What is the definition of alternative technology?

Answers

Answer 1

Answer:

Alternative technology is a term used to refer to technologies that are more environmentally friendly than the functionally equivalent technologies dominant in current practice.

Explanation:

Answer 2

Answer:

Alternative technology, also known as appropriate technology or sustainable technology, refers to technologies that are designed to be environmentally friendly and socially responsible. These technologies often use renewable or reusable resources and are intended to improve the quality of life for individuals and communities without causing harm to the environment. Examples of alternative technology include solar panels, wind turbines, and composting toilets.


Related Questions

Forza Motorsport is a simulation video game series that involves cars competing against each other to be the fastest. What type of game mode does Forza Motorsport involve?

A.
turn-based game mode

B.
capture the flag game mode

C.
resource management game mode

D.
racing game mode

Answers

D racing game mode is the correct answe

(q003) transformations in the way we learn and work are two of the more obvious ways in which culture has changed. in this respect, the invention of the internet and smartphones strongly resembles the invention of what other powerful communication system?

Answers

The invention of the internet and smartphones strongly resembles the invention of what other powerful communication system writing

What is internet?The Internet (or internet)[a] is a system of worldwide connected computer networks that communicate with one another using the Internet protocol suite (TCP/IP)[b]. A wide range of electronic, wireless, and optical networking technologies are used to connect private, public, academic, business, and government networks with local to global reach. The World Wide Web (WWW), which is made up of interconnected hypertext documents and applications, as well as electronic mail, phone service, and file sharing, are just a few of the many information resources and services available on the Internet.Information theory and efforts to create and connect computer networks that were the result of American research and development are at the root of the history of the Internet.

To learn more about internet refer to:

https://brainly.com/question/2780939

#SPJ4

Drag the tiles to the correct boxes to complete the pairs.
Match the different aspects of the marketing information systems to the scenarios that portray them.

Answers

Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.

What are the different marketing eras?Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.Interactive era, Individualized mail sent to various clients based on their unique preferences.Pre-marketing era , a town crier enticing shoppers to purchase a novel product, assuring that it is a one-of-a-kind.Research era , data analysis to determine the needs of the consumer and corresponding product marketing.In the era of mass communication, a business might advertise its goods in newspapers, magazines, and on the radio.      

To learn more about Marketing eras refer to:

https://brainly.com/question/9350735

#SPJ1

kayla is dissatisfied with the configuration of her keyboard and mouse. she wants to reset the keyboard speed and the mouse pointer rate. which utility should she use to configure the keyboard and mouse properties?

Answers

The utility that she can use to configure the keyboard and mouse properties is Control Panel.

What is Control Panel?

Control Panel is built-in utility from Windows OS to view and change the system settings. The settings can be change is various include removing or adding software and hardware, change accessibility, change networking setting, or can control user accounts.

The additional setting also can be changed in Control Panel such as the drivers for video or audio, VPN, input devices such as keyboard or mouse, and tools for networking.

Since, the keyboard and mouse is a hardware and a input devices to computer, we can change keyboard and mouse setting or configuration in Control Panel.

Learn more about hardware here:

brainly.com/question/24370161

#SPJ4

a video file typically contains a single codec that is used for both audio and video images. a. true b. false

Answers

Without requiring Flash, HTML5 capabilities offer native audio and video. It is straightforward to add media to a website thanks to the HTML5 “audio” and “video” tags. Thus, option B is correct.

What video file typically contains a single codec?

Press Ctrl+U to view the source on the page where the video is located. Now you can determine if a video is being played using Flash or HTML5 by looking for a tag like “object,” which is used by the Flash video player, or “video.”

To identify the media source and include a controls component so that the user can play and pause the media, set the src attribute.

Therefore, it is false that, Typically, a video file uses a single codec for both the audio and the video pictures.

