La historia de los productos tecnologicos
porfa
Answer:
La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.
La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.
You should avoid having other people in portraits with children. True False
Answer:
You should avoid having other people in portraits with children.
✓ False
Explanation:
A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.
Answer:
global information system (GIS)
Explanation:
A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
Answer:
Compactness
Explanation:
Have a nice day!
We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding
Answer: forwarding: move packets from router's input to appropriate router output
routing: determine route taken by packets from source to destination
Explanation:
The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.
The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.
Convert to different number system as mentioned.(17)10=(?)2
To add a picture file to a PowerPoint slide, a user should first go to the
Answer:
insert
Explanation:
go to power point presentation insert tab
Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues
Answer:
Functions should be as pure as possible following a pattern of Input->Processing->Output
To model algorithms in a state-machine like format
Code free of side effects
Explanation:
Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.
explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace
Answer:
The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.
Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<
Answer:
1. Software de aplicación: Microsoft Word.
2. Software de diagnóstico: Speccy.
3. Software de sistema: Windows operating system (OS).
Explanation:
Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.
Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;
1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.
Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.
2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.
Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.
3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.
Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.
fill in the blank figuring out what type of garden you want to grow is the ____step according to the instructions in how to grow a school garden
Answer:
First.
Explanation:
How to grow a school garden is an illustrative guide that explains to students the step by step process for growing a school garden.
According to the instructions in how to grow a school garden, the first and most important step is figuring out what type of garden you want to grow. At this step, a student should have a good understanding of the type of garden he or she wants to grow.
Thus, this step answers the question of "what am I growing in the garden?"
explain the following terms
copyleft:
creative Commons:
GNU/GPL:
Answer:
Explanation:
copyleft:
Copyleft is the practice of granting the right to freely distribute and modify intellectual property with the requirement that the same rights be preserved in derivative works created from that property.
creative Commons:Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online. CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having to seek the permission of the creator3. GNU/GPL:GPL is the acronym for GNU's General Public License, and it's one of the most popular open source licenses. Richard Stallman created the GPL to protect the GNU software from being made proprietary. It is a specific implementation of his “copyleft” concept.
Software under the GPL may be run for all purposes, including commercial purposes and even as a tool for creating proprietary software, such as when using GPL-licensed compilers. Users or companies who distribute GPL-licensed works (e.g. software), may charge a fee for copies or give them free of charge.
You have a Windows 2016 Server with DFS. During normal operation, you recently experience an Event 4208. What should you do first to address this issue
Answer: Increase your staging folder quota by 20%
Explanation:
The Distributed File System (DFS) allows the grouping of shares on multiple servers. Also, it allows the linking of shares into a single hierarchical namespace.
Since there's a Windows 2016 Server with DFS and during normal operation, an Event 4208 was experienced, the best thing to do in order to address the issue is to increase the staging folder quota by 20%.
Write a program, which will take 20, inputs from the user and find how many
odd and even numbers are there.
Pseudocode & Python
Answer:
user_input = [int(input()) for i in range(20)]
even = []
odd = []
for i in user_input:
if i%2:
even.append(i)
else:
odd.append(i)
print("odd : ", len(odd), "even : ", len(even))
Explanation:
The above code is written in python :
Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.
Two empty list are defined, even and odd which is created to store even and odd values.
A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.
what is the use of a piano
To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
Answer:
443
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.
Hence, the port that needs to be enabled to allow secure transactions is port 443.
What CSS property do you use to determine whether flex items are displayed horizontally or vertically
Answer:
Flex direction
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head.
The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.
On the other hand, the body of a HTML document contains the contents or informations that a web page displays.
Generally, the part of a HTML document where the cascaded style sheet (CSS) file is linked is the header.
A style sheet can be linked to an HTML document by three (3) main methods and these are;
I. External style.
II. Inline style.
III. Embedded (internal) style.
Flex direction is a CSS property that's used to determine whether flex items are displayed horizontally or vertically.
18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up
Answer:
Dial up
Explanation:
Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?
Answer: Static
Explanation:
Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.
Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.
When the ping command is used, output is similar across operating systems. Which two values are displayed as part of the output
Answer: round-trip time
message byte size.
Explanation:
Ping refers to the primary IP command that is used in the troubleshooting of connectivity, and reachability. The ping command is also used in testing the computer's IP address.
When the ping command is used, output is similar across operating systems and the two values that are displayed as part of the output include the round-trip time and the message byte size.
You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this
Answer:
IP
Explanation:
Change the case of letter by
Answer:
writing it as a capital or lower case.
Explanation:
T - upper case
t - lower case
not sure if that is what you meant or not
Answer:
Find the "Bloq Mayus" key at the left side of your keyboard and then type
Explanation:
Thats the only purpose of that key
When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?
Answer:
Screen resolution
Explanation:
The brightness of the words and pictures displayed on computer screen is referred to as screen resolution. Items seem crisper at larger resolutions, such as 1600 x 1200 pixels. They also seem smaller, allowing for more objects to be displayed on the screen. The greater the resolution supported by a display, the larger it is.
7. The message on a diamond-shaped sign might be
a. Pass With Care, Trucks Use Right Lane, or
Do Not Pass.
b. Curve, Hill, or Winding Road.
One Way, Wrong Way, or No Trucks.
d. No Turn, Speed Zone Ahead, or Left Lane
Must Turn Left.
Answer:
a. pass with care, trucks use right lane, or do not pass
give the difference between functional and functional tools in the middle of to the circle give importance
Answer:
hakkuna matata is the radious of a circle
#include
int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);
return 0;
}
whats the error not giving the correct output
Answer:
#include<studio.h>
#include<conio.h>
void main()
{
char ch;
printf("Enter any letter");
scanf("%c",&ch);
you press the F9 key to convert an object to a symbol true or false
Answer:
False,
Reason
F8 key is used for the coversion of object to symbol
You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?
Answer:
There must be a proxy server that is not allowing access to websites
Explanation:
A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.
A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.
Explanation:
oi.........................
The logical structure in which one instruction occurs after another with no branching is a ____________.
Answer:
sequence
Explanation:
The logical structure in which one instruction occurs after another with no branching is a sequence.