Explain how the number of jobs available to workers has been affected by the use of ICT in commerce and industry, using specific examples. Refer in your answer to jobs created as well as job losses

please answer correctly thank you so much!

Answers

Answer 1

Answer:

The main cause of lack of jobs is due to automation and the ability for computers to do everything faster, more efficiently and effectively.

Explanation:

A specific example - Data entry jobs are redundant from automation programs

- Economic Forum predicted a net increase of 58 million jobs for automation, so this accounts for losses but isn't case specific to data entry


Related Questions

what does a dns server do

Answers

A DNS server is a type of server that translate requests for domain names into IP addresses.

What is a DNS server?

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server is a type of server that translate requests for domain names into IP addresses.

Read more on a website here: https://brainly.com/question/26324021

#SPJ12

An algorithm to find the perimeter of a triangle

Answers

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth.

Answers

Answer:

GigaPOP

Explanation:

A gigabit point of presence, also known as GigaPOP is a single entry point to Internet2, which is a high-speed IP network managed by institutions and other organizations. Gigabit Points of Presence generally handle data transmission rates of one gigabit per second or more.

Which type of URL gives an abbreviated path to a resource using the current page as a starting position?

Answers

A relative URL is a type of URL that gives an abbreviated path to a resource by using the current webpage as a starting position.

What is a relative URL?

A relative URL can be defined as a type of URL that doesn't contain or use the full address of a website, but only the path (location) following the domain name.

This ultimately implies that, a relative URL is a type of URL that gives an abbreviated path (location) to a web resource by using the current webpage as a starting position.

Read more on relative URL here: https://brainly.com/question/26670945

#SPJ12

2. Which domain represents the greatest risk and uncertainty to an organization?

Answers

Answer:

The User Domain

Explanation:

Since human behavior is unpredictable and impacted by forces outside of policy's control, the User Domain carries the most risk and uncertainty. The User Domain is a significant vulnerability in the IT architecture. Any end-user who accesses information at the organization falls within this domain. Employees who neglect to secure their laptops before leaving their offices, for example, or employees who leave critical corporate information on their desks. Such risks have the ability to ruin a company by falling for a social engineering technique can result in the introduction of viruses into the business network. It could result in the encryption of important files required for day-to-day processes. The only option in the lack of comprehensive backups of these documents would be to pay the blackmail. If the hackers unencrypt the data as they promise after the ransom is paid, this might result in days of lost work.

The domain that represents the greatest risk and uncertainty to an organization is known as the user domain.

What is a user domain?

It should be noted that a user domain simply means a vital vulnerability in the IT architecture.

Here, the domain that represents the greatest risk and uncertainty to an organization is known as the use domain.

Here, the username as password are stored on a domain controller.

Learn more about domain on:

brainly.com/question/26098895

#SPJ12

In order for a computer to perform a set of instructions

Answers

It must first be turn on

The _____ is the part of a computer that executes the instructions of a computer program.

Answers

Answer:

Central processing unit (CPU)

Hope you have a great day :)

________ is interpreted. Group of answer choices A. Python B. C C. C D. Ada E. Pascal

Answers

The interpreted are;

A. JavaB. C++D. C#What is interpreted programming language?

An interpreted language is known to be a kind of language where its implementations often carry out or execute instructions directly.

The C++ is known to be a kind of cross-platform language that is often used to make any high-performance app.

Java is known to be High-level programming language that is said to be class-based and also an object-oriented programming language.

Note that The interpreted are;

A. JavaB. C++D. C#

Learn more about Java from

https://brainly.com/question/25458754

#SPJ11

Which command in power bi desktop query editor is used to create a new query that uses the output of another query as its input source?

Answers

The Reference command in power bi desktop query editor is used to create a new query.

What is the Reference command about?

Note that if a person create a reference to another query, there is given just one applied steps where new query is said to be referencing to another query and starts it's own like parent query.

Therefore, The Reference command in power bi desktop query editor is used to create a new query.

See options below

A. Duplicate

B. Pipe

C. Reference

D. Map

Learn more about query from

https://brainly.com/question/25694408

#SPJ12

The _____ characteristic of an intelligent agent demonstrates its ability to learn from previous knowledge and go beyond information given previously

Answers

Answer:

Adaptability

Explanation:

The agent is adaptable, versatile, and capable of establishing its own goals based on its implicit purpose. The range of quality measures for each of the aforementioned qualities, suited to the agent type, will then define software agent quality, and the value of a multi-agent system will be a function of the quality of each of the agents participating in the system.

This characteristic is characterized by the agent's capacity to alter its state in order to adapt to the environment, the ability to evolve and adapt its functionality to the surroundings at runtime, and the ability to appropriately interact with exceptions produced by the environment in order to rate the agent's ability to adjust and survive.

