1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
9

What is your definition of Green/Eco Driving?

Computers and Technology
1 answer:
Masja [62]3 years ago
8 0
Using/driving with an electric car or using car that is ecologically friendly (less pollution) Ex.Bio Fuel
You might be interested in
Your Windows client systems are joined to the WestSim domain. To ensure correct time stamps are used, you need to verify that th
natita [175]

<u>Full question:</u>

Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone.

Which command can you use to do this?

• w32tm /tz

• w32tm /monitor

• w32tm /register

• w32tm /query /status

<u>Answer:</u>

w32tm /tz command can you use to do this

<u>Explanation:</u>

W32tm.exe is the approved command-line mechanism for configuring, monitoring, or troubleshooting the Windows Time service. This mechanism is a portion of the default connection between Windows and Windows Server. One can use W32tm.exe to configure Windows Time service settings and to diagnose time setting obstacles.

The syntax is W32tm </parameter> </param2>. w32tm /tz will represent contemporary time zone settings. The Windows Time service is not a full-featured NTP clarification that convenes time-sensitive reinforcement requirements, and it is not verified by Microsoft as such.

6 0
4 years ago
You are employed as a network administrator at Widget. The Widget network is TCP/IP based. You have been instructed to configure
wolverine [178]

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

Explanation:

  • DHCP provides reliable IP address configuration, while reducing network administration.
  • Discovery : The DHCP client broadcasts a DISCOVER message on the network subnet using the destination address or the specific subnet broadcast address.  A DHCP client may also request its last known IP address
  • Offer :When the server receives a DISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a OFFER message to the client.
  • Request : In response to the DHCP offer, the client replies with a REQUEST message, broadcast to the server,[a] requesting the offered address.
  • Acknowledge : When the DHCP server receives the REQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a ACK packet to the client.
7 0
3 years ago
Output values below an amount
valina [46]

Answer:

Explanation:

The following code is written in Python and it is a function called filter, which takes in the requested inputs. It then places the threshold in its own variable and pops it out of the array of inputs. Then it loops through the array comparing each element with the threshold and printing out all of the ones that are less than or equal to the threshold.

def filter():

   num_of_elements = input("Enter a number: ")

   count = 0

   arr_of_nums = []

   while count <= int(num_of_elements):

       arr_of_nums.append(input("Enter a number: "))

       count += 1

   threshold = arr_of_nums[-1]

   arr_of_nums.pop(-1)

   print(threshold)

   for element in arr_of_nums:

       if int(element) < int(threshold):

           print(element)

       else:

           continue

7 0
3 years ago
Why is a niche important in video production
abruzzese [7]

Answers

You need a niche to start your recording for let's say commentary you'll need that for your commentary.

7 0
3 years ago
Read 2 more answers
Julie is using the element of design.
-BARSIC- [3]

Answer:

Julie is using sand element of design

Explanation:

5 0
3 years ago
Other questions:
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • Write a program that prompts the user to input two numbers, a numerator and a divisor. Your program should then divide the numer
    5·2 answers
  • Assuming that the user enters 45 and 62 as inputs for n1 and n2, respectively, what is the output of the following code snippet?
    15·1 answer
  • Meg wants to preview all images in a folder so that she can quickly find the image she wants. Which view will help her do this?
    13·2 answers
  • A qualifier distinguishes the set of objects at the far end of the association based on the qualifier value.
    5·1 answer
  • Python: Bad input on line 8. What is the fix, please can someone tell me I’m desperate?
    10·1 answer
  • Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
    11·1 answer
  • Tres areas donde se aplica la ciencia y tecnologia
    15·1 answer
  • What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
    13·1 answer
  • true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!