1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
11

Pls help is very urgent and I will mark u as brainliest plsssss​

Computers and Technology
2 answers:
elena-s [515]3 years ago
5 0

Answer:

this is the method of processing wood

Rama09 [41]3 years ago
5 0

Answer:

Please check the attachment to this answer for the chart:

The stages include

1. cutting and pruning

2. transportation or storage

3. debarking

4. sawing (bucking)

5. seasoning

Explanation:

Now let me explain each of these processes briefly:

1. cutting is also known as felling of trees and it refers to the process by which trees are knocked or cut down while pruning refers to the removal of the branches to create just the log. This process depend on some factors such as age of tree, season, type of tree e.t.c

2. transportation refers to the moving of the log from the forest to the factory. An inexpensive way of transporting felled trees is through river route, where the log floats to the desired destination. When the log is not to be used immediately, it is stored for future processing

3. debarking is the process of removing the removal of the outer covering on the log (barks). This is to reduce impurities with the wood and to make cutting easy

4. sawing or bucking is the process of cutting the log of tree into slabs and planks using sharp cutting tools like the chain saw. Sawdust is gotten in this process

5. seasoning is the process of removing water from a wood. because about 50% of wood contain water. seasoning can either be done using physical or chemical methods, and seasoning helps to stabilize the structure of the wood for engineering manipulation.

I suggest you watch a video on wood processing, it will make these processes clearer.

You might be interested in
What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
lesya [120]

Answer:

/etc/timezone

Explanation:

Debian based Linux distribution is a free distribution software and an operating system. It is composed of a open source and free source software. It is one of the most popular distributions.

A computer file name is a unique system of identifying the computer stored file in the file system. The names of the different file system have different formats or extensions in the file name and imposed different file restrictions.

In the context, the full path and the file name of a file that displays a time zone settings on a Debian Linux distribution is " ../etc/timezone".

3 0
3 years ago
Forensic scientists generally photograph and sketch a computer and its components during their analysis? True or false
jenyasd209 [6]
This is considered true sir 
6 0
3 years ago
Read 2 more answers
The Twitter website has become a de facto first source for many important events in the last decade. Twitter's hashtag feature l
timurjin [86]

Answer:

..........................................?

7 0
3 years ago
Read 2 more answers
Which of the following is NOT a name of one of the central features of Facebook? Timeline Activity Log Graph Search Daily News
Thepotemich [5.8K]
I think it's Graph Search because there isn't any graphs in Facebook. That is my opinion. I don't use social media.
4 0
3 years ago
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
3 years ago
Other questions:
  • You install an M.2 SSD card in an M.2 slot on a motherboard. When you boot up your system, you discover the DVD drive no longer
    15·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    7·2 answers
  • Sofia is reading a difficult text for class and worries that she won't complete it by the given deadline. How can a text-
    13·2 answers
  • Explain how it is possible for a sequence of packets transmitted through a wide area network to arrive at their destination in a
    14·1 answer
  • Which layer enables the receving node to send an acknowledgement?
    11·1 answer
  • A computer can function in the absence of software true or false​
    15·2 answers
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • Scenario
    7·1 answer
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!