1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
2 years ago
6

What is an example of new technology having a negative impact on sustainability?.

Computers and Technology
1 answer:
Talja [164]2 years ago
6 0

An example of new technology having a negative impact on sustainability is the use of computer automation to shut down unused electronic devices.

<h3>What is technology?</h3>

Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.

<h3>What is a computational sustainability?</h3>

Computational sustainability can be defined as a process through which societal, economic, ecological and societal resources are balanced for the future well-being of humanity, especially by developing computational models and using mathematical and information science techniques.

In this context, we can infer and logically deduce that an example of new technology having a negative impact on sustainability is the use of computer automation to shut down unused electronic devices.

Read more on computational sustainability here: brainly.com/question/25719495

#SPJ1

You might be interested in
2 (01.01 LC)
myrzilka [38]

Answer:

They write code that translates commands to binary code.

Explanation:

Coding or programming is the process of creating instructions for computers using programming languages. Computer code is used to program the websites, apps, and other technologies we interact with every day.

4 0
3 years ago
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
. It is essential for a relay energized by alternating current to have A. many turns of small wire. B. a laminated core and a sh
Tomtit [17]
The correct answer is B, a laminated core and a shading coil.

A key difference in an AC relay is the presence of a "shading coil". The purpose of this coil is to keep the relay on when the current drops to zero during phase change (note that in AC power the current and voltage are alternating in a sine wave around 50/60 times per second). The shading coil retains some magnetic energy and essentially holds the relay ON when the current drops to zero momentarily due to the AC waveform.

AC relays also have a laminated core to prevent losses due to eddy current heating.
6 0
4 years ago
What is another word for controls​
viktelen [127]

Answer:

command jurisdiction

sway

power

authority

command

dominance

domination

government

mastery

leadership

rule

reign

Explanation:

4 0
3 years ago
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related
NikAS [45]
In general, a systems analyst is a person who uses analysis and design strategies to solve business problems.
They also analyze an organization’s current computer systems and develop information systems solutions to help the organization run more smoothly.

Now knowing a systems analyst job, therefore the answer to this is “FALSE”.

<span> </span>

6 0
4 years ago
Other questions:
  • Which of these expressions is used to check whether num is equal to value?
    12·1 answer
  • Please help i really need to turn this in already
    6·1 answer
  • Which file extension indicates a Microsoft Excel document?
    7·1 answer
  • How do I do the matrix falling code on command prompt? Need Help?!
    14·1 answer
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • What feature of virtualization software allows you to revert to a previous point in time in the event you make an unrecoverable
    9·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • Python - Write a program to print the multiplication table as shown in the image by using for loops.
    12·1 answer
  • Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store t
    9·1 answer
  • The result of processing data ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!