The Adaptability characteristic of an intelligent agent shows its ability to learn from former knowledge and go beyond information given before.

What is Adaptability characteristics?

Adaptable attribute is when people have a kind of elastic-like energy and they are said to be willing to bend and break any given habits, to push themselves when circumstances is altered.

Therefore, The Adaptability characteristic of an intelligent agent shows its ability to learn from former knowledge and go beyond information given before.

Learn more about Adaptability characteristic from

https://brainly.com/question/25594630

#SPJ12

Where would you add a new tag on an invoice that was already created?

Answers

To add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.

What is an invoice?

It should be noted that an invoice is a stamped document that itemizes and records a transaction.

In this case, to add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.

Learn more about invoice on:

brainly.com/question/4056820

#SPJ12

you're using a linux distribution that uses rpm for package management. which command would you use to install httpd, the apache http server package, and all its dependencies?

Answers

The command that a person would use to install httpd is known to be yum install httpd.

What is the command about?

Note that in any Linux distribution that often employs the use of RPM for package management, the act of inputting yum install httpd at the command line will hep a person to be able to install the Apache HTTP Server package and any of its dependencies.

Note that YUM automatically find and downloads RPM packages and as such The command that a person would use to install httpd is known to be yum install httpd.

Learn more about  linux distribution from

https://brainly.com/question/13139061

#SPJ11

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved

Answers

When a designer follow accepted standards and protocols, the basic characteristics of network architecture that's achieved is called scalability.

What is scalability?

Scalability can be defined as a measure of the ability of a system to change (increase or decrease) in performance and cost as a result of changes in demands of application and system processing, especially in a network architecture.

This ultimately implies that, scalability is the basic characteristics of network architecture that's achieved when a designer follow accepted standards and protocols.

Read more on scalability here: https://brainly.com/question/14301721

SPJ12

The sorted values array contains the sixteen integers 1, 2, 3, 13, 13, 20, 24, 25, 30, 32, 40, 45, 50, 52, 57, 60. How many recursive calls are made by our binarySearch method given an initial invocation of binarySearch(45, 0, 15)

Answers

The number of recursive calls that have to be done using the binary search is 4.

How to do the recursive calls

binarySearch = (45, 0, 15)

start + end / 2 = value

mid = 0 + 15/2 = 7.5

The 7th element = 30

30 is less than 45

8 + 15/3

= 23/2 = 11.5

The 12th element = 52

52 is greater than 45

8 + 11/2

= 19/2 = 9.5

The value of 9 = 40 and 40 is less than 45

10+ 11/2 = 10.5

The tenth value is 45 hence the iteration to be done is 4.

Read more on binary here:

https://brainly.com/question/21475482

#SPJ1

a help desk structured into levels or tiers of support uses a ____ support model.

Answers

A help desk that is structured into levels or tiers of support uses a multilevel support model.

What is a multilevel support model?

A multilevel support model can be defined as a type of model that is structured into two or more (multiple) levels or tiers, for the purpose of efficiency and control.

This ultimately implies that, a help desk that is structured into levels or tiers of support uses a multilevel support model.

Read more on multilevel support model here: https://brainly.com/question/15172615

#SPJ11

You have been receiving a lot of phishing emails sent from the domain kenyan.msn.pl. Links within these emails open new browser windows at youneedit.pl. You want to make sure that these emails never reach your inbox, but you also want to make sure that emails from other senders are not affected. What should you

Answers

The thing that should be done is to add kenyan.msn.pl to the email blacklist.

What is phishing?

It should be noted that phishing simply means an attempt to steal ones money by taking the users information online.

In this case, the thing that should be done is to add kenyan.msn.pl to the email blacklist.

Learn more about phishing on:

brainly.com/question/2537406

#SPJ12

I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?

Answers

Answer:

yes but it's barely safe

a web browser is an example of which type of network component?

Answers

A  web browser is an example of Network Client type of network component.

What is a Network Client?

This is known to be a  software that runs  usually on a client computer and it is one that gives room for it to set up connectivity with services that are known to be running on server computers.

Note that A  web browser is an example of Network Client type of network component as that is what it is..

Learn more about web browser from

https://brainly.com/question/22650550

#SPJ11

Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the process?

Answers

In the case above, what just comes to  mind as part of the process is option d.

What is sniffer?

A sniffer is known to be a kind of a software or hardware tool that gives room for a person to be able to “sniff” or look through one's internet traffic in real time, getting  all the data flowing to and from a person's computer.

Therefore, In the case above, what just comes to  mind as part of the process is option d.

