if there was no technological advancement what would be our society like​

Answers

Answer 1

Answer:

WHAT SOCIETY?!

Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....

It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.


Related Questions

I have put the question in twice and I cannot get a answer for it .. this site isn’t great in my view..

Answers

which site? Maybe try to turn off your device and turn it on again then go back to the website

a good look of a web page depends upon?​

Answers

Answer: See explanation

Explanation:

• Font size: The font size used matters a lot in order to enhance readability. The ideal font size should be 16 pixel for the main body text. This is vital in order to help enhance readability. It should be noted that a don't size that is lower or higher than that can lead to challenges with readability.

• Graphics and animation: Using of exciting graphics and animations on a website can help in giving the web page a good look, help in grabbing the attention of the user, and also increase engagement.

• Use of colours: The color chosen also helps to give a web page a good look. It should be noted that when choosing colors, it is ideal to choose two or at most three colors to use for a web page. Mixing different colors or using very bright colors is typically a turn off.

A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence

Answers

Answer:

D

Explanation:

because it is a sequence it does more than one thing

Answer:

B

Explanation:

I took the test

What is the most effective way to identify improvement opportunities for value log

Answers

Answer:

Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities

Explanation:

Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities.

In other words, Value stream mapping is a strategy that is used to break down situations into pieces such as people, information, and materials involved in delivering services.

To do this, a distinct categorization is made into a value-adding category and a non-value-adding category. This helps to determine which elements add value to customers or not.

Thereby, removing unnecessary processes or steps which in turn increases productivity and value.

a good look of a web page depends upon?​

Answers

Answer:

Depends mostly on your opinion

What is the first step a user should take toward generating an index?

--finding and marking words or phrases that should be included in the index
--making sure that headers at different levels are using consistent styles
--bolding every word or phrase that should be included in the index
--writing down information about the author and publisher of other books used

Answers

Answer:

I think that it's A

Explanation:

a document contains a list of items that appear in no particular order. what is the best way to format the list

Answers

Answer:

bulleted list

Explanation:

Bulleted list is the best way to format the list. As a document contains a list of items that appear in no particular order.

What is meant by Bulleted list?

A bullet list is simply a list of items with dotted dots separating each item and a heading at the top. These lists are flexible and may be used for whatever you need them for, from something as informal as an agenda to something as serious as a business strategy for your place of business.

A bullet list is used when making a list of two or more items, where the order of the items is not important. A retailer may display a list of items you want to buy in the form of a bullet list, for example.

Use a number list if you're composing a list of actions or instructions when the order is important.

Thus, it is Bulleted list.

For more details about Bulleted list, click here:

https://brainly.com/question/17359798

#SPJ2

The single-cycle datapath conceptually described in this section must have separate instruction and data memories, because:________. a. the formats of data and instructions are diff erent in MIPS, and hence different memories are needed. b. having separate memories is less expensive. c. the processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycled. the formats of data and instructions are different in MIPS, and hence different R-type instructions are needed .

Answers

Answer:

C. The processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycle

Explanation:

Processors require instructions and data which are retrieved from data memories for processing, but it cannot access two or receive two both processes as only a port is used for accessing data and another for receiving instructions. In fact, a single-cycle or single-clock processor cannot use a resource more than once.

PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?

Answers

Answer:

Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.

Which is a conditional statement?
If it is sunny, we can play ball.
It is sunny today.
It is sunny or rainy.
It is sunny across the street, but not sunny here.

Answers

i believe it is “if it is sunny, we can play ball”

Answer:

it is 1, I know this because i got 100% on my quiz

Explanation:

Q1 To remove filter

Option1: Click the Filter option of the Sort & Filter button in the Editing group on the HOME

Option2: Click the Filter option in the Sort & Filter group on the DATA tab.

Option3: Both 1 and 2

Option4: Pres DELETE​​

Answers

Answer:

Click DATA, Look for "Sort & Filter", Click Filter Box (right above "Sort & Filter"). Done.

Answer:

add a picture pls

Explanation:

Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.

