1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
4 years ago
7

Hydropower uses moving water to do work, such as grinding grains in a mill. True False

Computers and Technology
1 answer:
Wittaler [7]4 years ago
8 0
True
hydropower is the process in which the kinetic energy in the water is made useful
You might be interested in
In access, field names cannot contain digits. true or false.
Sedaia [141]
The answer is false.
8 0
3 years ago
Write a script called checkLetter.sh Review Greeting.sh for an example. Use a read statement and ask user to "Enter A, B, or C:
Artist 52 [7]

Answer:

The code is given as below: The input and output is as given for one case.

Explanation:

echo -e "Enter A, B or C : \c" #Printing the line on the screen

read -rN 1 test #read the character in the variable test

echo

case $test in #Setting up the case structure for variable test

[[:lower:]] ) #checking all lower case letters

echo You did not enter A, B or C;;

[D-Z] ) #checking upper case letters from D to Z

echo You did not enter A, B or C;;

A ) #Condition to check A

echo You entered A;;

B ) #Condition to check B

echo You entered B;;

C ) #Condition to check C

echo You entered C;;

esac #Exiting the case structure

7 0
4 years ago
In peer to peer systems, the guarantees offered by conventional servers may be violated by:(a) physical damage to the host;(b) E
gayaneshka [121]

Answer:

Check the explanation

Explanation:

The two examples for each type of violation:

A) Power failure and Act of sabotage

B) Accidental deletion of file and Permission failure

C) Tampering of data, Denial of service attack

D) Failures of HDD (hard disk) and finding program bugs.

Note:

There is a difference in trusted behavior for pc's and servers are relevant because pea-to-peer system must be designed to cope with the looser interpretation of trust for pi s

4 0
4 years ago
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
Zielflug [23.3K]
If some files appear dimmed in one of the default folders on your computer, the best course of action would be to A. leave the files as they are.
These files are probably either hidden or system files, which are never meant to be deleted or moved.
8 0
4 years ago
Of the 3 primary electrical entites (voltage, current, and resistance )which is the result of the other two
sveta [45]

Answer: A

Explanation:cuz

5 0
4 years ago
Other questions:
  • #Write a function called one_dimensional_booleans.
    13·1 answer
  • Design an application that has an array of at least 20 integers. It should call a module that uses the sequential search algorit
    13·1 answer
  • ) write a program that creates a vector of string called "vec". vector "vec" grows and shrinks as the user processes the transac
    6·1 answer
  • The Printer Event 1 P1 requests and is allocated the printer R1. 2 P1 releases the printer R1. 3 P2 requests and is allocated th
    10·1 answer
  • What data unit is addressed based on the IP address of the recipient?
    8·1 answer
  • a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
    12·1 answer
  • What is the correct syntax to take the first five characters from the cell A2 and place it to its right in cell A3? =RIGHT(A3,5)
    5·2 answers
  • Somebody pls help!!! i don’t know what i did but i don’t know how to fix it
    8·1 answer
  • The type of line shown below represents an / a:​
    11·1 answer
  • Draw
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!