1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
7

Examples of intermediate technology​

Computers and Technology
2 answers:
oksian1 [2.3K]3 years ago
5 0

Answer:

treadle pump which enables the farmer to provide a greater amount of water to their plants more easily competed to watering by bucket

Effectus [21]3 years ago
3 0

Example of intermediate technology is the treadle pump, which enables farmers to provide a greater amount of water to their plants more easily compared to watering by bucket, while requiring much less infrastructure than constructing irrigation dams and pipes.

You might be interested in
What tool is included with windows 8 that will help you connect to the directaccess server when you have problems and can be use
Elina [12.6K]
None that I know. Many third party apps.
4 0
4 years ago
A _______ acts as a security buffer between a corporation's private network and all external networks.
Contact [7]
The answer is a firewall. It is a system that will block potentially harmful software or websites from accessing your computer.
3 0
3 years ago
Please help! Answers that do not relate to this topic will be REPORTED!
zmey [24]

Answer:

answer for number A is

2. the ability to be  either relative or absolute

B. 2 bytes

C. in a buffer

Explanation:

6 0
3 years ago
7.2 code practice edhesive. I need help!!
GaryK [48]

Answer:

It already looks right so I don't know why it's not working but try it this way?

Explanation:

def ilovepython():

    for i in range(1, 4):

         print("I love Python")

ilovepython()

6 0
3 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Other questions:
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    13·2 answers
  • Which of the following Office Online apps is most effective for creating spreadsheets?
    14·2 answers
  • "Memory refers to: A.the brain processes involved in the encoding, storage, and retrieval of information. B.the mechanisms drivi
    9·1 answer
  • What will you personally do to make your peers aware of the seriousness Of teen crashes?
    9·1 answer
  • Write a function that receives an integer (n) argument and then computes the following based on the value of the integer: While
    13·1 answer
  • Answer the following questions based on your readings from Module 1. Describe a time when you or someone you observed showed a p
    9·1 answer
  • I will mark Brainliest if you sub to Huggablesheep 89 he said he is going to quit if he gets 50 subs he might try again please h
    8·2 answers
  • .
    5·1 answer
  • Zoom and Adobe Acrobat Reader are freeware programs. What does this
    7·1 answer
  • You recently created a new network segment for the development department. Because the hosts are now on a different network segm
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!