1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
15

In attempts to improve their contribution to the environment, a company decided to adapt to green computing. Which of these tech

niques will contribute to green computing? Select all that apply.
Virtualization, Grid computing, Recycling, Or Autonomic Computing.
Computers and Technology
1 answer:
timama [110]3 years ago
8 0

Answer:

All of them apply

Explanation:

Green computing is the process of using environmental friendly computers and its associated components, accessories and other supporting devices.

Virtualization helps us to reduce the number of hardware that we are using.

Grid computers helps us to reduce the use of number of machines and thus supporting the environment in a right way.

Recycling process. Any material that we use needs to be recycled effectively and also in an environmental friendly way.

Autonomic computing uses eco-friendly system which in turn hugely support green computing.

You might be interested in
The equivalent of the TTL field in an ipv4 header is known as the ___an IPv6 header
OLga [1]
<span>The equivalent of the TTL(Time to Live) field in an IPv4 header is known as the Hop Limit in an IPv6 header.
</span>The IPv6 header is a streamlined version of the IPv4 header. The field Hop Limit has the size of 8 bits and indicates the maximum number of links over which the IPv6 packet can travel before being discarded.
7 0
3 years ago
write a C program that declares an integer variable called "favorite_number". The program should then prompt the user to enter t
Arturiano [62]

Answer:

// here is code in C.

// headers

#include <stdio.h>

// main function

int main(void) {

// variable declaration

int favorite_number;

 // ask user to enter favorite number

printf("enter your favorite number : ");

 // read the number

scanf("%d",&favorite_number);

 // print the message

printf("your favorite number is: %d",favorite_number);

return 0;

}

Explanation:

Declare a variable "favorite_number" of integer type.Ask user to enter favorite number and assign it to favorite_number.Then print the message which include the favorite number.

Output:

enter your favorite number : 77

your favorite number is: 77

4 0
4 years ago
After you select your recipients, the next step in using the Mail Merge Wizard would be to _____.
NARA [144]

Answer:

Write your letter

Explanation:

When using a Mail Merge Wizard in a Microsoft Word Document, this is the process.

  • Click on your document type
  • Click on the starting document
  • Select the recipient(s)
  • Write your letter and add some custom fields
  • Insert your address Block
  • Strike enter and click on Greeting line (to enter a greeting)
  • Preview your letter and click on complete merge
3 0
3 years ago
Read 2 more answers
List the five ethical rules that you feel are most important for one to follow when using the internet.
seropon [69]
1. Be smart
2. Do not tell anyone your personal info
3. Use reliable resources while looking up things (org,net,ect. no .coms)
4. ask your parents or guardian if you can go on a specific website And number 5 have fun!
7 0
3 years ago
The MLA style requires that the works cited be listed in alphabetical order by the author’s last name or, if the work has no aut
svlad2 [7]

Answer:

Answer to the following question is True.

Explanation:

The following statement is True because the Modern Language Association style is the particular type of format that is standard for essays or that papers which is for the research or writing other types of projects or papers in an academic setting. That's why It required for the cited works that should be in the alphabetic manner.

5 0
4 years ago
Other questions:
  • The range A2:B4 has how many cells?<br><br> Answers:<br> 2,4,6,8
    10·2 answers
  • What is required to control access to the file system using file and folder permissions on a windows based computer?
    8·1 answer
  • Read the scenario below. Explain why this is not fair use of copyright materials. What should you do instead of using the entire
    10·1 answer
  • How does a hard drive work
    15·1 answer
  • An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this
    14·2 answers
  • Which of the following are part of personal growth? Check all of the boxes that apply.
    8·2 answers
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • What is the age group for the silent genration
    10·1 answer
  • If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
    15·1 answer
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!