Answers

List the delay components in the end-to-end delay:
Processing delay
Transmission delay
Propagation delay
Queuing delay.
The processing delay, transmission delay, and propagation delay are constant. Reason is that, time taken to transmit data bits.
The queuing delay is variable.Reason is that, Only single packet transfer in queue process and waiting time depends on packet size.

The delay components in the end-to-end delay are processing delay, Transmission delay, Propagation delay, and Queuing delay.

What is an end-to-end Delay?

End-to-end delay, also known as one-way delay, is the length of time it takes for a packet to go from its source to its destination across a network. It is a word frequently used in the monitoring of IP networks, and it varies from round-trip time in that only the path from source to destination is measured.

Now according to the question, the propagation, transmission, and processing delays are all constant. The time required to send data bits is the cause.

Variable queuing delays exist.

The waiting time is dependent on packet size, and only one packet can be transferred at a time in the queue process.

To get more information about End-to-End delay :

https://brainly.com/question/28584250

#SPJ2

Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.

Answers

Answer: See explanation

Explanation:

A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.

Examples of Internet entities that may want secure communication include:

i. Two routers

ii. Our laptop and web server.

iii. Connection that exists between two DNS name servers.

It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False

Answers

Answer:

False

Explanation:

would be blocked from server

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer

Answers

The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.

In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.

The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.

On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.

The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.

Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.

For more questions on Reviewer, click on:

https://brainly.com/question/30517194

#SPJ8

Which of these is a valid use of the Reply All feature?


correcting someone's spelling mistake in an e-mail


responding with "I agree" or "me too"


responding with "please take me off your list"


none of these

Answers

Answer:

I think is None of this ,

According to the options given none of these is a valid use of the Reply All feature. Thus, option D is correct.

What is the use of  auto-responder?

If you use an auto-responder, all your customers will receive a standardized reply. That will make it clear for them that their message has not been read yet. However, even if your message states that you will eventually read and respond properly to every single email.

It is likely that customers will doubt it. They do not expect an automatic response upon contacting you - quite the contrary, they expect their issues to be addressed specifically and immediately.

An email message is a text that is transmitted or received over a computer network and is often short and casual. Email communications are often only text messages, but they can also contain attachments (such spreadsheets and graphic files). Multiple people can receive an email message at once.

Therefore, According to the options given none of these is a valid use of the Reply All feature. Thus, option D is correct.

Learn more about Email communications on:

https://brainly.com/question/30262540

#SPJ3

write a C++ program that ask the user for the number of cookies eaten and display the calorie consumption

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int cookies;

   cin >> cookies;

   cout << "The calorie consumption is: " << cookies * 142 << endl;

   return 0;

}

Explanation:

First line: include basic library of C++(input and output).

using namespace std;

Says to compiler we are using std.

int main() Main function

int cookies, cookies variable, of int type

cin >> cookies

get the number of the cookies from user

cout Print the text and calories(one cookie have 142 calories)

Have a nice day ;)

PLS HELP IN WHATEVER WAY YOU CAN ASAP
the company's Chief Financial Officer recognizes the need for an upgrade to the smart watches but does not understand why the budget proposed request more than the purchase price of the update software how would you respond to this

Answers

Answer:

what ever way I can you say

I would respond by explaining that the price may go up or down before we buy them and that it is good to have some wiggle room with the cost. I would also mention that any unused money will come right back and that it is just a precaution.

you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?

Answers

Answer:

Do not use such labels because they may be misleading and are unethical.

Explanation:

Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.

While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.

Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.

There are different instructions that comes with labeling, lithium metal label  is quite different from Lithium-ion labels and as such one cannot use one for the order.

What one should you do is to never use the lithium metal labels in place of  Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.

One has to comply with the regulations regarding batteries and the packaging of lithium batteries.

Lithium Metal Batteries  are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.

They have high energy density than other lithium batteries.   They can be found in Watches , Calculators etc.

Lithium-ion batteries are known to be  secondary battery. That is, they are said to be rechargeable in nature. They can be found  in Mobile phones, Laptops etc.