Learn more about video file here:

https://brainly.com/question/21180610

#SPJ1

sally notices that she has the same set of 10 blocks in her code in multiple places. she decides to create a new block (procedure) in scratch so that she can simply replace those 10 blocks with one procedure. why would this be beneficial to sally when she debugs and reasons through her program?

Answers

Since Sally notices that she has the same set of 10 blocks in her code in multiple places. The option that would be beneficial to sally when she debugs and reasons through her program are:

(A) The procedure can make the code section more abstract, so she doesn't have to think through all 10 blocks each time she comes across them in her code.

(C) If there is an error in the procedure, she can fix the error in the procedure

What is a procedural error?

The discrepancy between a measured value and its true value is known as experimental error. In other words, the error or inaccuracies are what prevent us from perceiving a measurement that is 100 percent accurate. Every measurement has some degree of experimental error, which is fairly common.

When an experimenter disregards the methodological protocol, procedural errors happen. Videos frequently contain these flaws, which can sometimes be fixed by rescoring the data, but occasionally the data must be destroyed.

Therefore, Debugging is the process of identifying and resolving faults or bugs in any software's source code. Computer programmers examine the code to ascertain the cause of any faults that may have happened when software does not function as planned.

Learn more about debugs from

https://brainly.com/question/15079851

#SPJ1

See full question below

Sally notices that she has the same set of 10 blocks in her code in multiple places. She decides to create a new block (procedure) in Scratch so that she can simply replace those 10 blocks with one procedure. Why would this be beneficial to Sally when she debugs and reasons through her program?

Select two answers.

answer choices

a. The procedure makes the code section more abstract, so she doesn’t have to think through all 10 blocks each time she comes across them in her code.

b. The procedure will make the program more efficient, spending less time running the same set of 10 blocks over and over again.

c. If there is an error in the procedure, she can fix the error in the procedure without having to search through her code for each place the procedure is used.

c. If there is an error in the procedure, she can fix the error in the procedure without having to search through her code for each place the procedure is used.

Computer literacy means a person can perform basic computer operations such as using the Internet to search for information.
True
False
thank you too whoever answers this

Answers

Answer:

True

Explanation:

Computer literacy is having the knowledge and ability to use computers and information technology efficiently.

I need help please!
c = 2
while (c < 12):
print (c)
c = c + 3

Answers

Answer:

11

Explanation:

Answer:

output:

2

5

8

11

Explanation:

the while loop will continue to run until the condition is false. In this case, the condition is false when c is greater than 12. The loop will run 4 times, and the value of c will be 2, 5, 8, and 11.

which of the following statements holds true for search engine optimization (seo)? a.it refers to the process of improving an ads rank in 's online advertising listings. b.it refers to software that traverses available web links in an attempt to perform a given task. c.it refers to a temporary storage space used to speed computing tasks. d.it refers to the process of improving a page's organic search results. e.it refers to internet content that can't be indexed by and other search engines.

Answers

The statements that true for search engine optimization is it refers to the process of improving a page's organic search results.

What is search engine optimization?

Search engine optimization is a method to improving the visibility of the websites, page, or even application for customers when they search for it.

The visibility is important for websites, page, or application because with the great visibility the customers can easily give attention to the website, page, or application which if the websites or application is for business it can attract the customers to purchase their product or at least know about their product.

Organic search result is when the user search something in search engine often search engine will give the result for what user search and a ads. The ads is not organic, the organic one is if the customer visit a website that is no ads in search result of search engine.

So, search engine optimization is to create more visibility so the user can easily view the website without must be paid for ads, or in other the view is organic.

Learn more about search engine optimization here:

brainly.com/question/14097391

#SPJ4

Prefixe = "BCFHMPRSVT"
uffix = "at"
for p in prefixe:
print(p uffix)
Since Tat i not a word, the program need to be changed to print That intead of Tat. Add a conditional tatement to make the program print That intead of Tat

Answers

Answer:

prefixe = "BCFHMPRSVT"

uffix = "at"

for p in prefixe:

   if p == "T":

       print(p + "hat")

   else:

       print(p + uffix)

what is a platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor?

