1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
9

Which of the following is an example of how science can solve social problems?

Computers and Technology
2 answers:
rodikova [14]3 years ago
5 0

Answer:

It can identify the sources of polluted water.

Explanation:

Minchanka [31]3 years ago
3 0

Answer:

It can identify the sources of polluted water.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.

An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.

In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.

You might be interested in
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
What is the purpose of an IP address? A. identifying source and destination of data B. creating images on websites C. drawing ta
natka813 [3]

Answer:

The Answer is A. I could be wrong though.

3 0
3 years ago
Read 2 more answers
Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
crimeas [40]

Answer:

Richness (Information Richness)

Explanation:

Information richness refers to the complexity of combining  video, audio and  make a marketing advert, the information generated is considered rich. other features or dimensions include; interactivity, information density, personalization etc

3 0
4 years ago
What are the functions of an input device​
marshall27 [118]

Answer:

To feed the computer with data/instructions

6 0
3 years ago
Read 2 more answers
What is thisssssssss please answer
True [87]

Answer:

first of all, are you a snake? And also that is a spotlight.

Explanation:

3 0
3 years ago
Other questions:
  • Anyone wanna join a supercar/hypercar enthusiast's club?
    10·1 answer
  • Ingrid started speaking about her slide presentation. When she clicked to th
    11·2 answers
  • What folder is used to store offline files and folders managed by the offline files utility?
    15·1 answer
  • In a series circuit, electrons only flow along one path. Given this information, which of the following is an advantage of serie
    15·2 answers
  • A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transf
    9·1 answer
  • Design a class FileArray that has a static method named writeArray. The method should take two arguments: the name of a file and
    11·1 answer
  • The component of a computer that provides the cpu with a working storage area for program instructions and data is called the __
    10·2 answers
  • Assume myString and yourString are variables of type String already declared and initialized. Write ONE line of code that sets y
    15·1 answer
  • Why do we create user accounts to customize our preferences​
    10·1 answer
  • What could be done to make sure that people follow copy right laws?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!