1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
12

Recycling one glass jar saves enough energy to watch television for 3 hours

Computers and Technology
2 answers:
vaieri [72.5K]3 years ago
7 0

Answer:

Cool

Explanation:

Thanks for the info

zaharov [31]3 years ago
7 0
Wait what jajaja this is kinda confusing
You might be interested in
Convert 12 bits to bytes​
Genrish500 [490]

Answer:

1.5 bytes

Explanation:

I byte = 8 bit ....

3 0
2 years ago
Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
Wewaii [24]

Answer:

Continue

Explanation:

8 0
2 years ago
Read 2 more answers
The inability of BAE Automated Systems to create an automated baggage handling system led to a significant delay in the opening
Sergeu [11.5K]

Answer:

True

Explanation:

Airport was truly opened outside the city of Denver, because of the faults in BAE automated system.

6 0
3 years ago
WHAT ARE THE RISK OF DUST​
Step2247 [10]

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out

3 0
3 years ago
Which word best completes the comparison of Beowulf and Grendel?
Hatshy [7]

Answer:

sympathetic

Explanation:

If you will have a go at Beowulf, you will find that Grendel is a dangerous demon for whom humanity means nothing, and people for him are just like something that is to be eaten. However, when you will have a go at Grendel, you will find that he is not just a beast without the brain, as he does have affection and conception.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t
    14·1 answer
  • Select the correct answer.
    9·1 answer
  • Ng/ Computer Applications - Office 2016 - EL3520 A
    13·1 answer
  • True or False? In a C++ floating-point constant, a decimal point is not required if exponential (E) notation is used
    13·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • What does it mean to search an index or the web? (DONT TAKE ANSWERS FROM THE INTERNET!)
    9·2 answers
  • Which of the following is the best definition of a workplace policy?
    13·1 answer
  • What is the full form of icimod?
    6·1 answer
  • How do you fix this!!!!
    5·1 answer
  • A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!