1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
14

3 alternativas donde puedas utilizar la tecnologia que nos ayude a reducir el impacto ambiental al medio ambiente

Computers and Technology
1 answer:
bagirrra123 [75]3 years ago
7 0

Answer:

El correo, las notas y las agendas ahora están archivados en el mundo digital, ayudando a reducir la deforestación. Coches eléctricos: se está trabajando meticulosamente en reducir la contaminación que producen los vehículos, haciendo que cada vez sean más sostenibles.

Explanation:

You might be interested in
A ________ is a single media file including art, sound, animation, or movies.
Ksenya-84 [330]
AVI is a type of media file.
4 0
3 years ago
An iterative algorithm uses a loop to solve the problem, while a recursive algorithm uses a method that calls itself. (true, fal
loris [4]

Answer:

True.

Explanation:

An iterative method uses a loop to solve the problem either it can be for,while or do-while loop.Iterative methods are easy to implement than recursive problem.

While recursion uses the same method to call itself.Recursive methods are not easy to implement as compared to iterative method.It contains following things:

  1. base case.
  2. Some calculation.
  3. Recursive call.
6 0
3 years ago
What is your favorite photograph in the presentation? Why?
topjm [15]

Answer:

is there a presentation in your lesson maybe?

Explanation:

6 0
3 years ago
Electronic business includes which of the following
Alja [10]

Answer:

D. all of these

Explanation:

5 0
3 years ago
Read 2 more answers
Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
marysya [2.9K]

Answer:

The customer's browser has been hijacked by some attackers may be.

Explanation:

According to customer's explanation there is  possibility that that his data may be stolen and he has to disconnect computer from network and then call given number in order to get back his data.

5 0
4 years ago
Other questions:
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    10·1 answer
  • Web maintenance plays a vital role in a website's development. It helps ensure the online presence of any website by performing
    8·1 answer
  • 1841 William Henry ____________ patents the Calotype process, exposing wet (instead of dry) paper for a much shorter amount of t
    14·1 answer
  • When naming a file to upload into an assignment in blackboard, it is okay to use special characters?
    13·1 answer
  • What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary se
    13·1 answer
  • 1) APPLICATION BASED QUESTION:-
    5·1 answer
  • If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel
    14·1 answer
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
  • Explain briefly how learning how to follow can make a person a good leader
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!