output ends with a newline. Ex: If the input is: 5 25 51 0 200 33 0 50 then the output is: 25,0,33, (the bounds are 0-50, so 51 and 200 are out of range and thus not output). To achieve the above, first read the list of integers into an array.

Answers

Answer:

The program in Java is:

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     int n;

     n = input.nextInt();

     int [] mylist = new int[n+1];

     mylist[0] = n;

     System.out.print("List elements: ");

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

     int min,max;

     System.out.print("Min & Max: ");

     min = input.nextInt();

     max = input.nextInt();

     

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

   }

}

Explanation:

This line declares length of list

     int n;

This line gets length of list

     n = input.nextInt();

This line declares the list/array

     int [] mylist = new int[n+1];

This line initializes the element at index 0 to the length of the list

     mylist[0] = n;

This prompts user for elements of the list/array

     System.out.print("List elements: ");

The following iteration gets list elements

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

This declares the lower and upper bound (min, max)

     int min,max;

This line prompts user for elements of the list/array

     System.out.print("Min & Max: ");

This next two lines get the bound of the list/array

     min = input.nextInt();

     max = input.nextInt();

The following iteration prints the elements in the range

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access and use information.

Answers

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

Identify and give the application of the following operators.

(a) / (b) //​

Answers

Answer:

This answer depends on what language you're using, but in most languages, "//" is used to precede a one-line remark. "/" is used to divide a number by the other.  For example:

// this is a remark

var foo = x / y;

There are exceptions to both, although the / is almost universally used for division.  One exception would be assembly of course, I don't know if there are any higher level languages that don't use the slash.

how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address

Answers

Answer:

The answer is "14".

Explanation:

Let the IP address [tex]= 196.45.204.0[/tex]

When it borrowed 4 bits

[tex]\therefore\\\\ subnet = 28[/tex]

[tex]IP= \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000[/tex]

If the borrowed bits are left out then:

The Number of useable host addresses:

[tex]= {(2^4) - 2} \\\\ = 16-2\\\\ =14[/tex]

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which statement best describes a characteristic of a relational database?

It contains tables that are completely independent of one another.

It contains tables with fields that are associated with one another.

It is a feature that is primarily used to navigate databases.

It is a feature that is primarily used to add queries to tables.

Answers

The relational database has the characteristic feature of the adjoining of data with one another.

What is a relational database?

The relational database is given as the interconnection of the data with the digital database management system.

The relational database is given with the characteristics of the adjoining of data tables and fields associated with one another. Thus, option B is correct.

Learn more about relational database, here:

https://brainly.com/question/13262352

#SPJ2

Which of these method of ArrayList class is used to obtain present size of an object/

a. size()
b. length()
c. index()
d. capacity()

Answers

Answer:

The method of ArrayList class which is used to obtain the present size of an object is:

a. size()

Explanation:

In ArrayList, the size() method provides the number of objects available in the collection, array, or list.  In Java programming, ArrayList forms a part of the collection framework and has a set of methods to access elements and modify them.  An ArrayList does not have a fixed-size data structure, unlike an Array, but continues to expand in size.

Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for example, they would type 4.) Then, using a for loop, ask the user for each of their names. Finally, print their full name.

Answers

Answer:

The solution is implemented in python:

numnames = int(input("Number of Names: "))

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

names = []

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

Explanation:

This prompts user for number of names

numnames = int(input("Number of Names: "))

This lists the name titles in a list

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

This initializes an empty list

names = []

The following for loop get names from the user

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

The following instructions print the user fullnames

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

An example program in Python that asks the user for the number of names they have and then prompts them to enter each name.

It will then print their full name based on the names provided:

python

Copy code

num_names = int(input("How many names do you have? "))

names = []

for i in range(num_names):

   name = input("Enter name {}: ".format(i + 1))

   names.append(name)

full_name = " ".join(names)

print("Your full name is:", full_name)

In this program, we first ask the user to enter the number of names they have. The input is converted to an integer using int() since input() returns a string.

Then, we initialize an empty list names to store the names provided by the user.

Next, we use a for loop that iterates num_names times to ask the user for each name. The loop variable i starts from 0, so we add 1 to it when displaying the prompt using i + 1.

Inside the loop, we prompt the user to enter the name and append it to the names list. After the loop completes, we join all the names in the names list using the join() method with a space as the separator. This creates a single string representing the full name.