When shipped, any packages that has lithium-ion batteries must be labeled with  UN3480  or UN3481.

When shipped, any packages that has lithium metal batteries must be labeled  with UN3090  or UN3091.

Learn more about Batteries from

https://brainly.com/question/24876978

Just took a test and I got 5 wrong and I wanted to know the correct answers

Answers

Answer:

I need the pic

Explanation:

Which of the following is considered an input device?

Answers

Do you have a picture or list?

Answer:

Keyboard

Mouse

Light pen

Microphone

Touch pad

Why is it useful to have more than one possible path through a network for each pair of stations?

Answers

Answer:

Because if one path is crowded, then there is always another path to make it less crowded and it is more convenient

Explanation:

Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter: a list of values (value_list) of various types. The recommended approach for this:

a. create a variable to hold the current sum and initialize it to zero.
b. use a for loop to process each element of the list.
c. test each element to see if it is an integer or a float, and, if so, add its value to the current sum.
d. return the sum at the end.

Answers

In python 3.8:

def func(value_list):

   lst = [x for x in value_list if type(x) == int or type(x) == float]

   return sum(lst)

print(func(["h", "w", 32, 342.23, 'j']))

This is one solution using list comprehensions. I prefer this route because the code is concise.

def func(value_list):

   total = 0

   for x in value_list:

       if type(x) == int or type(x) == float:

           total += x

   return total

print(func(["h", "w", 32, 342.23, 'j']))

This is the way as described in your problem.

Your personal opinion about what a "successful" console in the future will need to include to sell well. How have the changes in technology, gaming culture, and overall society affected the market?

Answers

Answer:

The answer is below

Explanation:

In my personal opinion what a "successful" console in the future will need to include to sell well is "a big library of games." This feature will help a console supports many games that will appeal to all categories of gamers.

The changes in technology, gaming culture, and overall society has affected the game market in many ways such as:

1. In terms of technology: it has made the game manufacturers both the console and third-party game developers to improve their gaming features. For example, the advancement in gaming pads becoming wireless. The gaming console having internet or online features, where gamers can play with each other around the world from their rooms. Also, the gaming character design looking more and more like the real-life personality it represents.

2. In terms of gaming culture: modern games are no longer for teenagers alone. It is now appealing to adults as well. This is evident in football players and coaches playing the games and talking about it. Even some players tend to influence their ratings in the game by mentioning how good they are in the press in comparison to the rating game developers are giving them.

3. Overall society has now seen gaming consoles as part of everyday life. The parents, researchers, and even feminist groups are now well aware of the gaming industry. And each of the stakeholders involved is influenced by how the game consoles manufacturers market their games through media, sports personalities, celebrities, etc.

An example of a _________________ impact is when a consumer wants to buy a product on the internet but is afraid the company won’t fulfill their request due to an unsure reputation of that business.

A)Negative


B)Positive

Answers

Answer:

ooof

Explanation:

Answer:

B) negative

Explanation:

the evidence shown "unsure reputation of that business"

which is the best software application to be used by a hotel manager​

Answers

Answer:

Cloudbeds

:))

hope it helps

Handoff points in cross-functional flowcharts are of particular importance to process analysis.A. True B. False

Answers

Answer:

True

Explanation:

What is the purpose of a poster frame?
to allow the contents of an embed code to be displayed
to insert a downloaded video for offline playback and editing
to create the frame in which a screen recording will be inserted
to capture a portion of a video clip to show as a preview image

Answers

Answer: the last one

Explanation:

Here is the answer::

What is the definition of trouble shooting.

Answers

Answer:Trace and correct fault in mechanical or electrical system

I NEED HELPS!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! UWU

jeremy has a handful of resisters and all of them except one have for bands the exception has three why?

Answers

Answer:

The 3 band resistor does not specify the tolerance.

Ususally this means the tolerance is 20%, which is not great.

Explanation:

The last band is typically the tolerance band, i.e., the lower the tolerance the more accurate the value as indicated by the other bands. In case of a 3 band code, there is no tolerance specified and you have to assume the default of 20%.

