1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
6

Cutting of trees is bad or not bad​

Computers and Technology
2 answers:
olga_2 [115]3 years ago
7 0
It is bad cutting tree :(
makvit [3.9K]3 years ago
7 0

Answer:

bad

Explanation:

it gives out air and oxygen

You might be interested in
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
3 years ago
What command is used to request the name and address information from a dns server?
topjm [15]
Nslookup is deprecated in favor of dig
7 0
4 years ago
Ten(10) examples of wearables or wearable technologies?​
Semmy [17]

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

7 0
3 years ago
4.15 LAB: Password modifier
Black_prince [1.1K]

I've included my code in the picture below. Best of luck.

3 0
3 years ago
Consider the method total below.
evablogger [386]
That code, if it even compiles, won't produce those values with that call.
5 0
3 years ago
Read 2 more answers
Other questions:
  • To remove any hidden days from your document before sharing it, what should you do?
    7·1 answer
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • Decisions 1 and 3 are both ____________ decisions because ____________________.
    9·1 answer
  • Plz help me! No guessing plz!
    13·1 answer
  • QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
    14·1 answer
  • Assume that there is a class called BankAccountHolder that represents an individual member of a bank. There is also a BankAccoun
    5·2 answers
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • Write a program that prompts the user to enter a password and displays "valid password"
    11·1 answer
  • How do cybercriminals use JavaScript maliciously?
    11·1 answer
  • Renée’s job entails using a company laptop to constantly open other peoples’ workbooks, sorting the data, importing a new sheet
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!