1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
3 years ago
14

Explain the relationship between society and the technologies of using Earth's resources?

Computers and Technology
1 answer:
julsineya [31]3 years ago
5 0
Earth is natural and technology has a thing that can make u sick
You might be interested in
Create a dictionary that maps a fruit name to its color. Both the keys and the values should be stored as strings. Include only
UkoKoshka [18]

Answer:

Written in Python:

fruit_dictionary = {}

fruit_dictionary = {'apple': 'red', 'orange': 'orange', 'banana': 'yellow'}

Explanation:

First (although, not necessary), we create an empty dictionary named fruit_dictionary on line 1

Next, we populate the dictionary using the following syntax:

{key-1:value-1, key-2:value-2,......,key-n:value-n}

In this case, the entry would be:

{'apple': 'red',

'orange': 'orange',

'banana': 'yellow'}

The items on the first column (i.e. apple, orange and banana) are the keys while the items on the second (i.e. red, orange and yellow) are the values of the dictionary

To print the items in the dictionary, you can add  the following line of code:

<em>print(fruit_dictionary.items()) </em>

6 0
3 years ago
A(n) _____ is money paid for work.<br><br> A. raise <br> B. allowance<br> C. wage<br> D. grant
Andreas93 [3]

Answer:

wage

Explanation:

3 0
3 years ago
Read 2 more answers
What is the full from of CPU?​
scZoUnD [109]

Answer:

CPU is known as <u>Central</u><u> </u><u>Processing</u><u> </u><u>Unit</u><u>.</u>

8 0
3 years ago
Read 2 more answers
If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
Juliette [100K]

Answer:

Nancy's private key

Explanation:

She's receiving it.  That means Matthew used her public key to encrypt it.  She should decrypt it using her private key.  Watch this video for clarification :)

Watch The Internet: Encryption & Public Keys on the big video site which cannot be named on brainly :p

7 0
3 years ago
RDBMS stands for_________________
Aliun [14]
The term "RDBMS" stands for <span>relational database management system. 

I hope this helped! :)</span>
4 0
4 years ago
Other questions:
  • Sarah is entering weekly sales data for week 37 of the current year; however, when she moves down to thecells where she needs to
    8·2 answers
  • _________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
    9·1 answer
  • If you buy a 20 dollar thing with a 25 dollar gift card, do you still have 5 dollars?
    7·2 answers
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • 2.13) A simple rule to estimate your ideal body weight is to allow 110 pounds for the first 5 feet of height and 5 pounds for ea
    15·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • What will the following code display?
    12·1 answer
  • A financially stable person is able to:
    8·1 answer
  • 2 differences between system and applications software​
    9·2 answers
  • When working in outline mode, press __________ and click the eye icon to change only one layer back to preview mode.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!