1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
13

The concept of vertical farming allows agriculture to occur when there is not enough___Available .

Computers and Technology
1 answer:
eimsori [14]3 years ago
7 0

Answer:

land

Explanation:

Vertical farming is a modern method of farming or growing crops and vegetation. It allows growing of crops in stacked layers which is vertical. The crops are grown in a well equipment controlled-environment set up.

Vertical farming is done where there is fewer land resources as well as water resources. The main is to increase the crop yield with a very less use of land resources. But it requires more energy than the conventional energy.

You might be interested in
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Which of the following is true about occupations within the STEM fields? Many occupations use mathematics, even if it is not the
Kazeer [188]

Answer:

Many occupations use mathematics, even if it is not the primary focus of a given job.

Explanation:

Think about software developers, they develop apps, websites, and other things, but they also use math in the process. Scientists use statistics. Mechanics use math to make sure their measurements are right. Therefore, I think your best bet would be

A. Many occupations use mathematics, even if it not the primary focus of a given job.

8 0
3 years ago
Read 2 more answers
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Describe how you would conduct a search for a single record.
Anastasy [175]
Er..... i do not know the answer to this
8 0
3 years ago
You enter the show ipv6 route command on an ospf device and the device displays a route. which conclusion can you draw about the
salantis [7]
<span>OSPFv3 is in use.......</span>
4 0
4 years ago
Other questions:
  • Mirrors on cars exist to____.
    7·2 answers
  • Will give Brainiest and stuff to right answer[s].
    12·2 answers
  • To see all of the records at once, you should use _______ view. 
    12·2 answers
  • Which formula is used to measure accuracy?
    11·1 answer
  • Precautionary measures to be observed when using ICT tools​
    15·1 answer
  • Next, Kim decides to include a diagram of a frog’s life cycle in her presentation. She wants to use an image that is part of a p
    15·2 answers
  • Selma writes the following four answers in her Computer Science examination.
    8·2 answers
  • In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
    7·1 answer
  • CSNET Stand for in a computer
    11·1 answer
  • Explain the use of mail merge feature. <br>pls help​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!