1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
10

You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore,

your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?
They must be sent to hazardous waste collection

a. They can be recharged.
b. They must be stored onsite until they expire
c. They can be thrown in the trash.
Computers and Technology
2 answers:
Pavel [41]3 years ago
5 0

A: They can be recharged.

baherus [9]3 years ago
5 0
They can be recharged.

It’s the most logical answer
You might be interested in
25 points
Mnenie [13.5K]

A code of ethics and professional conduct outlines the ethical principles that govern decisions and behavior at a company or organization. They give general outlines of how employees should behave, as well as specific guidance for handling issues like harassment, safety, and conflicts of interest.

5 0
3 years ago
Read 2 more answers
What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
mariarad [96]

Solution:

The five Layers in Internet protocol stack are:

1.Application Layer  

2.Transport Layer  

3.Network Layer  

4.Link Layer  

5.Physical Layer  

The principal responsibilities of these layers are as follows:

1.Application Layer •Applications with appropriate requirement for user.  

•It is reserved for network applications and their application protocols such as HTTP, SMTP, and FTP etc.  

•Its protocol uses transport layer protocols for establishing host-to-host connection.  

2.Transport Layer  

•It is responsible for End-to-Communication  

•Transport layer transports messages from application layer between client and server of application  

•It uses two protocol for transporting messages: TCP and UDP.TCP provides reliable connection oriented services, while UDP provides connectionless service  

3.Network Layer  

•Network Layer moves packets from one host to destination.

•It has two principal component:IP protocol:-It defines the datagrams and decide how the end system and router will work Routing protocols: these protocols decide the routing path between source and destination. 4.Link Layer  

•It is responsible for link-level communication  

•Link layer receives the data gram from network layer at each node and delivers it to next node, the next node passes the datagram to network layer.so This layer moves entire frames from one network element to adjacent one.

•The service provided by link layer is protocol dependent

5.Physical Layer  

•It provides Physical media

•At each node, it moves individual bits of frames to next node.  


7 0
3 years ago
Your license can be canceled if you __________
Elena L [17]
Its B i think hope this helps ! 
8 0
3 years ago
Read 2 more answers
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Place the optical discs in the increasing order of storage capacity.<br><br> UDO<br> CD<br> DVD
romanna [79]
<h2>Hello!</h2>

The answer is:

  1. CD
  2. DVD
  3. UDO
<h2>Why?</h2>

Optical disks are circular disks used as storage for binary data usually made of polycarbonate. The data is stored in the disc using a laser machine and accessed using a laser diode illuminating the data path in an optical disc drive.

CD: Compact Discs are the most basic optical disk used today, with only a capacity that goes from 0.7 GB (700 MB) to 0.84 GB (840 MB).

DVD: Digital Versatile Discs increase the storage up to 6 times compared with a CD, the capacity of DVDs optical disks goes from 4.7 GB (4700 MB) to about 17 GB(17000 MB).

UDO: Ultra Density Optical have high capacity storage that goes from 30 GB (30000 MB) to about 60 GB (6000 MB).

Have a nice day!

4 0
3 years ago
Other questions:
  • Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf
    15·1 answer
  • When a relationship is established between two or more arrays by using the same subscript to relate entries between the arrays,
    14·2 answers
  • Explain why, with fast moving mobiles, speed is more dominant in characterizing the use mobility pattern than direction?
    8·1 answer
  • Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks-&gt;
    10·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • What makes these Pokémon special?
    9·2 answers
  • What happens if none of the selector values match selector in a simple case expression in pl/sql
    6·1 answer
  • This is your code.
    9·1 answer
  • Read-only memory chips are used to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!