Learn more about python on:

https://brainly.com/question/30391554

#SPJ6

What is the BCC feature used for?

to format email message text in a custom font
to format email message text in a blind font
to send a courtesy copy of an email to someone who does not need to take action
to send an email to someone without revealing that person’s email address to others on the distribution list

Answers

Answer:

to send an email to someone without revealing that person’s email address to others on the distribution list

Explanation:

BAM

To send an email to someone without revealing that person’s email address to others on the distribution list.

What is BCC?

"Blind carbon copy" is referred to as BCC. BCC is a similar method to CC for forwarding copies of an email to additional recipients. When CC is used, a list of recipients is shown; when BCC is used, a list of recipients is not visible.

Because the other receivers won't be able to see that the email has been forwarded to another person, it is known as a blind carbon copy.

Carbon copy is referred to as a "CC" in email communication. When there was no internet or email, you had to sandwich a piece of carbon paper between the paper you were writing on and the paper you wanted to use as your copy in order to make a copy of the letter you were writing.

Therefore, To send an email to someone without revealing that person’s email address to others on the distribution list.

To learn more about BCC, refer to the link:

https://brainly.com/question/29398332

#SPJ6

Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."

The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.

a. True
b. False

Answers

Answer:

The answer is "Option a"

Explanation:

The given question is incomplete, that's why its correct solution can be defined as follows:

The above-given question is the part of the Binary Autocomplete, in which this Autocomplete function would be a full word or sentence after just a few other letters were entered into the system. It approach improves text taking appropriate on smartphone devices of particular because every letter should not be written in such a single phrase.  

In REPL.it, the interface includes an Editor and an Interpreter.
True
False

Answers

Answer:

Its true.

Explanation:

True or false: In relational databases, each individual space within a row or column contains exactly one value.

Answers

Answer:

True.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores. This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.

Hence, in relational databases, each individual space within a row or column contains exactly one value.

Which of the following statements is true when it comes to developing a web presence for a business?

Answers

Explanation:

Customers can learn about a business by downloading a mobile app, but they can’t place an order using an app

 

Building a new website requires a large budget

A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one child class (subclass) C) A class cannot have a parent class (superclass) D) A class cannot have a child class (subclass) E) A class can have multiple parent classes (superclasses)

Answers

Answer:

The answer is A)

Explanation:

In programming languages like java you can only use single inhertance meaning a class can only inherit attributes from one class. But in other languanges like C you can have multiple inhertance

1.in 3 sentences explain briefly what are the examples of the advantage of using multimedia approach in a slide presentation brainly​

Answers

Multimedia Presentations is very essential in making slide presentation because:

it makes the presentation colorfulIt is often purpose driven andIt challenges one and all listeners to think creatively

Some advantages of Multimedia includes

Oresentations made are concise, rich and makes one to develop confidence in language skills.They captivate audience to visualize what is been taught.

Multimedia agent includes video podcasts, audio slideshows etc. The use of the multimedia in presentation is also very good and user-friendly. It doesn't take much energy out of the user, in the sense that you can sit and watch the presentation,

Conclusively, It uses a lot of the presenters senses while making use of multimedia such as hearing, seeing and talking.

Learn more from

https://brainly.com/question/19286999

If an insurance policy covers individual losses up to $10,000 and has a deductible of
$500, the insured will be paid how much in the event of a covered loss of $5,000?

Answers

Answer: $4500

Explanation:

The deductible is the amount that the insured that is, the policy holder will have to pay. In this case, there is a covered loss of $5000 and the insured has a deductible of $500.

Therefore, the amount that the insured will be paid will be the difference between $5000 and the deductible of $500. This will be:

= $5000 - $500

= $4500

Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool should an Administrator use to get this information

Answers

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

PLEASE HELP
A program is designed to determine the minimum value in a list of positive numbers
called numlist. The following program was written
var minimum = MISSING CODE
for(var i = lo; i < numlist.length; i++){
if (numList[1] < minimum)
minimum = numList[1];
console.log("The minimum is" - minimum);
Which of the following can be used to replace ISSING CODE> so that the program works as intended for every possible list of positive numbers?

Answers

The missing code segment is meant to initialize the variable minimum to the first list element.

