1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
10

What techniques are involved in green computing?

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
8 0

Answer:  Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.

You might be interested in
The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a
irakobra [83]

Answer:

The complete function is as follows:

def get_nth_int_from_CSV(CSV_string, index):

   splitstring = CSV_string.split(",")

   print(int(splitstring[index]))

Explanation:

This defines the function

def get_nth_int_from_CSV(CSV_string, index):

This splits the string by comma (,)

   splitstring = CSV_string.split(",")

This gets the string at the index position, converts it to an integer and print the converted integer

   print(int(splitstring[index]))

3 0
3 years ago
What is pseudo code?
Aleksandr [31]

Answer:

a notation resembling a simplified programming language, used in program design.

Explanation:

8 0
3 years ago
Read 2 more answers
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
Galina-37 [17]

Answer:

D) Hybrid Attack

Explanation:

This type of  attack is a blend of both a dictionary and brute force attack. The meaning of this is, while a dictionary attack method would capture a wordlist of passwords, the brute-force attack would be applied to each of  password captured.

6 0
3 years ago
Which term refers to the use of the internet at work for personal use?.
strojnjashka [21]

Which term refers to the use of the Internet at work for personal use? cyberloafing.Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work.

4 0
1 year ago
Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
motikmotik

Answer:

1. G=D+(A+C^2)*E/(D+B)^3

cobegin:

p1: (D+B)

p2: p1^3

p3: C^2

p4: A+ p3

p5: E/p2

p6: p4 * p5

p7: D + p6

   :G

coend

2. Now The value A=2, B=4, C=5, D=6, and E=8

p1: 6+4 =10

p2: p1 ^3= 10^3= 1000

p3: c^2= 5^2 =25

p4: A + p3= 2 +25 =27

p5: 8/1000

p6: 27 *8/1000

p7: D+ P6= 6+ 216/1000

      = 6216/1000

      =6.216

Explanation:

The above, first bracket with power is processed, and then power inside and outside bracket. And rest is according to BODMAS, and one process is solved at a time.

4 0
2 years ago
Other questions:
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • Algorithm for converting decimal into binary.
    7·1 answer
  • A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth
    15·2 answers
  • An ethernet switch has a ____ table which is updated by ______.
    14·1 answer
  • (1) Create three files to submit:
    8·1 answer
  • You're setting up some VMs to test an application you're considering making available to employees of the small company you work
    11·1 answer
  • Drag the correct type of update to its definition.
    13·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • Which factor is NOT used to determine who can be let go during a downsizing?
    8·2 answers
  • marion is an iot developer working for a large organization. why does his supervisor want him to stay informed about the network
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!