1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
4 years ago
8

Examples of environmental technology

Computers and Technology
2 answers:
steposvetlana [31]4 years ago
3 0
76. One of the best example of environmental technology that we are currently using is the solar light energy. IT took its electricity in a sun and accumulate those energies into a solar technology. Then after that it can already light the whole house or makes your appliances working without using the current electricity provided by the electric Companies. Second is the water filter technology. IT collects water from the rain then filter it and can be use in doing the household chores like laundry, washing plates, etc.
sertanlavr [38]4 years ago
3 0
Two examples of environmental tecnology is solar panels and wind turbines.
You might be interested in
When computer network are joined together they form a bigger network called the​
Airida [17]

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

8 0
3 years ago
write a function interest() that takes one input, a floating-point interest rate (e.g., 0.06, which corresponds to a 6% interest
Novay_Z [31]

Code:

def interest():

   interest_rate = 0.06

   investment = input(int('Investment: '))

   yield = 0

   year = 0

   while (yield < investment):

       year += 1

       yield  = investment * interest_rate

   print (year)

NOTE: i wrote this code assuming that the investment for the next year is the same as the first year and so forth

8 0
3 years ago
Write an expression to detect that the first character of the userInput matches the firstLetter.
Strike441 [17]
Easy just put ur answrr
8 0
3 years ago
Which items make up the stamen of a flower? Stigma, style, filament, anther, ovule.
d1i1m1o1n [39]
Anther and Filament
hope his helped ;)
5 0
4 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
4 years ago
Other questions:
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    8·1 answer
  • How do you report someone on Brainly?
    6·1 answer
  • Compare and contrast a linked list and an array.
    14·1 answer
  • Iceland was formed by _____.
    15·2 answers
  • The format painter button is found in the ____ group on the home tab of the ribbon.
    6·1 answer
  • What command enables you to initialize quotas on a file system?
    9·1 answer
  • Plz I need the answer ASAP. I’ll mark brainliest
    5·1 answer
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • Why people shouldnt get married​
    6·1 answer
  • Voice of the customer, Social Media Analytics, churn analysis, survey analysis, and market research analytics are more likely to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!