The effectiveness of using thicker bags are:
- It has the lowest environmental impact in terms of any other disposable bag.
- It can be used three to six more times.
- It is environmentally sustainable.
<h3>What is the effect of thicker plastic bags have on the environment?</h3>
The use of plastic bags is known to have some form of detrimental effects on the such as animal choking, pollution, and others.
Conclusively, Note that thicker bags needs a lot of plastic to be able to produce it and it goes to waste even if a person do not use it again.
Learn more about environment from
brainly.com/question/17413226
Answer:
Required memory size is 16k x 8
16k = 24 x 210 = 214
Hence, No. of address lines = 14
No. of data lines = 8
a) Size of IC 1024 x 1
Total number of ICs required = 16k x 8 / 1024 x 1 = 16 x 8 = 128
b) Size of IC 2k x 4
Total number of ICs required = 16k x 8 / 2k x 4 = 8 x 2 = 16
c) Size of IC 1k x 8
Total number of ICs required = 16k x 8 / 1k x 8 = 16 x 1 = 16
Explanation:
For a, 10 address lines from A0 to A9 are used to select any one of the memory location out of 1024 memory locations present in a IC.
For b, 11 address lines from A0 to A10 are used to select any one of the memory location out of 2k=2048 memory locations present in a IC.
For c, 10 address lines from A0 to A9 are used to select any one of the memory location out of 1k=1024 memory locations present in a IC.
Answer:
C. Post-incident activity.
Explanation:
An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.
An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.
The LDAP protocol is used to access directory listings within active directory or other directory services.
LDAP stands for Lightweight Directory Access Protocol. The function of this protocol is to enale access to an existing direcory. LDAP is based on a client-server model.
<u>Full question:</u>
Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone.
Which command can you use to do this?
• w32tm /tz
• w32tm /monitor
• w32tm /register
• w32tm /query /status
<u>Answer:</u>
w32tm /tz
command can you use to do this
<u>Explanation:</u>
W32tm.exe is the approved command-line mechanism for configuring, monitoring, or troubleshooting the Windows Time service. This mechanism is a portion of the default connection between Windows and Windows Server. One can use W32tm.exe to configure Windows Time service settings and to diagnose time setting obstacles.
The syntax is W32tm </parameter> </param2>. w32tm /tz will represent contemporary time zone settings. The Windows Time service is not a full-featured NTP clarification that convenes time-sensitive reinforcement requirements, and it is not verified by Microsoft as such.