1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
4 years ago
10

What techniques are involved in green computing?

Computers and Technology
1 answer:
steposvetlana [31]4 years ago
8 0

Answer:  Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.

You might be interested in
Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the dat
Gala2k [10]

Answer:

"Integrity constraints " is the correct answer.

Explanation:

  • A successful DBMS offers integrity constraints, which have been an option that allows you to modify the database layout without modifying the applications accessing the repository.
  • A principle or requirement which the data in something like a database should therefore obey.

So that the above is the correct choice.

8 0
4 years ago
Witch is a game story device
natulia [17]
A PS4 because there the most popular game out right now
5 0
3 years ago
What’s bigger 4,000,000 KB or 2.8 GB
Zanzabum

Answer:2.8 GB is bigeer

8 0
4 years ago
Read 2 more answers
Write a definition in your own words for pixel. Do not copy and paste please.
lesya692 [45]

Answer:

Pixel is kind of like a drawing but made differnetly from other drawings that is my guess.

Explanation:

hope this helped

6 0
3 years ago
Read 2 more answers
What is the difference between basic auth and oauth.
ratelena [41]

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

4 0
2 years ago
Other questions:
  • Suppose an array with six rows and eight columns is stored in row major order starting at address 20 (base 10). If each entry in
    8·1 answer
  • The ____ loop stops when the loop has processed every element in an array.?
    7·1 answer
  • 1. Which of the following might be a problem taken on by environment engineers?
    8·1 answer
  • Public static void prefixmerge(customer[] list1, customer[] list2, customer[] result {
    6·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • The number of bytes in an array is always a multiple of the number of ____ in an array.
    6·1 answer
  • Which best describes the benefits of renting a home
    12·2 answers
  • E) Point out the errors( if any) and correct them:-
    14·1 answer
  • (03.04 MC) While working in a group, two members are not getting along. You ask each one what is happening, and they both say th
    7·2 answers
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!