The missing code is (d) numList[0]

From the question, we understand that the first line of the program should determine the smallest number in the list numList

To do this, we start by initializing the variable minimum to the first element of numList

This is done using the following code segment:

var minimum = numList[0]

Hence, the missing code segment is (d) numList[0]

Read more about similar programs at:

https://brainly.com/question/19484224

a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explorer.

Answers

Answer: B. Interrupts

Explanation:

Interrupts is a feature of digital computers that enables the interruption of the process the computer is currently engaged in so that the computer can process the new command. Interrupts is the reason I am able to type this answer because interrupts is interrupting my browser to process my typing.

If a user reports that their computer monitor will not allow her or him to switch back and forth between Microsoft Word and Internet Explorer, it is possible that the interrupts function is not working effectively to enable the switch. by interrupting one of the programs.

Answer:

.....................

B. Interrupts

NEED HELP 100 POINTS FOR ANSWER AND BRAINIEST!!! Which comparison operator is used to signify that a value is not equal to another value?
<>
<<
>=
=

Answers

Answer:

We use SQL Not Equal comparison operator (<>) to compare two expressions. For example, 10<>11 comparison operation uses SQL Not Equal operator (<>) between two expressions 10 and 11

Explanation:

<> operator is used to signify that a value is not equal to another value , Option A is the correct answer.

What are Comparison Operators ?

An operator used to compare or relate the value of two number or string is called a Comparison operator.

The value of 0 or 1 is returned on using Comparison Operators.

<> , Not equal to operator signifies that the value are either greater than or less than the other value but not equal in any case.

Therefore <> operator is used to signify that a value is not equal to another value.

To know more about Comparison Operators

https://brainly.com/question/15260168

#SPJ2

. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?

Answers

Answer:

Else-If statements

Explanation:

Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.

which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization​

Answers

Answer:

the answer is communication abd organization

The option that is not a type of operating system software is called; D: Communications and organization​

What are the types of Computer operating system?

An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.

The most popular Operating Systems for computers are Windows, Linux,  Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.

Read more about Computer Operating System at; https://brainly.com/question/1763761

#SPJ9

According to the video, what types of education are useful for Database Administrators? Check all that apply.
high school degrees
college degrees
certification
communication workshops
Done
Intro

Answers

Answer:

b.college degrees

c.certification

Explanation:

The type of education useful for Database Administrators are college degrees and certifications. The correct options are b and c.

What are Database Administrators?

A database management system typically supports the platforms' administration, development, and use. A Relation Database Management System (RDBMS) is a category of Database Management System (DBMS) that includes a structure (row-based table) that connects data pieces as well as operations that are intended to ensure the data's accuracy, security, consistency, and integrity.

They are capable of doing this since they are familiar with database administration tools and technologies. Currently, one of the most sought-after jobs in America is database administration.

Hospitals, banks, and insurance corporations are a few examples. To put it another way, database administrators are in charge of creating, maintaining, and protecting your databases.

Therefore, the correct option is b. college degrees, and c. certification.

To learn more about Database Administrators, refer to the link:

https://brainly.com/question/13261952

#SPJ6

list the difference between sdram and dram​

Answers

Answer:

i need this for a challenge

Explanation:

An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in this array. Which of the following preconditions must she ensure to perform a binary search?

The list has a large number of names.
The name X is present in the list.

In addition to the two statements above, which of the following is correct?

a. There should be no duplicates in the list.
b. The names in the list should be alphabetical order.
c. The name X should occur near the middle of the list.

Answers

Answer:

Preconditions that she must ensure to perform a binary search are:

The list has a large number of names.

The name X is present in the list.

c. The name X should occur near the middle of the list.

Explanation:

Nancy's binary search for a name X should begin by comparing an element in the middle of the array or list with the name X (target value). If this name X's value matches the value of an element in the list, Nancy must return its position in the array.  If the name X's value is less than the element's value, Nancy will continue the search in the lower half of the array.  Usually, the name X should occur near the middle of the list or array.

Which of these are true? Check all that apply.

a. You can have many processes running for one program.
b. A program is a process that is executed. A process is a program that we can run.
c. A program is initially stored in RAM. A process is initially stored in the hard drive.
d. A program is an application that we can run. A process is a program that is executed.

Answers

Answer:

The following are true according to the process and the information which is  being implemented.

b. A program is a process that is executed. A process is a program that we can run.

c. A program is initially stored in RAM. A process is initially stored in the hard drive.

d. A program is an application that we can run. A process is a program that is executed.

