1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
5

Which examples are credible sources that could be used for an essay on the environment? Check all that apply.

Computers and Technology
2 answers:
Lostsunrise [7]3 years ago
8 0

Answer:

a website for a federal environmental agency

a website run by a non-profit organization

a paper on the environment by a university professor

Explanation:

These are all credible sources.

Delicious77 [7]3 years ago
4 0

Answer:

A website for a federal environmental agency.

A website run by a non-profit organization.

A paper on the environment by a university professor.

You might be interested in
Discuss any five focus areas<br> for Green Computing you can concentrate on
BaLLatris [955]

Answer:

Five focus areas for Green Computing are:

  1. Environmental conditions
  2. Information technology (IT) systems
  3. Cooling systems
  4. Electrical systems
  5. Air management systems

Explanation:  

Green computing refers to the art of managing very effectively information technology such that the current level of productivity is maintained or exceeded.

Many of the factors listed above are more typical to data centers.

Data centers are IT systems that consume lots of electricity whilst generating lots of heat.

Sustained over a long period of time, the heat generated will contribute to green-house gases as the cooling system that is required to keep the data houses cool are big.

Hence, the green computing protocol requires where possible, minimal electricity be expended in cooling the data warehouses.

Another suggestion that has been given is for systems and appliances to be shut down when not in use rather than being left on or on standby.

Cheers

8 0
3 years ago
What term best describes the way the dns name space is organized?
Andreyy89
The answer would be hierarchical
 <span />
6 0
3 years ago
The MAC address is a _____ bit number.
Charra [1.4K]

Answer:

48.

Explanation:

MAC addresses are 48 bits or 6 bytes or 12 digit hexadecimal numbers.There are three formats of writing the MAC address which are as following:-

MM-MM-MM-SS-SS-SS

MMM.MMM.SSS.SSS

MM:MM:MM:SS:SS:SS

MAC address also called the physical address is a binary number which is used to  uniquely identify the computer network adapters.MAC address is assigned to the system at the time of manufacturing.

6 0
4 years ago
Read 2 more answers
If you could represent yourself with one object from your home what would it be ?
user100 [1]

Answer:

cross

bc im religous and stuff (0_0)

8 0
3 years ago
Read 2 more answers
Suppose you create a class Square to be a subclass of GeometricObject. Analyze the following code:
Lemur [1.5K]

Answer:

B. The program has a compile error because you attempted to invoke the GeometricObject class's constructor illegally.

Explanation:

To call a superclass constructor, the user must use super(). This is necessary unless default constructors are used. Also, it is vital to make sure if their are appropriate argument to be used while invoking the superclass constructor.

3 0
4 years ago
Other questions:
  • Write about the future of Reliability and Security in Software Engineering.
    13·1 answer
  • How does a hard drive work?
    5·1 answer
  • Pros and cons of the inter's<br> ability to access information
    15·1 answer
  • Wow, in this century, technology have been the most valuable. What is the worst of using the hi-tech phones
    13·2 answers
  • To find out where a particular command is taken from, you can use the _____________ command.
    14·1 answer
  • Create a program that receives the age of a user and determine whether he/she can vote or not. Assume the voting age to be 20. C
    14·1 answer
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • Three positive impacts of computer technology in our society.​
    7·2 answers
  • Why do relational databases use primary keys and foreign keys?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!