Answers

Call manager is the platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor.

What does a threat actor do?A threat actor, also known as a malicious actor, is a person or a group of persons who engage in an activity with the intent of harming computer systems, devices, networks, or other items in the cyberspace.Threat actors commit cybercrimes to target uncovered vulnerabilities and sabotage operations. Threat actors come from various educational backgrounds and have a variety of resources. Cyberattack frequency and classification are both rapidly evolving. Threat actors' backgrounds influence who they attack, how they attack, and what information they seek.The authors contend that in order to more effectively combat cybercrime, we should work to better understand cyber threat actors and the motives guiding their behaviour. The research distinguishes between three categories of cybercriminals: state-sponsored actors, organised crime gangs, and hacktivists.

To learn more about Cyberattack refer :

https://brainly.com/question/27665132

#SPJ4

What it job is in charge of a software application development team that develops, designs, and tests software applications?.

Answers

Answer:

Software engineers design and create computer systems and applications to solve real-world problems. Software engineers, sometimes called software developers, create software for computers and applications.

Explanation:

Software architect job is in charge of a software application development team that develops, designs, and tests software applications.

What is the job?

A task that is completed, specifically one that is particular, as one of one's regular workday or for a set fee. A job is a regular, formal occupation for which you get paid. It is referred to as a career or employment as well.

To address real-world issues, virtual assistant design and build computer systems including software. For machines and applications, engineers known as software developers—write applications.

A designer is a senior web developer on a mobile development team who takes executive choices on software architecture. This was made to make sure that the data that is presented to them was to be maintained in the form of an application.

Learn more about the job, here:

https://brainly.com/question/17205577

#SPJ2

a technician is looking at sata interface specifications and notices a particular key associated with it. a technician usually keys a sata interface ssd as what?

Answers

A technician usually keys a SATA interface SSD as B key.

What is a SATA?

Serial Advanced Technology Attachment, or SATA, is an interface for transferring data between a computer's main circuit board and storage devices. It is also known as serial ATA. SATA took the place of the venerable PATA (parallel ATA) interface.

In contrast to multiple parallel streams, serial communication transfers data one bit at a time. Despite what might seem to be a parallel model advantage, serial transmission is actually less prone to interference, allowing SATA to operate at a much higher speed than PATA. Additionally, simpler and slimmer cabling is possible with the serial model.

SATA's initial iteration communicated at a speed of 150 MBps as opposed to PATA's 133 MBps.

Learn more about SATA

https://brainly.com/question/29661435

#SPJ4

if there are 10 routers between the source and destination hosts, how may internet processes will be involved on all devices?

Answers

two internet processes will be involved on all devices.

What does the internet process do with each TCP segment? Reassembles the TCP segments in order after removing each one from its packet, then sends the finished application message to the target application.The message source transfers data to a transmission medium using a transmitter. The message destination uses a receiver to extract data from the transmission medium.A message is a piece of data delivered over the internet, however before a message is sent, it is divided up into smaller pieces called packets. Using Transport Control Protocol (TCP) and Internet Protocol (IP), these messages and packets move between sources (TCP).

To learn more about Transport Control Protocol  refer,

https://brainly.com/question/14280351

#SPJ4

Why do games usually have rules?

A.
to make them less fun

B.
to provide structure so that the game objective can be achieved

C.
so that they can be broken

D.
because it’s easier to program rules into a game

Answers

answer b:

games NEED structure to function usefully.

assembly programming is less difficult to program and less time consuming to debug than higher - level languages. true or false

Answers

It is very difficult to debug and understand the code of an assembly language. True

Why Is assembly language simpler to learn than high-level programming?Python is more sophisticated than assembly language. Assembly languages are low-level languages, whereas high-level languages such as C, Java, or Python employ 0’s and 1’s instead of numbers, symbols, and abbreviations.It will be more difficult to learn than the other Pascal-like languages. Learning assembly, on the other hand, isn’t much more difficult than learning your first programming language. Assembly is difficult to read and comprehend. If you don’t know, Assembly language certainly is.

