1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
13

Plz answer in order so like the the nitrogen bacteria is-

Computers and Technology
2 answers:
Nastasia [14]3 years ago
6 0

Answer:

Nitrogen-fixing bacteria, microorganisms capable of transforming atmospheric nitrogen into fixed nitrogen.

Explanation: I hope this helps! (。^▽^)

Alex3 years ago
3 0
Decomposer bacteria – decomposes proteins and urea and turns them into ammonia.
Nitrifying bacteria – converts ammonia to nitrites then nitrates.
Nitrogen-fixing bacteria – turns atmospheric nitrogen into nitrogen compounds.
Denitrifying bacteria – turns nitrogen compounds back into nitrogen gas. No help to living organisms.
You might be interested in
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
What is the name of the computer through which e-mail messages are sent and received?
nalin [4]
A mail server. --------------------------------------------
8 0
3 years ago
Suppose a program takes 1000 machine instructions to run from start to end, and can do that in 10 microseconds when no page faul
Tema [17]

Answer:

(10^6 + 9.9)

Explanation:

Given:

Total number of machine instructions = 1000

Number of page fault in 100 instructions = 1

Number of page faults in 1000 instructions = 10

Time to serve one page fault = 100 milliseconds

Time to serve ten page faults = 100*10 milliseconds = 1000 milliseconds = 10^6 Microseconds

Number of instructions without any page fault = 1000 - 10 = 990

Time required to run 1000 instructions = 10 Microseconds

So, time required to run 990 instructions = (10*(990/1000)) Microseconds = 9.9 Microseconds

So, the total time required to run the program = (10^6 + 9.9) Microseconds

3 0
4 years ago
Assume the availability of a function called printStars. The function receives an int argument. If the argument is positive, the
uranmaximum [27]

Answer:

The python program is given with appropriate comments

Explanation:

#Implementation of printStars function

def printStars(n):

  #check if n is greater than 0

  if n>0:

      for i in range(n):

          print ('*', end="")

#Declare starCount and initialize some negative integer

starCount = -8

if starCount>0:

   print ('*', end="")

   printStars(starCount-1)

8 0
3 years ago
Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
meriva
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software. 

To avoid this and stay on the safe side, try the following:-

- Open it in protected view 
- Do not save the attachment on your computer 
- Look at the author and read the message carefully to make sure it is not biased. 
- Open it on a flash-drive </span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker’s
    12·2 answers
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • Consider the problem of finding the distance between the two closest numbers in an array of n numbers. (The distance between two
    13·1 answer
  • Help me please and thanks
    8·1 answer
  • A ____ is used to perform a forward-only (sequential) access of the data in the data source while a ____ is used to populate a d
    11·1 answer
  • How and why do engineers use models?
    15·1 answer
  • Which two of the following skills are important for a meteorologist
    12·1 answer
  • PLS HELP IMEDIATELY!!!!!
    15·2 answers
  • QUESTION 1
    15·1 answer
  • The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!