1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
8

What's the difference between natural systems and man made systems ​

Computers and Technology
1 answer:
Aneli [31]3 years ago
5 0

Answer:

Natural systems are already in place while man made systems were created by humans manipulating things in some way.

Explanation:

man made: human created

natural systems: existed without interference

You might be interested in
Describe how communication strengthens relationship at work and, as a result, increases your productivity
olganol [36]

Answer:

because it helps them understand their contributions and obligations towards the organisation.

Explanation:

In an organizational setup, the need for healthy and effective communication among employees and employers is a crucial element for the overall success of the organisation. Healthy and effective communication helps in the productivity of the employees because it helps them understand their contributions and obligations towards the organisation.

Good communication improves the employees' morality and sincerity as it helps them feel responsible and as an important member of the organisation. Hence, strengthening their relationships and, as a result, increasing their productivity and efficiency.

7 0
3 years ago
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
Harlamova29_29 [7]

Answer:

Explanation:

Hello friend !!!!!!!!!!!!

The answer is <u><em>school zone</em></u>

Hope this helps

plz mark as brainliest!!!!!!!

6 0
3 years ago
The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
Genrish500 [490]

Answer:

Backup copy

Explanation:

system restore point is called a backup or backup copy of the system, this point keeps the inicial setting or configuration on the software, we usually use this tool when we're having some issues with the software, usually during the installation process  of a new software, letting us to save the data and off course with this point created the user could revert the issues or fix the problems occuring in the configuration.

5 0
3 years ago
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
Alexeev081 [22]

Answer:

In Python:

cprice= int(input("Current price: "))

lmonth= int(input("Last month's price: "))

print("This house is $"+str(cprice))

print("The change is $"+str(cprice-lmonth)+" since last month")

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

Explanation:

Get current price

cprice= int(input("Current price: "))

Get last month's price

lmonth= int(input("Last month's price: "))

Print the current price

print("This house is $"+str(cprice))

Print the change

print("The change is $"+str(cprice-lmonth)+" since last month")

Print the mortgage

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

8 0
3 years ago
Average of Grades - Write a program that stores the following values in five different variables: 98, 87, 84, 100, 94. The progr
liubo4ka [24]

Answer:

Not sure what language, but in python a super basic version would be:

val1 = 98

val2 = 87

val3 = 84

val4 = 100

val5 = 94

sum = val1 + val2 + val3 + val4 + val5

avg = sum / 5

print(avg)

Explanation:

4 0
3 years ago
Other questions:
  • The Table Tools tab provides which two additional tabs?
    5·1 answer
  • You should use html elements instead of server controls when
    11·1 answer
  • The third wave of computing was characterized by the introduction of _____.
    10·1 answer
  • The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b
    5·1 answer
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • When a partition is formatted with a file system and assigned a drive letter it is called a volume?
    10·1 answer
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • I dont understand this at all! PLZ help me
    14·1 answer
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!