To learn more about Assembly language refer:

https://brainly.com/question/29647047

#SPJ4

a mobile device user is installing a map application. the app requests several permissions during installation. which permission is not legitimate?

Answers

Permissions like device's camera, contacts, or storage, NFC.

What permission should be avoided?

It is difficult to determine which of the requested permissions might not be legitimate without more information about the specific permissions being requested and the context in which they are being requested.

In general, it is not uncommon for mobile apps to request a variety of permissions, such as access to the device's location, camera, contacts, or storage. However, if an app is requesting permissions that seem excessive or unrelated to its intended purpose, or if the app is from an untrustworthy source, it may be a cause for concern.

In these cases, it is best to carefully review the requested permissions and consider whether or not to install the app.

To Know More About Mobile Devices, Check Out

https://brainly.com/question/4673326

#SPJ1

Ashton is creating a game that needs to check whether the player has picked up the secret object. What kind of statement should Ashton use?

A.
sometimes statement
B.
first/then statement
C.
conditional statement
D.
priority statement

Answers

Answer:

C. conditional statement

Explanation:

Ashton should use a conditional statement to check whether the player has picked up the secret object in his game. A conditional statement is a type of programming statement that allows a program to make a decision based on certain conditions. In Ashton's game, the conditional statement would check whether the player has picked up the secret object, and if they have, it would perform a certain action.

how does the addition of this module affect the game’s difficulty OA. It changes the number of times a function is called based on the
player's skill level.
OB. It changes all the parameters in the game based on the player's
skill level.
OC. It changes the enemy sprite based on a chosen condition.
O
D. It changes the speed parameter based on a chosen condition.

Answers

The addition of this module affect the game’s difficulty is that:  It changes all the parameters in the game based on the player's

skill level.

How might gaming technology be used to improve education and growth?

Studies show that incorporating games into the classroom can boost engagement, promote social and emotional learning, and encourage students to take calculated risks.

Therefore, All video games incorporate the idea of difficulty. It is the driving force behind challenge in a video game, thus game designers need to give this component of the design process careful consideration if they want to create the experience they're going for.

Learn more about game’s difficulty from

https://brainly.com/question/29471587
#SPJ1

What type of story attempts to make you feel engaged by scaring you?

A.
love story

B.
horror story

C.
fantasy story

D.
bedtime story

Answers

Answer: B

Explanation: Horror

Differentiate between absolute cell referencing and relative cell referencing

Answers

The absolute cell referencing is constant and the relative cell referencing formula is copied to another cell.

What is cell?

All living creatures and bodily tissues are made up of the smallest unit that can live on its own. A cell is the tiniest, most fundamental unit of life, responsible for all of life's operations.

Absolute cells, do not change regardless of where they are replicated. When a formula is transferred to some other cell, the cell size references change. In the field, they are diametrically opposed.

As a result, the absolute cell referencing is constant and the relative cell referencing formula is copied to another cell.

Learn more about on cell, here:

https://brainly.com/question/3142913

#SPJ1

which python module and method are used to create a multiple regression model for a given data set? select one.

Answers

Answer:

Ols method from statsmodel module

Explanation:

The Python method that can be used to return the residuals is the model resid method.

What is module?

The variable has been declared as the "module", and the method has been meant to return the residual of the dataset. Resid is a method that returns the residual of a multiple regression model.

The Python system includes the PVM, an the interpreter that executes the bytecode. The PVM must convert the byte code instructions into machine code in order for the computer to run the machine code instructions and display the results.

This conversion has been carried out by the PVM interpreter. The interpreter that converts the code from bytes into machine code, which is subsequently transmitted to the computer processor for execution.