Learn more about sniffer from

https://brainly.com/question/14265770

#SPJ1

Alex wrote a science fiction story about half-living, half-robot creatures in
another galaxy. He wanted to copyright the creature idea for later sequels but
was denied. What element was missing?
O A. Creativity
OB. Fixed form
O C. Interest
OD. Originality

Answers

Answer:

im not sure about this one but im pretty sure its d since this is not a original idea at all their are like tons of cyborn alien thing on their and this would not be original

Hope This Helps!!!

Acceptance testing: tests each program separately in the system. tests the functioning of the system as a whole. provides the final certification that the system is ready to be used in a production setting. tests the conversion of legacy data to the new system. includes all the preparations for the series of tests to be performed on the system.

Answers

Acceptance testing provides the final certification that the system is ready to be used in a production setting.

What is an acceptance testing?

It should be noted that acceptance testing is the last phase of software testing.

In this case, acceptance testing provides the final certification that the system is ready to be used in a production setting.

Learn more about acceptance on:

brainly.com/question/14378792

#SPJ12

What options are available for storing backups, physically?

Answers

The options are available for storing backups, physically are:

In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any  remote system that is off-site.

What is a backup?

This is known to be a device that helps to save information or data temporarily or permanently.

Note that in the above, The options are available for storing backups, physically are:

In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any  remote system that is off-site.

Learn more about backups from

https://brainly.com/question/17355457

#SPJ12

Which transform function would you use to operate the filename values into two separate columns, one for the filename and the other for the file extension? e. G. , xml

Answers

The transform function that a person can use to operate the filename values is Split Column - Split at Right-most delimiter

What is Split a column by delimiter?

A person can split or divide a column that has a text data type into multiple columns via the use of a common delimiter character.

An example is: A Name column that has some values written that is <LastName>, <FirstName> This is one that can be divided into two columns via the use of the comma (,) character.

Therefore, The transform function that a person can use to operate the filename values is Split Column - Split at Right-most delimiter which is option d.

See options below

A. Extract - Text before delimiter

B. Split Column - Split at Each occurrence of the delimiter

C. Extract - Text after delimiter

D. Split Column - Split at Right-most delimiter

Learn more about transform function from

https://brainly.com/question/1548871

#SPJ12

the ________ directive causes the contents of another file to be inserted into a program.

Answers

The #include directive causes the contents and resources of another file to be inserted into a software program.

What is a file?

A file can be defined as a computer resource that avails an end user the ability to store, save, or record data as a single unit on a computer storage device.

In Computer programming, the #include directive is a command which causes the contents and resources of another file to be inserted into a software program.

Read more on files here: https://brainly.com/question/6963153

#SPJ12

when was technology created?

who start it?

and finally how it started?


free coins
just answer

Answers

Answer:

two million years ago

Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.

write the definition of a method reverse, whose parameter is an array of ints. the method reverses the elements of the array. the method does not return a value.

Answers

The reverse() method reverses the order of the elements in an array.

What is a reverse method?

The reverse() method reverses the order of the elements in an array.

The reverse() method overwrites the original array.

What the reverse method does in array is to change the order of the items in array in a descending order.

For example

var fruits = ["Banana", "Orange", "Apple", "Mango"];

fruits.reverse();

The fruits.reverse(); will return [Mango, Apple, Orange, Banana}

Notice it has been reversed.

The code it written in Javascript.

learn more on reverse method here: brainly.com/question/14500181

#SPJ2

Danielle has been asked to configure virtualization at her company. She recommends that her manager buy multicore processors. What justification should she give as to why virtualization workstations require as many CPU cores as possible

Answers

The justification should she give as to why virtualization workstations require as many CPU cores as possible are the Each virtual machine makes use of actual CPU resources for processing instructions and data (pg227, 228).

What justification need to she deliver as to why virtualization workstations require as many CPU cores as possible?

Because every visitor's working device runs in its personal space, a couple of cores are required to shop the collective data.

Footprint discount is the primary goal, go together with a bigger wide variety of cores over quicker clock speeds. However, if workload overall performance is a larger concern, quicker clock speeds and less cores would possibly make greater sense.

Read more about the virtualization :

https://brainly.com/question/25110079

#SPJ1

_____ is not considered a challenge when designing applications for multicore systems. A) Deciding which activities can be run in parallel B) Ensuring there is a sufficient number of cores C) Determining if data can be separated so that it is accessed on separate cores D) Identifying data dependencies between tasks.

Answers

Answer:

B) Ensuring there is a sufficient number of cores.

The online promotional method that involves applying specific Web design and development techniques to Web pages to increase the possibility that the pages will appear near the top of a search results list is called ____.

