1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
2 years ago
7

1.) How do parks and other green spaces benefit a community?

Computers and Technology
2 answers:
zmey [24]2 years ago
7 0
D)Parks and other green spaces prevent birds and other wildlife from nesting in undesirable places, such as homes and businesses.
Elenna [48]2 years ago
6 0
A. They help reduce pollution
You might be interested in
Assume:
kobusy [5.1K]

Answer:

?

Explanation:

8 0
3 years ago
What is the name of the first practical asymmetric cryptosystem that was created?
victus00 [196]

Answer:

I think the name is RSA

4 0
2 years ago
What Is What is the difference between system software and application software?<br>​
inna [77]

Answer:

Hope it helps have a nice day..

4 0
2 years ago
If you have long column labels with columns so wide that they affect the readability of a worksheet you should first
jonny [76]
You should first .<span>consider how you could shorten the column labels.
Shortening the column labels could be easily done by dragging the column to the size that we want. But when shortening the column labels, some problems might occur such as the content might be distorted and in will become unevenly placed.</span>
5 0
3 years ago
Read 2 more answers
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
2 years ago
Read 2 more answers
Other questions:
  • What was the purpose of the Declaration of Independence and what led to it​
    10·1 answer
  • Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to
    5·1 answer
  • Identify the most appropriate way to display the following research data.
    12·1 answer
  • In the game of economics, which player has the role of providing goods and services
    10·1 answer
  • The first computer (the eniac was how big
    8·1 answer
  • "A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to
    14·1 answer
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • What is the output of the following program?
    8·1 answer
  • 4.3 Code Practice: Question 1
    12·2 answers
  • What are three ways a person may use a computer without realizing it?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!