1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
14

What steps should be taken to dispose of and recycle plastic?

Computers and Technology
1 answer:
WARRIOR [948]3 years ago
3 0
Step 1: Collection. The first step in the recycling process is always collecting the plastic material that is to be recycled. ...
Step 2: Sorting. ...
Step 3: Washing. ...
Step 4: Resizing. ...
Step 5: Identification and separation of plastics. ...
Step 6: Compounding.
You might be interested in
What natural resources fueled industrialization in the united states?
hichkok12 [17]

Natural Resources that fueled American Industrialization

 

<span>1. Iron ore: Used to create steel and pig iron.  Used for railroad ties, bridges, buildings.</span>

 

2. Coal: with the invention of the steam engine, coal replaced wood in fueling the steam engine and machinery used in various industries such as the steel industry.

 

<span>3. Oil: The ability to use a steam engine for oil drilling started an oil boom in the United States.  It helped with the creation of a Petroleum-refining industry.  Transformed oil into Kerosene and later gasoline for the automobile</span>

 

Lumber: Used to fuel the steam engines that were used on trains, steamboats, and in industry for the new machines being invented that ran on steam.

<span> </span>

5 0
4 years ago
Please sign this!! https://www.change.org/ban-charli-damelio
pav-90 [236]

Answer:

Idc

Explanation:

5 0
3 years ago
Read 2 more answers
How to get out of compatibility mode in word?
fomenos
Compatibility mode is so older or different versions of word all look the same regardless of its current version.  So a lot of features you see in compatibility mode will be unavailable unless you upgrade.  If you upgrade though be sure to uninstall the older version first.  I hope this helped!!! Good Luck! :)
5 0
3 years ago
Why it is so important for all application builders to always check data received from unknown sources, such as web applications
Aleks04 [339]
The already-long problem on hacking and other security-related cases necessitates for the application builders to check the data received from unknown sources. To further strengthen the security, even data received from known sources also need to be check as these may also contain harmful viruses creating critical problem to the application. 
6 0
3 years ago
Online library catalogs can direct you to your closest library. (1 point)<br> True<br> False
Kitty [74]

Answer:

True

Explanation:

8 0
3 years ago
Other questions:
  • What protocol must be supported by routers in order to utilize remote assistance easy connect?
    10·1 answer
  • What type of restrictions may be placed on your license?
    7·1 answer
  • Provide Java code to illustrate how to create an array, reference an array, and address an element of an array.
    13·1 answer
  • Which option allows you to view slides on the full computer screen?
    11·1 answer
  • What is Mainframe computer​
    15·1 answer
  • Write a method called makeLine. The method receives an int parameter that is guaranteed not to be negative and a character. The
    11·1 answer
  • Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n
    7·1 answer
  • Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
    7·1 answer
  • Write an enhanced for loop that multiplies all elements in an int[] array named factors, accumulating the result in a variable n
    11·1 answer
  • Hardware is found outside the system unit.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!