Answers

Answer:

Search Engine Optimization (SEO)

Explanation:

SEO, or search engine optimization, is a critical online marketing approach that entails getting your website and business accessible in search engines. Ultimately, SEO is a catch-all phrase for any approach used to boost your website's ranking in search results for keywords related to your business.

Identifying what consumers look for online, the phrases or terminology they use, and the sorts of material they want to consume are key components of any search engine optimization plan. When done effectively, SEO helps marketers to reach and engage with individuals who are looking for the products and services that their company provides.

How do i get in if i just turned thirteen and i already picked under thirteen on the log in page?

Answers

Answer:

Generally, there is an option under your account settings in which you can change the age that you are. Since you turned 13 for example but you put your age as under 13 in the log in details, just access your account settings and change to 13 or above. Also, it is best to have a trusted adult such as a parent moniter you when you make changes to your personal imformation on an account.

Other Questions
what is the last item on the vehicle starting checklist Three-year-old maddox mistakenly thinks that blown-up balloons are always round. His idea best illustrates What type of resource is present in a waterfall in exponential growth functions. the base of the exponent must be greater than 1? how would the function change if the base of the exponent were between 0 and 1? what steps do you need to do to evaluate the following expression? Select two options. 5(2) Drag 5 sets of 2 tiles to the window. Drag zero pairs to the window. Remove the 5 groups of 2 tiles. Remove 5 negative tiles from the window. If a wire carrying an electric current is placed in a magnetic field, a force is produced. What name is given to this effect? What was part of the second wave of the womens movement?passage of the Equal Rights Amendmentpublication of The Feminine Mystiquepassage of voting rights for womenreduction of enrollment of women in law school Please help quick!! Lucite contains 59.9 g C, 8.06 g H,and 32.0 g O. You want todetermine the empirical formula.How many moles of H are in thesample?{?} mol H A.emotional health : expressing feelingsB.physical health : respecting othersC.mental health : living in harmony with the environmentD.social health : getting adequate sleep The data table shows how the amplitude of a mechanical wave varies with the energy it carries. Analyze the data to identify the mathematical relationship between amplitude and energy. Use your equation to find the energy if the amplitude is 6 units. Amplitude Energy 1 unit 2 units 2 units 8 units 3 units 18 units 4 units 32 units A. 66 units B. 60 units C. 72 units D. 74 units Find the coordinates of the midpoint of the segment whose endpoints are given W (-3,-7) and X (-8,4)1. (-11/2) -(11/2)2.(-5/2)-(3/2)3.(-5/2-(11/2) someone help me get outta summer school slope? And y intercept? The theoretical yield of NaBr from2.36 mol FeBr3 is 7.08 mol NaBr.What is the percent yield if 6.14 molNaBr were collected?[?]% Circle O has a circumference of approximately 44 in.----dOMark this and returnWhat is the approximate length of the diameter, d?O 7 in.O 14 in.O 22 in.O44 in.Save and ExitxtSubmit How many 1/4 minutes are there in 3/4 minutes? the vate rate of a country is 15% ,a woman bought an item with a price tag ghc 300 plus vat .what price did she pay for the item. disributivity of multiplication over addition for rational numbers solve : -3/4 , 2/3 and -5/6 = 1/8 ? how ? Match each detail from the passage with the statement that best explains how it develops the character of Simon Wheeler in the cultural setting. adapted from The Celebrated Jumping Frog of Calaveras Countyby Mark TwainI found Simon Wheeler dozing comfortably by the stove of the run-down tavern in the decayed mining camp of Angel's. I noticed he was fat andbald-headed and had a gentle, simple expression on his calm face. He stood up and said good day to me. I told him that a friend of mine had askedme to inquire about a dear companion of his from boyhood named Leonidas W. Smiley-Reverend Leonidas W. Smiley. He was a young minister whosupposedly was living at one time at Angel's Camp. I added that if Mr. Wheeler could tell me anything about this Reverend Leonidas W. Smiley, Iwould be most grateful.Simon Wheeler backed me into a corner and trapped me there with his chair. Then he sat down and reeled off a monotonous story. He neversmiled; he never frowned. He never changed his voice from the gentle-flowing tone in which he began his first sentence. He never gave the slightesthint of enthusiasm. But all through the endless narrative he stayed impressively earnest and sincere. This showed me that, far from thinking therewas anything ridiculous or funny about his story, he thought it was a really important matter. He admired the heroes of the story as men of greatgenius. I let him go on in his own way and never interrupted him once.1"backed me into a corner and trapped methere with his chair2"dozing comfortably by the stove of therun-down tavern in the decayed mining camp3"admired the heroes of the story as men ofgreat genius Need help with this question!