1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
7

Examples of intermediate technology​

Computers and Technology
2 answers:
oksian1 [2.3K]3 years ago
5 0

Answer:

treadle pump which enables the farmer to provide a greater amount of water to their plants more easily competed to watering by bucket

Effectus [21]3 years ago
3 0

Example of intermediate technology is the treadle pump, which enables farmers to provide a greater amount of water to their plants more easily compared to watering by bucket, while requiring much less infrastructure than constructing irrigation dams and pipes.

You might be interested in
Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
Nadusha1986 [10]

Answer:

Algorithms need to be simple, factual, and explained in simple but relevant vocabulary, and must be step by step, and none of the step should be missing.

Hence, first you need to understand the requirement, which can be yours or your clients.

Then consider each module of the problem, and separate each of them from the others. Now, understand the relationship between each module. And then you need to understand how you can combine them in one algorithm.

Also remember, the modules are functions. and various functions combine together to form an algorithm. We can have separate algorithms for each module as well, and then you can combine them together in right continuity to form the one single program.

Also, a project can have a loads of programs with other parts like images and various other assets and technologies.

However, everything starts with algorithms. And if are good at explaining, and a sound vocabulary, plus can explain the process well, you can explain the process well, and write a good algorithm definitely. Learn languages like Python, C, and C++  to start with, and then continue with Java, R etc. Remember we still uses functional programming as well like through Haskell etc.

The below is an example of sample algorithm. John wants to check what Ana has brought for him.

Step 1: Ana arrives with meat, which can be of goat or chicken

Step 2: John: Hi Ana

Step3: Yes John

Step 4 What meat is that Ana

Step 5: Goat

Step 7: Thanks Ana for Bringng Goat Meat

Step 8: Stop

In the above algorithm John confirms that what meat Ana has brought for him. And he comes to know She has bought Goat meat. This is the simplest of algorithm with no loop. And the complexity can be increased to any level.

Explanation:

The Answer is self explanatory, and has all that is required.

7 0
3 years ago
Read 2 more answers
Moving Images are called________.
Troyanec [42]

Answer:

films

Explanation:

- Pictures, comic strips, and animations is wrong because they are static images.

- Films are known as "moving pictures" and therefore are moving images. That makes film your correct answer.

- Hope this helps! If you would like a further explanation please let me know.

6 0
3 years ago
If there was no technological advancement what would be our society like​
blondinia [14]

Answer:

WHAT SOCIETY?!

Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....

It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.

8 0
3 years ago
Active Directory and __________ are critical in centralizing control of authentication and security policies in a domain environ
vagabundo [1.1K]

Answer:

DNS(Domain Name Services) is the correct answer.

Explanation:

DNS is the type of directory system which is distributed that finds the solution of a hostname which is readable by the human being. It is also critical in centralizing control of the confirmation and policies of the security in the environment of the domain with Active Directory. That's why the following answer is correct.

4 0
3 years ago
Write a method max that has two string parameters and returns the larger of the two.
PtichkaEL [24]
Pls. see attachment. 


8 0
3 years ago
Other questions:
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • How many parameters go into the function sum, and how many return values come out of the function sum? function sum(first, secon
    6·1 answer
  • When an ethernet nic has been configured by os to use half-duplex, the transmit pair of the twisted-pair cable uses?
    8·1 answer
  • How is a correction made to an Electronic health record?
    14·1 answer
  • A sequence of one or more characters is called
    14·1 answer
  • You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.
    6·2 answers
  • You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules wi
    14·1 answer
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
  • What is problem scoping
    14·1 answer
  • Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!