1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
10

You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore,

your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?
They must be sent to hazardous waste collection

a. They can be recharged.
b. They must be stored onsite until they expire
c. They can be thrown in the trash.
Computers and Technology
2 answers:
Pavel [41]3 years ago
5 0

A: They can be recharged.

baherus [9]3 years ago
5 0
They can be recharged.

It’s the most logical answer
You might be interested in
*Sometimes it is difficult to convince top management to commit funds to develop and implement a SIS why*
ziro4ka [17]

Step-by-step Explanation:

SIS stands for: The Student Information System (SIS).

This system (a secure, web-based accessible by students, parents and staff) supports all aspects of a student’s educational experience, and other information. Examples are academic programs, test grades, health information, scheduling, etc.

It is difficult to convince top management to commit funds to develop and implement SIS, this can be due to a thousand reasons.

The obvious is that the management don't see the need for it. They would rather have students go through the educational process the same way they did. Perhaps, they just don't trust the whole process, they feel more in-charge while using a manual process.

4 0
3 years ago
A simple CPM network has five activities, A, B, C, D, and E. A is an immediate predecessor of C and of D. B is also an immediate
Dmitrij [34]

Answer:

True

Explanation:

There are four paths in this network. A is an immediate predecessor of C and of D. B is also an immediate predecessor of C and of D. C and D are both immediate predecessors of E. Given the above scenario

4 0
3 years ago
Hi im new and would like you to answer​
soldier1979 [14.2K]

Answer:

Explanation:yes

7 0
4 years ago
How do I report a user? (https://brainly.com/profile/TheBrainHelper-20043487)
Veseljchak [2.6K]

Answer:

I don't think you can report someone but you always can report the question

7 0
4 years ago
Read 2 more answers
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Other questions:
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • "Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media
    12·1 answer
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • Chapter 12 Reading Question 19 The most distinguishing characteristic of geographical information systems is: Every record or di
    5·1 answer
  • How do I log into PGCPS?
    14·1 answer
  • What could have made you redesign your plan? Select 3 options.
    6·1 answer
  • Name the character encoding standard that enables up to 128 different commonly used characters,
    8·1 answer
  • Which excel feature makes it easy to copy and paste formulas in multiple cells?.
    7·1 answer
  • We're given the training set data with the following values for variable X1:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!