1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
13

In addition to environmental issues, what does true sustainability address?

Computers and Technology
2 answers:
FinnZ [79.3K]3 years ago
6 0

Answer:

being able to live affordably without wasting items

Explanation:

VashaNatasha [74]3 years ago
4 0

In addition to environmental issues, true sustainability addresses the preservation of social and economic resources.

Sustainability simply refers to the meeting of our needs without wastage or jeopardizing the resources being available to future generations.

<u>Sustainability</u> is vital for the protection of the<u> environment</u>, social equity, and development. When there is <em>sustainability,</em> the environment is protected and the resources are available for others.

Some examples of sustainability include avoiding wasting water, a limit on hunting activities, etc.

Read related link on:

brainly.com/question/13220961

You might be interested in
Which statement about routers is !!!FALSE!!!
monitta

Answer:

b. they are located at the intersections of the network of wires and cables that make up the internet.

Explanation:

Given that Router is a computer networking device that operates by transferring data packets between computer networks, while also ensuring traffic organizing tasks on the Internet.

Hence, Routers put packets in the right order after they arrive at their destination by matching the destination IP address of the packet and one of the addresses in the routing table.

Also, Routers check the address on each packet that arrives and decide which way it should go next​ by ensuring the data packets are summarized for the outgoing interface recorded in the table entry.

Therefore, the correct answer is option B

8 0
3 years ago
A web based application that integrates html code with business logic is said to be in violation of what design principle?
adoni [48]

A web-based application that combines HTML code with business logic exists said to be in violation of Protection from variations design principle.

<h3>What is Html?</h3>

The Hypertext Markup Language or HTML stands for the standard markup language for documents developed to be displayed in a web browser. It can be administered by technologies such as Cascading Style Sheets and scripting languages such as JavaScript. HTML (Hypertext Markup Language) exists as the code that is used to structure a web page and its content. For example, content could be structured within a group of paragraphs, a list of bulleted points, or using photos and data tables

The protected variations pattern protects components from the variations on other elements (objects, systems, subsystems) by wrapping the direction of instability with an interface and operating polymorphism to make various implementations of this interface.

Hence, A web-based application that combines HTML code with business logic exists said to be in violation of Protection from variations design principle.

To learn more about Hypertext Markup Language refer to:

brainly.com/question/5560016

#SPJ4

5 0
2 years ago
Choose the correct answer base on the Components of Computer System
kondor19780726 [428]
1 - b - Excel is a computer program, so it'd be Software
2 - a - Process of elimination, haven't heard of the term 'peopleware' before.
3 - d - A joystick accepts input from a user to interact with a computer. ex. Flight Simulators
4 - c - A monitor will display (or output) an image based on what is received from the computer.
4 0
3 years ago
Which RAID configuration, known as byte-striped with error check, spreads the data across multiple disks at the byte level with
wel

Considering the computer system technology, the RAID configuration, known as byte-striped with an error check, and spreads the data across multiple disks at the byte level with one disk dedicated to parity bits is known as <u>RAID Level 5.</u>

<h3>What is the RAID Level 5?</h3>

RAID Level 5 is the Redundant Array of Inexpensive (or Independent) Disks Level 5. RAID Level 5 works on strips to transfer data over multiple disks in an array.

RAID Level 5 is also known to record information, with the ability to withstand numerous failures.

<h3>Other types of Redundant Array of Inexpensive (or Independent) Disks</h3><h3 />
  • RAID level 0
  • RAID level 1
  • RAID level 2
  • RAID level 3
  • RAID level 4

Hence, in this case, it is concluded that the correct answer is RAID Level 5.

Learn more about RAID configuration here: brainly.com/question/9305378

8 0
3 years ago
Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
inessss [21]

Answer:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

Explanation:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

8 0
4 years ago
Other questions:
  • What is the correct method to use Dreamweaver to find broken links and orphaned files?
    15·1 answer
  • This type of connection uses radio waves to connect devices on a network.A) DataB) EthernetC) RouterD) wifi
    15·1 answer
  • Alisa Miller claims that today's college graduates:
    7·1 answer
  • To adjust the margins on a page, users will navigate to the _____ tab.
    13·2 answers
  • Show the CREATE TABLE statements for HAPPY INSURANCE database for the table CLIENT (assume that non-primary key columns can be o
    7·1 answer
  • Given that note, write a program which tells us the major scale starting at that note, using the pattern above. In the main bloc
    6·1 answer
  • Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
    6·1 answer
  • Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the m
    14·1 answer
  • How do I mark brainlyist
    7·2 answers
  • What can visible light and ultraviolet light do together
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!