1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
14

Ashley wants to know the oldest form of both water purification and waste disposal. Help Ashley determine the methods. The oldes

t method of water purification is . The oldest method of waste disposal is .
Computers and Technology
1 answer:
polet [3.4K]3 years ago
3 0

Answer: Distillation and Landfill

Explanation:

Distillation is the old method of water purification, these process involves the separation of compounds or components of a mixture based on their different boiling points. Today we have advanced method of seperation, although Distillation is still being used.

Land fill is one of the oldest form of waste disposal, these method involves digging up a large land mass(depending on the waste to be disposed) and dumping the water into the dugged land mass, then cover it up with the sand that was dugged out. Today, they are more advanced ways to handle wastes such as incinerator.

You might be interested in
How do I send the face to the back? Seriously, I can't find out how...
makvit [3.9K]

Answer:

i think you can layer it :)

Explanation:

nice drawing btw!

8 0
2 years ago
Hope wants to add a third use at the end of her
Arisa [49]

Answer: Put her insertion point at the end of the item 2b.

Press the enter key.

Explanation:

6 0
2 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Does anyone know how to change there Name of the account that shows up? If you do please tell me in a comment and/or Answer.
Alona [7]

Answer:

change your email

Explanation:

award me brainliest

6 0
3 years ago
Read 2 more answers
Which of the following is not a characteristic of a motorcycle?
MrRa [10]

Answer:

the correct answer is A

3 0
3 years ago
Other questions:
  • How can u refer to additional information while giving a presentation
    15·1 answer
  • Which of the following formats can algorithms NOT be written in:
    13·1 answer
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • A tornado may be approaching if you observe which of the following?
    15·1 answer
  • _________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
    10·1 answer
  • A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250
    7·1 answer
  • Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
    6·1 answer
  • The objects that you place on master pages are called _____.
    6·1 answer
  • Ayúdenme porfa se los agradecería :c
    7·1 answer
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!