Therefore, The Python method that can be used to return the residuals is the model resid method.

Learn more about Python on:

https://brainly.com/question/30427047

#SPJ2

designers can link multiple selected layers by clicking the input answer icon at the bottom of the layers panel.

Answers

In Photoshop designers can link multiple selected layers by clicking the group icon at the bottom of the layers panel.

What is Photoshop?

Photoshop is a program that Adobe has developed for image creation, graphic design, and photo editing. For pixel-based images, raster graphics, and vector graphics, the software offers a wide range of image editing features.

In 1988, Adobe Photoshop made its debut. It was initially developed by Thomas and John Knoll for Macintosh computers, but it is now accessible on Windows and macOS platforms.

Photoshop is a component of the Adobe Creative Cloud, which also offers well-known programs like Adobe Illustrator, Photoshop Lightroom, and Adobe Dreamweaver. Users of Photoshop Creative Cloud can work on image and graphic content from any location.

Learn more about Photoshop

https://brainly.com/question/16859761

#SPJ4

What is one way sprite properties are the same as variables?

Answers

values that sometimes we want to just read, and sometimes that we want to write to.

your company is experiencing a growth spurt and is ready to invest in a more sophisticated disaster recovery plan. currently the backup plan consists of a few spare computers in a storage closet, and data on the servers is duplicated weekly to an off-site backup service. the company owners have committed to acquiring additional servers to duplicate critical servers in their current network, and they want the servers to be configured identically to the servers now in use. the new servers will be stored at an off-site data center and updated every time the on-site servers are updated. what type of disaster recovery site is your company creating?

Answers

The type of disaster recovery site is warm site.

What is disaster recovery site?

Disaster recovery site is a secondary site of server to storage the data same as the data in main server.

Disaster recovery site is created for the purpose if the data in main server is loss or can't be access, the data in secondary storage can replace them.

Three type of disaster recovery site is,

Cold site is disaster recovery site but it not provide hardware element.Warm site is disaster recovery site with hardware element but the data not fully transferred to new hardware element.Hot site is disaster recovery site with hardware element and the data fully transferred to new hardware element.

Since, the question tell us the backup plan is to duplicated data in weekly period then is warm site.

Learn more about disaster recovery site here:

brainly.com/question/14086328

#SPJ4

Functions can do all of the following except:
A)Ask the user for input.
B) Allow writing without proper syntax
C) Stop the program from repeating
D) Simplify code

PLS HELP ME ILL MARK YOU BRAINLEST

Answers

Answer:

B) Allow writing without proper syntax

Explanation:

Functions can do all of the following except Allow writing without proper syntax.

What is Syntax?

The placement of words and phrases in a particular order is known as syntax in English. The meaning of the entire statement can be altered by shifting the placement of only one word.

The placement of words has strict restrictions in every language, and proficient authors can bend these rules to create sentences that sound more dramatic or poetic.

When it comes to language, syntax is a complex subject that can be challenging to comprehend. To help you communicate clearly, we cover the fundamental principles and varieties of syntax in this book, along with several syntax examples.

Therefore, Functions can do all of the following except Allow writing without proper syntax.

To learn more about Syntax, refer to the link:

https://brainly.com/question/28182020

#SPJ2

a cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

Answers

A private cloud is a cloud computing infrastructure that is exclusively used by one client. Many of the advantages of cloud computing are combined with the security and management of on-premises IT infrastructure in this method.

What are system software and hardware?

Hardware and software make up the two categories that make up a computer system. The term "hardware" describes the actual, observable parts of the system, such as the display, CPU, keyboard, and mouse. On the other hand, software refers to a set of instructions that allow the hardware to carry out a certain set of activities.

What are some illustrations of software and hardware?

