1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
5

What are some examples for Environmental Technology?

Computers and Technology
2 answers:
sergejj [24]3 years ago
8 0

The examples: Renewable energy, Water purification, Air purification, Environmental remediation, Energy conservation, Solid waste management and etc.

Hope this helped :D

hammer [34]3 years ago
8 0
Windmills
And
Solar Panels
You might be interested in
"In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number."
natita [175]

Answer:

ASCII is the correct answer for the above question.

Explanation:

  • ASCII is used to encode any character which is understood and used by the computer system.
  • It is also known as the American standard code for information interchange. It is used to represent any character in the form of 7 bit-binary number which can be used for the computer system.
  • It is designed for computers. It is in the binary language because the computer can understand only binary language.
  • The above question asked about the file which holds the special character and presented in the form of binary. This file is known as the ASCII file which is described above.
4 0
3 years ago
Suzanne has inserted an image into her document and would like to adjust the color and contrast of the image.
ch4aika [34]

Answer: I believe it is the second one or third one

Explanation:

8 0
4 years ago
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
What is the primary difference between universal groups and global groups in windows server 2012 r2?
zzz [600]

The primary difference between universal groups and global groups in windows server 2012 R2 is that Global groups utilize fewer data in the global catalog. So, in considering replication traffic, universal groups should be within a site. The set of all objects in an Active Directory Domain Services (AD DS) forest is called the global catalog. 

5 0
4 years ago
Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price,
poizon [28]

Answer:

current_price = int(input("Enter the current price: "))

last_months_price = int(input("Enter the last month's price: "))

print("Current price is: " + str(current_price) + ", Last month's price was: " + str(last_months_price))

print("The change since last month is: " + str(current_price - last_months_price))

print("The estimated monthly mortgage is: " + str(current_price * 0.051))

Explanation:

Get the inputs for the current price and last month's price

Print the prices

Calculate and print the change, current_price - last_months_price, since last month

Calculate, using given formula, and print the estimated monthly mortgage

6 0
4 years ago
Other questions:
  • You are tasked with setting up an employee’s computer.Instead of a new computer,she will be using a computer with an older opera
    11·2 answers
  • What are the advantages of renting a home over buying a home? What are some disadvantages?
    13·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • What is a good technological design?
    13·1 answer
  • Why won’t my Nintendo Switch connect to the internet?
    7·1 answer
  • Access control lists (ACLs) are used to permit and deny traffic in an IP router.
    14·1 answer
  • What does "scanf(\"%d\" mean?
    13·2 answers
  • 1) If a robot has a 3 bit instruction set and needs 20 instructions to reach its destination, how many bits of memory are requir
    5·1 answer
  • Mary wants to design an algorithm that will calculate the average for three (3) numbers. Please select the most appropriate data
    5·1 answer
  • ___________________ describes the process of combining voice, video, and data communications over a common network infrastructur
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!