1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
8

Explain how mobile phone production could be more sustainable​

Computers and Technology
2 answers:
Vinvika [58]3 years ago
8 0

Answer:

One of the best ways to change this is to voice your concern to cell phone manufacturers for more sustainable products. Request smartphones that are made with fewer hazardous chemicals, manufactured in plants powered by renewable energy, and that contain recycled materials.

Explanation:

erastovalidia [21]3 years ago
5 0

Answer:

Sustainable design - the key features for sustainable phones are: use of sustainable and recycled materials, the use of less energy and efficient charging, durability, and last but not least they should be easy and inexpensive to repair.

You might be interested in
Which function returns the rank of a value within a dataset, assigning an average rank for tied values
ANTONII [103]
Z-y bcuz it is a function and u need to revail rate
4 0
3 years ago
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
SIZIF [17.4K]

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

  • ‎DNS flood attack.
  • DNS tunneling.
  • DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: brainly.com/question/17273205

7 0
3 years ago
How to Pass VMware VCA6-DCV 1V0-621 Exam in First Attempt ?
erastova [34]
Get 100% success guarantee with updated Vmware VCA6-DCV 1V0-621 Certification exam in first attempt by certsbay.com  https://www.certsbay.com/Vmware/1V0-621-exam-questions
7 0
4 years ago
Miguel's boss asks him to distribute information about a new dress code as quickly as possible to the entire staff. There are fi
enyata [817]
Figure out how many people are that need the dress code and how many people that don't need the dress code. He should give the people that need dress code the dress codes.


I hope I helped you. :)
4 0
3 years ago
Read 2 more answers
Write a java program.
Sliva [168]

Answer:

The source code has been attached to this response. It contains comments explaining each line of the code. Kindly go through the comments.

To run this program, ensure that the file is saved as ArithmeticProcessor.java

Keep editing line 7 of the code to test for other inputs and arithmetic operation.

A sample output has also been attached to this response.

6 0
3 years ago
Other questions:
  • Yet another variation: A better packet switched network employs the concept of acknowledgment. When the end user’s device receiv
    11·1 answer
  • Content controls cannot be removed, only edited. Please select the best answer from the choices provided
    10·1 answer
  • You can change the location of the layers panel on the screen by _____ .
    7·1 answer
  • Can you list one property of each of the following?<br> Excel<br> Word<br> Powerpoint
    7·2 answers
  • Copy the main given below. Write the methods needed to produce the output given. YOU SHOULD NOT CHANGE MAIN
    10·1 answer
  • What are two design elements that help MRAP trucks resist mines?
    15·1 answer
  • When an employee is told that his job will be outsourced within a year, he knows that his job will become unnecessary
    5·1 answer
  • Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
    8·1 answer
  • Multiple Choice
    9·1 answer
  • How do i open screenshots on school chromebook?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!