1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
14

According to the "Solar Technology" article, what happens once solar energy is in the form of electricity? 

Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
8 0
C. it can be used to power a home , office, or supply the electriacal grid.
Veronika [31]3 years ago
6 0

Answer:

The correct answer is letter "C": It can be used to power a home, office, or supply the electrical.

Explanation:

One the sunlight reaches solar panels, it provokes electrons to leave from their atoms. The loosen electrons flow through the panel cells generating electricity. This electricity is used for diverse purposes such as<em> street and home lighting</em>, and in some other cases, companies have started to accumulate the sun's energy for <em>industrial matters</em>.

You might be interested in
Write a program to Test if mold is stored in the variable word.
Aloiza [94]

word = whatever value you want.

if "mold" in word:

   print("Mold is in the variable word.")

else:

   print("Mold is not in the variable word.")

7 0
3 years ago
Computers help eliminate that repetitive of manual task. How can this benefit you in in your overall career
andrezito [222]

Continuing advances in technology and automation will be eliminating repetitive work in the offices of the future.

Computer technology has had a tremendous impact upon workers. In some instances, the introduction of computers has improved member working conditions, but, in others, new technology has produced several detrimental effects.

Explanation:

  • One of the key trends to emerge was that automation, smart machines and artificial intelligence will conduct repetitive work, replacing the need for people to complete these tasks.
  • Instead of worrying about job losses, executives should be helping to reduce jobs in which AI and machine learning take over boring tasks, while humans spend more time with higher-level tasks.

Here are three ways eliminating repetitive work can boost productivity:

  1. <u> Reduce Dependency on Email and Spreadsheets  :</u> Automation tools such as mobile applications, customized portals and project management tools eliminate the time spent checking and responding to emails and updating spreadsheets to reflect work progress. With automated tools, managers and their teams can post progress or project information on an integrated mobile app.
  2.  <u>Reduce Mistakes and Injuries  </u>: The possibility of human errors, which take more time to correct, is virtually eliminated when tasks are automated. Leaving the monotonous tasks to machines reduces the chance of injuries and allows workers to keep working on more strategic tasks.
  3. <u> Free Employees Time for High-Level Skills</u>  :  Many of the employees who spend their time undertaking repetitive tasks could actually be better utilized on more complex tasks.

There are a variety of illnesses that may be caused by repetitive computer work :

  • Tendonitis : pain and swelling of tendons at the junction between the tendon and its muscle;
  • Epicondylitis: pain and swelling where the tendons and bone join around the elbow joint, etc
3 0
3 years ago
Read 2 more answers
______was developed as an interim management protocol with OSI as the ultimate network management protocol.
RSB [31]

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

4 0
4 years ago
Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Nadusha1986 [10]

<u>Question:</u>

Snapshot of the question has been attached to this response.

<u>Answer:</u>

<u></u>

import java.util.Scanner;

import java.lang.Math;

public class CoordinateGeometry{

    public static void main(String []args){

       double x1 = 1.0;

       double y1 = 2.0;

       double x2 = 1.0;

       double y2 = 5.0;

       double pointsDistance = 0.0;

       

       //Declare a variable to hold the result of (x2 - x1)²

       double x;

       

       //Solve (x2 - x1)^2 and store result in the variable x

       x = Math.pow(x2 - x1, 2);

       

       //Declare a variable to hold the result of (y2 - y1)²

       double y;

       

       //Solve (y2 - y1)^2 and store result in the variable y

       y = Math.pow(y2 - y1, 2);

       

       //Now pointsDistance = SquareRootOf(x + y)

       pointsDistance = Math.sqrt(x + y);

       

       System.out.println("Points distance: ");

       System.out.println(pointsDistance);

       

       return;

    }

}

<u>Sample Output:</u>

Points distance:  

3.0

<u>Explanation:</u>

The above code has been written in Java and it contains comments explaining important lines of the code. Please go through the comments.

The snapshots of the program and a sample output have been attached to this response.

4 0
4 years ago
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
Other questions:
  • Standards for all managers ethical responsibilities are covered in a company's
    7·2 answers
  • ________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwant
    7·1 answer
  • A (n) _____________ chart is represented by a circle divided into portions.
    8·1 answer
  • In the Mouse Properties window, you can?
    8·1 answer
  • Who is Mr.Anonymous?
    5·2 answers
  • Why do we use antivirus program?<br><br>please tell fast​
    12·1 answer
  • Given the following code, assume the myStack object is a stack that can hold integers and that value is an int variable. Assume
    8·1 answer
  • I hack3d into my schools computer system to unblock everything but now I am scared that I am going to get caught so I want to de
    13·2 answers
  • What is the general term for programs used to operate a computer
    15·1 answer
  • Which statement best describes one reason why assembly language is easier
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!