1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
11

Which of the following is a way to prevent wastes from contaminating the environment? A) Use absorbent pads to collect floor was

h water and wring out the pads outside in the grass B) Flush floor cleaning wastes into the sanitary sewer system C) Dispose of absorbents as hazardous waste in its own hazardous waste container D) Never use granular absorbents more than once
Computers and Technology
2 answers:
Firlakuza [10]3 years ago
8 0

Answer

Dispose of absorbents as hazardous waste in its own hazardous waste container

Explanation

Hazardous waste is a waste that has chemical composition and properties which makes it capable of causing illness, death  or harm to humans and other life forms when released to the environment without proper management. The characteristics of such wastes include: toxic, ecotoxic, infectious substance, poisonous, explosive and flammability. Hazardous wastes can be destroyed by incineration, chemical process, and temporary on-site waste storage facilities such as waste piles and lagoons/ponds



sleet_krkn [62]3 years ago
3 0

The anser is C, I took the test

You might be interested in
A function is executed when it is
Alekssandra [29.7K]

Answer:

D. called

Explanation:

A function is executed when it is called.

Function definition comprises of the code body of the function.For example:

int add(int a, int b){

    return a+b;

}

Function declaration or function prototype specifies the signature of the function ( number and type of arguments, return type). e.g,

int add(int a,int b);

Function call is when the function is executed with actual arguments:

add(2,4);

This will return 6 upon execution of function body.

6 0
3 years ago
Which of these are examples of a Single Sign-On (SSO) service?
12345 [234]
Kerberos and OpenID are SSO Services.
5 0
3 years ago
The device that store data and program for current purpose​
Musya8 [376]

Answer:

A computer, what you are using. smh.

6 0
3 years ago
Read 2 more answers
How to control what is on the x and y axis in excel?
kozerog [31]
The value on X you choose first and create a graph then you add values to graphs Y axis.
8 0
3 years ago
1) Create a recursive program that prompts the user for a nonnegative integer N and outputs. a) Sum [N] b) BiPower [N] c) TimesF
Georgia [21]

Answer:

//Code is created using java

import java.util.*;

// returns the sum

public int sum(int N)

{

if(N==1)

return (1);

else

return N+sum(N-1);

}

// code to return the Bipower ouput

public int BiPower(int N)

{

if(N==1)

return (2);

else

return 2*BiPower(N-1);

}

// Code to return TimesFive output

public int TimesFive(int N)

{

if(N==1)

return 5;

else

return 5 + timesFive(N-1);

}

public static void main(String args[])

   {

//Prompts the user to enter a nonnegative integer

       int N  = Integer.parseInt.(console.readLine("Enter a nonnegative integer:  "));

//Outputs the sum, Bipower and TimesFive

       System.out.println(sum(n));

       System.out.println(BiPower(n));  

       System.out.println(TimesFive(n));

   }

}

4 0
3 years ago
Other questions:
  • Which option is referred to by the Animals tag?
    5·1 answer
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • Writers should avoid jargon because jargon ______. a. Takes too long to use b. Limits what ideas can be explored c. Conveys too
    12·1 answer
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • One page of content in a PowerPoint presentation is referred to as a
    12·1 answer
  • is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or av
    6·1 answer
  • What is the purpose of file extensions? A. They execute the mail merge function, B. They tell the operating system what kind of
    15·2 answers
  • A plan budget time for studying and activities is referred to as?
    11·1 answer
  • Plz help Complete the sentence.
    11·2 answers
  • In addition to reduced power consumption, what is an advantage of using hyperscale cloud computing data centers?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!