1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
11

Pls help is very urgent and I will mark u as brainliest plsssss​

Computers and Technology
2 answers:
elena-s [515]3 years ago
5 0

Answer:

this is the method of processing wood

Rama09 [41]3 years ago
5 0

Answer:

Please check the attachment to this answer for the chart:

The stages include

1. cutting and pruning

2. transportation or storage

3. debarking

4. sawing (bucking)

5. seasoning

Explanation:

Now let me explain each of these processes briefly:

1. cutting is also known as felling of trees and it refers to the process by which trees are knocked or cut down while pruning refers to the removal of the branches to create just the log. This process depend on some factors such as age of tree, season, type of tree e.t.c

2. transportation refers to the moving of the log from the forest to the factory. An inexpensive way of transporting felled trees is through river route, where the log floats to the desired destination. When the log is not to be used immediately, it is stored for future processing

3. debarking is the process of removing the removal of the outer covering on the log (barks). This is to reduce impurities with the wood and to make cutting easy

4. sawing or bucking is the process of cutting the log of tree into slabs and planks using sharp cutting tools like the chain saw. Sawdust is gotten in this process

5. seasoning is the process of removing water from a wood. because about 50% of wood contain water. seasoning can either be done using physical or chemical methods, and seasoning helps to stabilize the structure of the wood for engineering manipulation.

I suggest you watch a video on wood processing, it will make these processes clearer.

You might be interested in
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
sergiy2304 [10]

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

3 0
2 years ago
1. Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.
boyakko [2]

Answer:

(d) all of the above

Explanation:

This is because, not only is digital video a core technology for digital television, it also happens to be a core technology for video conferencing and video messaging. This could be seen in its application in messaging apps for private discussion of for holding official meetings between employees in virtual conference.

8 0
3 years ago
Which of the following statements is true of infrastructure?
bazaltina [42]

Answer:

Examples of infrastructure include transportation systems, communication networks, sewage, water, and electric systems. Projects related to infrastructure improvements may be funded publicly, privately, or through public-private partnerships.

3 0
2 years ago
Read the following characteristic:
Ivanshal [37]

Answer:

A goal of procedural programming

An advantage of object oriented programming

A disadvantage of object oriented programming

A drawback of procedural programming

3 0
2 years ago
11.How would you characterize the relative range of paths forecasted by the various computer models on August 25
larisa86 [58]

Answer:

Following are the solution to this question:

Explanation:

There is some difference between both the path expected by different computer simulations on 25 August. There is also some variance between 50 km to 500 km in the predicted route but the path is also unique in each model evaluation. It might be because any and every possible situation is repeated by the computer program. Many simulations will focus mostly on variations of strain, one might focus on the temperature variation, or one might concentrate on certain variables. But each model suggests all and every parameter which is inserted during a very photographer's encoding. There are therefore several possibilities of variability in forecasting the Hurricane's course. Here and some forecasts have shown that hurricanes would pass through Florida fully, and also some models have shown that hurricanes would pass thru the Gulf Coast, accompanied by the areas of Mississippi or Louisiana. This is the real difference in the direction of these models.

3 0
3 years ago
Other questions:
  • You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat
    14·1 answer
  • What was the purpose of the Declaration of Independence and what led to it​
    10·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • When was unicode invented?
    13·1 answer
  • How is a cell named?
    12·1 answer
  • You insert a comment in a worksheet by using a command on the ____ tab on the Ribbon.
    13·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • A style ____ is a series of rules that defines the style for a web page or an entire web site.
    6·1 answer
  • A reflexive pronoun is a pronoun
    6·1 answer
  • Help me please with this
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!