Explanation:

Statements that are true as regards how programs and the information is  being implemented are;

A program is a process that is executed. A process is a program that we can run.A program is initially stored in RAM. A process is initially stored in the hard drive.A program is an application that we can run. A process is a program that is executed.

According to the question we are to discuss program and its implementation and how it is been run.

As a result of this we can see that program is an application that we can run. A process is a program that is executed.

Therefore, program is a process that is executed. A process is a program that we can run..

Learn more about program at;

https://brainly.com/question/16397886

Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace. She visits a library and a museum in Cairo to check the authenticity of the items. What responsibility is Vanessa undertaking?

Answers

Answer:

the responsibility of cultural and historical accuracy checking

Explanation:

Vanessa seems to be undertaking the responsibility of cultural and historical accuracy checking. By visiting the library and museum, Vanessa is researching historical data in order to make sure that the items that she has selected match the same type of items that Individuals living in Ancient Egypt times would use as well. This provides both historical and cultural accuracy to the film by representing The citizens of Ancient Egypt as they were in that time.

C - researching

PLATO

Give an example of an occasion when you used logic to solve a problem

Answers

you can use it when like confirming a policy

discuss how sentiment analysis works using big data?

Answers

Answer:

sentiment analysis is the process of using text analytics to mine various of data for opinions. often sentiment analysis is done on the data that is collected from the internet & from various social media platforms.

Write a function called is_even that takes one parameter and returns a boolean value. It should return True if the argument is even; it should return False otherwise.

The is_even function should not print anything out or return a number. It should only take in a number and return a boolean.

Note: Be sure to include comments for all functions that you use or create.

For example, if you made a call like

is_even_number = is_even(4)
is_even_number should have the value True.

Once you’ve written this function, write a program that asks the user for integers and prints whether the number they entered is even or odd using your is_even function. You should let the user keep entering numbers until they enter the SENTINEL value.

Here is a sample run of the program:

Enter a number: 5
Odd
Enter a number 42
Even
Enter a number: -6
Even
Enter a number: 0
Done!

(CODEHS, PYTHON)

Answers

def is_even_number(n):

   return True if n % 2 == 0 else False

while True:

   number = int(input("Enter a number: "))

   if number == 0:

       break

   else:

       if is_even_number(number):

           print("Even")

       else:

           print("Odd")

I wrote my code in python 3.8. I hope this helps.

Other Questions
A line passes through (-6, 10) and (4, -10). What is the slope? Im bad at math is there anyone good at this if so please help Which vice president was nominated to run for president at the Democratic Convention in 1968? John F. Kennedy Lyndon B Johnson Martin Luther King Jr. Hubert Humphrey The north pole of one bar magnet is near the south pole of another barmagnet. What happens to the magnets?O A. They repel each other.B. They attract each other.C. They twist away from each other.O D. They neither attract nor repel each other. over a 5-year period.Investment over5 yearsValue of investment ()11401120110010801060610401020100000 1 2 3 4 5Year Solve the following compound inequality help pls A-p-e-x!!!!!!!! you did not make a mistakes. (affirmative) Learning Task 1: Give the value and the place value of the underlineddigits. Write your answers in your notebook.ValuePlaceValue1. Sixteen hundredths2. Three hundred and nine tenthousandths3. Eleven and ten hundredths4. Fifty-two and four hundred ninety-threeten thousandths5. Seven hundred and four tenthousandthsE Please Answer ASAP!!!!!!!!!!!!!!!!!!!!!!! What was the first order of business that President Biden attended to yesterday in the White House and what responsibility did Vice President Harris undertake in the Capitol building?What orders of business did President Biden and Vice President Harris perform yesterday after being sworn into office?ILL. MARK U AS BRAINLIEST Round to two decimal points Matt paid $450 in interest on a 15 month note for$5600. Find the rate of interest paid. Whats the definition of seasons Select the word that does not belong. la semainelle soir l'aprs-midi Is this right???I give Brainliest ! In 1823, Why did Stephen Austin lead 300 Americans on to Mexico land?? Which statement about the relationship between air pressure and air density is accurate?A) Air pressure decreases as air density increasesB) Air pressure increases as air density increasesC) Air pressure increases as air density decreasesD) Air pressure is unrelated to air density why is writing down goals important? what is the the capitol