1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
4 years ago
10

What techniques are involved in green computing?

Computers and Technology
1 answer:
steposvetlana [31]4 years ago
8 0

Answer:  Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.

You might be interested in
What is the reason that a modern electron microscope (TEM) can resolve biological images to the subnanometer level, as opposed t
zhannawk [14.2K]

Answer:

The correct answer to the following question will be "The wavelengths of the electron beams are also much shorter or less than illumination and visible light".

Explanation:

TEM seems to be a methodology of microscopy during which a pulse of electrons is transferred to create the effect through some kind of microscope, could approach biological objects at the sub-nanometer standard, as related to hundreds of nano-meters for either the absolute best microscope with super-resolution.

Also because of the electron beam's distances, they are still much shorter or smaller than daylight and infrared light, meaning that biological objects and artifacts can be resolved.

6 0
3 years ago
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
Nikolay [14]

If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill.

<h3>What is telnet used for?</h3>

Telnet is known to be a kind of a network protocol that is said to be used to virtually look into a computer and to give a two-way, working hand in hand and text-based communication channel that exist between two machines.

Note that, If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill because it does not apply in any way.

Learn more about telnet from

brainly.com/question/23640188

#SPJ1

4 0
2 years ago
What is the best way to catch a particular sporting moment?
pochemuha

Answer:

Know the sport really well so you can anticipate the moment when something exciting might happen. - c

3 0
3 years ago
Read 2 more answers
a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a
solong [7]

Answer:

where are the step number. I can't find any

6 0
3 years ago
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    15·2 answers
  • A study guide can be created
    6·2 answers
  • What is infinite recursion?
    7·1 answer
  • Which is a form of cyber bullying??
    9·1 answer
  • Worth 30 pts
    9·2 answers
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • Supervisor: You will need to consolidate your trouble tickets
    10·1 answer
  • Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet
    10·1 answer
  • The _____ feature enables you to represent text as colorful visuals.
    15·1 answer
  • Two types of storage memory​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!