Other Questions
What rule would you allow to test weather (x,y) is on line l Data from Statistics SwedenAccording to the chart above, which of the following statements is true?A.There were less households with one child in 1970 than in 1960.B.There were more households with no children in 1990 than in 1960.C.There were more households with no children in 1960 than in 1990.D.There were less households with two children in 1980 than in 1970.Please select the best answer from the choices providedABCD Bob can do a job in 5 hours while Bill can do the same job in 8. How many hours would it take them, working together, to do this job?plesa heap Welche ist besser LED or LCD During WW2, many women experienced a change in role in that they Which compound isionic? Which of these museums is located in New York City? O A. Sotheby's O B. El Prado O C. The Metropolitan Museum of Art O D. The Smithsonian The Greenback Stores cost structure is dominated by variable costs with a contribution margin ratio of 0.25 and fixed costs of $40,000. Every dollar of sales contributes 25 cents toward fixed costs and profit. The cost structure of a competitor, One-Mart, is dominated by fixed costs with a higher contribution margin ratio of 0.75 and fixed costs of $440,000. Every dollar of sales contributes 75 cents toward fixed costs and profit. Both companies have sales of $800,000 for the month. Required: a. Compare the two companies cost structures. b. Suppose that both companies experience a 15 percent increase in sales volume. By how much would each companys profits increase? What is an amu? lol I'm asking alot of questions The displacement of a transvers wave travelling on a string is represented by D1 = 4.2sin(0.84.x - 47t + 21) where D1 and x are in cm and t in s.Find an equation that represents a wave which, when traveling in the opposite direction, will produce a standing wave when added to this one PLS HELP PLSSSS33PPLSSSSSSSSSSSSSSSSSSSSSSSSSSSS HELPPPP!!! Ian uses litmus paper to determine whether five unknown solutions are acids or bases. The litmus paper turns red when the pH is 4.5 or below and blue when the pH is 8.2 or above. Ian records the results in the data table.Ian accidentally spills a beaker of an unknown solution. It splashes onto the strip he used to test Solution 1, and the strip turns from red to blue. Based on this observation, which conclusion could Ian make about the solution that he spilled? For which group of people might brain-powered cars allow the greatest increase in mobility?children or young adultspeople with physical disabilitieshighly educated peoplewealthy business people PLEase Hurry!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Mr. Ash owns a tree, which is 42 feet tall. He estimates that this tree is 75% as tall now as it will be when fully grown. How tall will the tree be when it is fully grown? Thomas decides to use the method of proportions and similartriangles to find the height of a lamppost. He measures the length ofthe post's shadow and finds it is 5 feet long. Then, he holds a 1-footruler perpendicular to the ground and finds that it casts a 2-inchshadow. How tall is the lamppost? a. 2.5 ft c. 30 ft b. 12 ft d. 60 ft pls heeelp i dont want to fail What is the point-slope form with the slope -6 and the line through (1,-4)? Read the transcript of General Dwight D. Eisenhowers speech Order of the Day from 1944. What is the purpose of the passage? Henry divided his socks into five groups. Let s represent the total number of socks. Which expression and solution represent the number of socks in each group if s=20?A. S/5; when s=20, the number of socks in each group is 4.B. S/5; when s=20, the number of socks in each group is 15.C. S-5; when s=20, the number of socks in each group is 4.D. s-5; when s=20, the number of socks in each group is 15.Pls help PLZ HELP Read the selection from the section "Where The Meteor Showers Happen." Then, fill in the blank.Meteors make it through the exosphere and thermosphere without much trouble. In these layers, there is not enough air to stop the meteors.The phrase "without much trouble" in the selection above tells the reader that ____.Ameteors often have a difficult time traveling through the exosphere and thermosphereBmeteors are able to easily travel through the exosphere and thermosphereCmeteors heat up quickly when they travel through the exosphere and thermosphereDmeteors usually stop traveling when they get to the exosphere and thermosphere