1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
4 years ago
10

Which of the following is the most wasteful use of water? A) Taking a shower rather than a bath . B) Watering the garden with re

cycled water . C) Running dishwashers before they are completely full . D) Replacing high-flow showerheads with low-flow showerheads .
Social Studies
2 answers:
satela [25.4K]4 years ago
6 0

C) Running dishwashers before they are completely full

iragen [17]4 years ago
3 0
Out of the choices given, the most wasteful use of water is someone running their dishwasher before they are completely full. The rest of the choices conserve water, unless a person takes a very long shower. The correct answer is C. 
You might be interested in
HELP PLEASE WILL GIVE BRAINLIEST
Mama L [17]

Answer:

the answer is: A high risk investment with a potentially high rate of return

4 0
3 years ago
Critique an ad that you see on TV or in a magazine. Answer the following
Dmitriy789 [7]

Answer:

For me personally I always think of this one tv ad. It was some kind of brand of paper plates.

In the video there's a guy with a generic paper plate of spaghetti and meatballs, and he is holding it with one hand. The weight of the food tilts the plate and it falls off. If he was holding it with 2 hands this wouldn't have happened.

The ad introduces a "deep dish plate" <u>that improves his life</u> by preventing his food from spilling, and the man is now seen with a deep dish paper plate of spaghetti and meatballs, but now he is holding it with 2 hands.

I was annoyed by the ad because, the main problem was less that the food was too heavy for the plate and more that he was holding the plate in an improper manner. He wouldn't have to buy deep dish plates to solve his problem, only make sure he holds his plates correctly.

You'd want to hold the plate on both sides so it doesn't tilt over and spill the contents on the floor.

(I suppose you'd want to use this as an example for your critique, I recommend coming up with your own original work)

7 0
3 years ago
2) Which of the following is not an attribute of computers?
stellarik [79]
Answer: A

Explanation: I just know
4 0
2 years ago
Read 2 more answers
What happens if no candidate receives a majority of electoral votes?
sladkih [1.3K]
If no candidate receives the majority vote in the electoral college the house of representatives will vote. <span />
5 0
3 years ago
There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp
Mariana [72]

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

5 0
3 years ago
Other questions:
  • Why do you think trueblood receives so much more charity from the white community than from his own?
    9·1 answer
  • The plebeians wanted more of a voice in the government. From their assembly the chose 10 ___ to represent them.
    10·1 answer
  • 1791—Declaration of the Rights of Women and the Female Citizen (France)• 1829—Prohibition of sati (India)• 1857, 1882—Married Wo
    14·1 answer
  • Caleb and Amara sleep through a passing police siren and the blaring of their neighbor's stereo, but wake instantly when their n
    8·1 answer
  • Allan seemed to forget that he was abused by a family member when he was very young. When he later remembered that he was the vi
    10·1 answer
  • After receiving numerous complaints from residents about loud, highly amplified music played at local clubs, Middletown is consi
    8·1 answer
  • One trade route that was part of the so-called triangular trade
    14·2 answers
  • After Rachel bought a magazine subscription, she does not enjoy the articles in the magazine. However, she dutifully reads the e
    11·1 answer
  • The labor movement was blamed for the death of seven police officers during __________.
    11·1 answer
  • How could separate governments be A weakness?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!