1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
11

What environmental hazards exist because of man’s desire for profit?

Computers and Technology
2 answers:
Anastasy [175]3 years ago
5 0
Cutting down trees for paper
LiRa [457]3 years ago
4 0
Global warming because of need for fossil fuels.
You might be interested in
What are the advantages and disadvantages of the simulated link strategy?
amid [387]

Answer:

The advantage of the simulated link strategy are:

  • It is easily able to provide the practical feedback to the customers and users while designing the whole system. It also determine the efficiency and the correctness of the design in the stimulated link strategy.
  • In the stimulated link strategy, the sharing and delivering of the data and information is done efficiently without any occurrence of error and interrupt. It is also high flexible technique.

The disadvantage of the simulated link strategy are:

  •   The simulated link strategy is flexible but it is not standardization and also it required more good concept.
  •  This technique is expensive and it is not readily available as it always require validation process.

3 0
3 years ago
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
What is BINARY it is making get confused
enot [183]
It is a number that is expressed in the binary numerical system
6 0
3 years ago
comparing the cost of care provided to medicare beneficiaries assigned to primary care nurse practitioners and physicians
Aleks [24]

"Comparing the cost of care provided to Medicare beneficiaries assigned to primary care nurse practitioners and physicians" is a study that

<h3>What is the cost of Medicare according to the above study?</h3>

The study shows that after controlling for demographics, geography, comorbidities, and proclivity to visit an NP, Medicare evaluation and management payments for patients allocated to an NP were $207, or 29%, less than PCMD assigned beneficiaries.

The similar tendency was seen for inpatient and total office visit payment amounts, with NP-assigned beneficiaries receiving 11 and 18 percent less, respectively. The work component of relative value units yields similar results.

Learn more about Medicare:
brainly.com/question/1960701
#SPJ4

8 0
1 year ago
Inc AX,2 is valid in assembly language ?
masya89 [10]

Answer:

in most so yes

Explanation:

4 0
3 years ago
Other questions:
  • Your company is developing a new marketing campaign and wants to know which customers have never placed an order. You will need
    10·1 answer
  • At the dsl local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.
    10·1 answer
  • Which toolbar is located next to the office button and contain the commonly used commands​
    15·1 answer
  • When you identify the data elements in a new database, you typically subdivide data elements into?
    14·1 answer
  • Which of the following is a group of email names and addresses used for mass distribution of a message?
    5·1 answer
  • What kind of battery does a dji spark have?
    12·1 answer
  • Which type of financial institution typically has membership requirements?
    14·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • What is the most efficient<br> form of transportation we<br> have?
    13·2 answers
  • I WILL MARK BRAINLEST FOR THIS!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!