1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
3 years ago
10

1.) How do parks and other green spaces benefit a community?

Computers and Technology
1 answer:
vagabundo [1.1K]3 years ago
8 0
#1 is A and #2 is B, but I don't know about #3 and #4.
You might be interested in
Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
Arte-miy333 [17]
The answer is an Intruder Prevention System (IPS). An Intrusion Detection System (IDS) will detect an attack but will not block it.
3 0
3 years ago
Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
lesya [120]
<span>With jump-YES. SInce we know that the instruction format of the jump instruction is 6 bits opcode and 26-bit jump address we can sufficiently encode the given address in the 26-bit space.</span>
7 0
4 years ago
What is the limitation of computer<br>​
eimsori [14]

The limitation of computer are:

  1. No self-intelligence
  2. No feeling
  3. No learning power
  4. Dependency

3 0
3 years ago
Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track le
gladu [14]

Answer:

The answer is "Increased flexibility".

Explanation:

In the given question some information is missing that is the option of the question which can be described as follows:

A. Enhance scalability and efficiency

B. Enhance data security

C. Reducing data duplication

D. Increased flexibility

Flexibility is being used as an object for different types of applications. It is an engineering system which is that provides an easy way for all the scheme to respond to insecurity so, that its value is maintained or increased, It is also known as its key component, and certain option was incorrect, which can be described as follows:

  • In option A, It is wrong because it is used in business data.
  • In option B, It is wrong because it provides security.
  • In option C, It removes duplicate data that's why it is wrong.
3 0
3 years ago
What is added to brining liquid to add flavour​
Inga [223]

Answer:

Wet brining is a method of adding flavor to a meat by soaking it in a salt solution prior to cooking. A general rule of thumb is to soak the meat in a solution of 1 cup of salt for 1 gallon of water. When cooked, the salt will stay in the meat, adding flavor, and the liquid will be cooked out.

7 0
3 years ago
Other questions:
  • Given three dictionaries, associated with the variables, canadian_capitals, mexican_capitals, and us_capitals, that map province
    11·1 answer
  • There are three required elements needed to connect to the internet: internet service provider, hardware, and __________.
    13·1 answer
  • In a microsoft word document, what is the amount of space that appears between paragraphs called?
    14·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • Where does the Total row of an aggregate function display its results? First row in Datasheet view Only row in Datasheet view La
    10·1 answer
  • In a fully underwritten offering a firm sells 1 million shares of stock through a fully underwritten offering. Their banker char
    10·1 answer
  • Information in _____ code can be transmitted without errors over the communication network.
    13·2 answers
  • I really need help in this!!!
    11·1 answer
  • What the advantages and disadvantages of file sharing to the users​
    9·1 answer
  • If you want to create a line of code that will not appear in the interpreter, what symbol should begin the line?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!