1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
4 years ago
10

What techniques are involved in green computing?

Computers and Technology
1 answer:
steposvetlana [31]4 years ago
8 0

Answer:  Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.

You might be interested in
Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
Inessa05 [86]

Answer:

False

Explanation:

Methods inherited from the base/super class can be overridden only if behvior is close enough. The overridding method should have same name, type and number of parameters and same return type.

6 0
3 years ago
The parallax perspective says that objects that are close up appear to move __________ than far away objects.
serious [3.7K]

Answer:

It appears to move faster.

5 0
3 years ago
Checking account A charges a monthly service fee of $2 and a per-check fee of $0.30, while checking account B charges a monthly
Temka [501]
The answer would be 10 checks
1.) set the equations equal to each other: 2x+.30=3x+.20
2.) subtract .20 : 2x +.10=3x 
3.) subtract 2x: .10= 1x
4.) divide by .10 and you get 10 

7 0
4 years ago
Read 2 more answers
A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
Mazyrski [523]
A program called an compiler
5 0
4 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • Which is missing in most areas that do not have Karst topography?
    10·2 answers
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • All wireless networks have their own name, referred to as the ________, which is used to identify the network.
    11·1 answer
  • Determine if x(t) is periodic and determine the fundamental period.
    15·1 answer
  • What is the best explanation for why digital data is represented in computers in binary?
    10·1 answer
  • Command-based operating systems include
    7·1 answer
  • Write a program that prompts the user to enter a password and displays "valid password"
    11·1 answer
  • As you explore career options why is it important to take personal inventories and assessments
    5·2 answers
  • Key
    6·1 answer
  • Consider the given choices and determine which one establishes a conceptual framework for network connectivity.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!