1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
2 years ago
12

Identifica una necesidad que implique la reducción de los efectos perjudiciales relacionados al uso de los recursos energéticos.

Computers and Technology
1 answer:
ELEN [110]2 years ago
5 0

Answer:

Baje las persianas o cierre las cortinas en los días calurosos, para mantener la casa fresca y reducir el uso de ventiladores eléctricos o aire acondicionado. Deje que la ropa se seque naturalmente. Mantenga las tapas en las ollas cuando cocine para ahorrar energía. Use baterias recargables.

You might be interested in
Linux is a kind of software whose code is provided for use, modification, and redistribution, at no cost. What kind of software
Scilla [17]

Answer:

Linux is a type of open-source software. The entire premise of open-source code is to make it as easy for people to develop and share as possible, instead of use as a vehicle to make money. This way, the collective knowledge of the community can make the program as secure and user-friendly as possible.

Explanation:

6 0
3 years ago
Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
skelet666 [1.2K]

Here's my code for that, consider it under the WTFPL (http://www.wtfpl.net/). Here is a pastebin of the code, as to avoid text formatting. (Link: https://pastebin.com/S3BDGxqm Raw: https://pastebin.com/raw/S3BDGxqm)

package javaapplication6;

import java.util.Scanner;

public class JavaApplication6 {

   

   public static void main(String[] args) {

       

       Scanner myScanner = new Scanner(System.in);

       

       boolean a;

       int s;

       System.out.println("Enter an int");

       s = myScanner.nextInt();

       a = hasEight(s);

       System.out.println(a);

       

   }

   private static boolean hasEight(int s)

   {

       String str = String.valueOf(s);

       return str.contains("8");

   }

   

}

7 0
4 years ago
An example of an asset that is both personal-use and personal property is:•A. A computer used solely to monitor the CEO's invest
kati45 [8]

Answer:

Option A is correct.

Explanation:

The following is an illustration of such a resource which is also personal usage as well as corporate capital, that system required primarily to track the contribution of both the Chief executive and also to execute the Form 1040.

  • Option B is incorrect because the system required exclusively to email workers concerning the operations of the organization isn't an illustration of such a resource which is both personal usage and commercial property.
  • Option C is also incorrect because it is seen that the following option is not the illustration of such a scenario.
  • Option D is incorrect because the storage facility being required through the Chief executive to preserve confidential documents is not the correct illustration of such a scenario.
  • Option E is incorrect because there are not all the resources are for the personal as well as commercial use.
7 0
3 years ago
What is meant by key distribution center ( KDC)?
erastovalidia [21]

Answer: A. A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon

Explanation: key distribution center ( KDC) is a system that is used to provide access to a particular network user who shares data which are either private or regarded as sensitive.

It is a form of encryption that allows multiple system within the same network through the use of uniquely secured tickets used to setup a secure connection which gives room for data to be shared.

KDC makes use of cryptographic techniques to prove the validity of a user and grants a ticket permission access. The user present the ticket of permission to the system which then validates it and grant access to the user.

Example of security system that adopts KDC include kerberos.

4 0
3 years ago
Lists and Procedures Pseudocode Practice For each situation, provide a pseudocoded algorithm that would accomplish the task. Mak
Andrei [34K]

Answer:

The pseudocoded algorithm is as follows:

Procedure sumOdd(lotsOfNumbers):

    oddSum = 0

    len = length(lotsOfNumbers)

    for i = 0 to len - 1

         if lotsOfNumbers[i] Mod 2 != 0:

              OddSum = OddSum + lotsOfNumbers[i]

Print(OddSum)

Explanation:

This defines the procedure

Procedure sumOdd(lotsOfNumbers):

This initializes the oddSum to 0

    oddSum = 0

This calculates the length of the list

    len = length(lotsOfNumbers)

This iterates through the list

    for i = 0 to len-1

This checks if current list item is odd

         if lotsOfNumbers[i] Mod 2 != 0:

If yes, the number is added to OddSum

              OddSum = OddSum + lotsOfNumbers[i]

This prints the calculated sum

Print(OddSum)

6 0
3 years ago
Other questions:
  • What do you observe on the filter paper strip after 2 to 3 hours?
    8·2 answers
  • Which type of device log contains the most beneficial security data?
    7·1 answer
  • Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
    6·2 answers
  • Cómo se puede evitar que desparescan los recursos de la zona de Michoacán
    15·1 answer
  • Why computer is known as data processing system?
    14·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Write a program whose inputs are three integers, and whose outputs are the largest of the three values and the smallest of the t
    10·1 answer
  • Which of the following best describes the basic purpose of the internet?
    11·1 answer
  • A tech class question any help will be greatly apprieciated
    10·1 answer
  • ANSWER QUICKLIY
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!