1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
2 years ago
10

Write a report on the effectiveness of using thicker bags. Remember to include the effect on the environment and the economy in

your report
Computers and Technology
1 answer:
malfutka [58]2 years ago
4 0

The effectiveness of using thicker bags are:

  • It has the lowest environmental impact in terms of any other disposable bag.
  • It can be used three to six more times.
  • It is environmentally sustainable.

<h3>What is the effect of thicker plastic bags have on the environment?</h3>

The use of plastic bags is known to have some form of detrimental effects on the such as animal choking, pollution, and others.

Conclusively, Note that thicker bags needs a lot of plastic to be able to produce it and it goes to waste even if a person do not use it again.

Learn more about environment from

brainly.com/question/17413226

You might be interested in
Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtractio
Mariulka [41]

Answer:

class Example:

def __init__(self, val):

self.val = val

def __gt__(self, other):

return self.val > other.val

def __sub__(self,other):

return abs(len(self.val) - len(other.val))

def main():

obj1 = Example('this is a string')

obj2 = Example('this is another one')

print(obj1 > obj2)

print(obj1 - obj2)

main()

\color{red}\underline{Output:}

3 0
3 years ago
Hello I am currently working on a multi-sim project. In the file I have already created a timer that goes from 00 - 80 and reset
Digiron [165]

// Copyright 2017 The Chromium Authors. All rights reserved.

// Use of this source code is governed by a BSD-style license that can be

// found in the LICENSE file.

'use strict';

/**

* Alias for document.getElementById.

* @param {string} id The ID of the element to find.

* @return {HTMLElement} The found element or null if not found.

*/

function $(id) {

 // eslint-disable-next-line no-restricted-properties

 return document.getElementById(id);

}

/**

* Get the preferred language for UI localization. Represents Chrome's UI

4 0
3 years ago
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
german

The statement that completes the query is: bytes / 1000 AS kilobytes

<h3>SQL (Structured Query Language)</h3>

This is the language that is used to retrieve, update, and store data in the database.

<h3>Columns</h3>

From the question, we have the following table columns

  • track_id
  • track_name (name of the music track)
  • composer
  • bytes (digital storage size of the music track

To retrieve data from the bytes column, we make use of:

SELECT bytes ......

From the question, we understand that this column should be divided by 1000, and the AS command should be used.

So, the query becomes

SELECT bytes / 1000 AS kilobytes .....

Hence, the statement that completes the query is: bytes / 1000 AS kilobytes

Read more about database at:

brainly.com/question/24223730

5 0
2 years ago
Question 12 (2 points)
Gelneren [198K]
1.) narrative = a THATS all I can answer rn sorryyyy
5 0
3 years ago
Read 2 more answers
Other questions:
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
    14·1 answer
  • Write assembly programs with the following I/O
    15·1 answer
  • Driswers.
    13·2 answers
  • A letter of application should be written on:
    13·1 answer
  • Modify the CountByFives application so that the user enters the value to count by. Start each new line after 10 values have been
    7·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • 5. Give one word answers:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!