The Processor, Memory Devices, Monitor, Printer, Keyboard, Mouse, and Central Processing Unit are a few examples of hardware in a computer. Computer software consists of a collection of instructions, guidelines, and documentation that a computer system can use to carry out various activities.

To know more about hardware and software visit;

https://brainly.com/question/10937439

#SPJ4

please help? i dont understand im new to the class and need a lot of help

Answers

Answer:

THERE ARE MANY TYPES OF FUNCTIONS IN ICT, in excel, VLOOKUP, IF, HLOOKUP, COUNTIF, SUM IF, COUNT, SUM, AVERAGE are all examples of functions.

THERE ARE FUNCTIONS of a computer system: Input, Processing, Storage and Output.

Explanation:

A function performs a specific set of operations on its input values to produce a single output value

you want to know what pages new users open most often after opening your home page, so you create a new path exploration in explore that you plan to share with a co-worker. who can see this new path exploration, by default?

Answers

It is accessible in read-only mode to everyone on your property. It is accessible to and editable by anyone on your property. You can share it with other users of the property so they can make changes even though only you can view it.

In Analytics, what is path exploration?

The path exploration approaches enable you to: Identify the most popular pages that new users access after visiting the home page. Find out what users do after an app exception.

What distinguishes path exploration from reverse pathing?

By default, path exploration displays your users' actions starting at a certain event or page and moving ahead. Backwards pathing enables you to choose a desired event or page and investigate how your people get there.

To know more about editable visit :-

https://brainly.com/question/21263685

#SPJ4

consider the constructor of the bankaccount class that has a parameter for the initial balance. which line of code is equivalent to this constructor body? balance

Answers

The line of code is equivalent to constructor body balance is:

A) this.balance = initialBalance;

About Constructor:

In object-oriented programming, a constructor is a particular method of a class or structure that initializes a newly formed object of that kind. The constructor is always invoked when an object is created.

An object's members can be changed to default or user-defined values using a constructor, which is similar to an instance method and typically has the same name as the class. A constructor, despite looking similar, is not a legitimate method because it lacks a return type. The constructor initializes the object, not the object itself, and it cannot be static, final, abstract, or synchronized.

Constructors are not expressly called and are only used once throughout their lifespan. The execution order of the constructor in a hierarchy of classes when a derived class derives from a parent class is a call to the constructor of the parent class first, followed by the constructor of the derived class. It is not possible to inherit constructors.

It is not necessary for users to create constructors for each class. Any access modifier can be used to declare a constructor. A constructor with the appropriate access modifier must exist.

To know more about constructor visit:

https://brainly.com/question/29999428

#SPJ4

The question is incomplete. Below is the complete question:

Consider the constructor of the BankAccount class that has a parameter for the initial balance. Which line of code is equivalent to this constructor body?

balance = initialBalance;

A) this.balance = initialBalance;

B) this.initialBalance = balance

C) balance = this.initialBalance;

D) this.balance = this.initialBalance;

Other Questions
1. a set of p orbitals can accommodate a maximum of 6 electrons. 2. there are 10 d orbitals in a set. 3. none of the p orbitals are spherically symmetric. 4. the fifth shell with n 6. Which is equivalent to the following expression?(3p +5pq-q) + (p +3pq-2q29)O3p +8pq-3qO4p +8pq+qO4p4 +8pq-3qO4p+8pq-3q(1 point) write each equation in point slope form.y+5=-6(x+7)and y+2 =1/6(x-4) function rule to find f(9). A group of friends collected toys to donate to children in need. After sorting the toys intoboxes, they found they had 6/7 of a box of stuffed animals, 5/7 of a box of board games, and1/7 of a box of dolls. In total, how many boxes of toys did the friends collect? A glacier, a slow-moving mass of ice, has gradually weathered and eroded rock away in a mountain valley. The landscape of rock has greatly changed. Whichsphere was affected in the transformation? Why should you notify your bank and credit card companies if you suspect you are a victim of identity theft? They can freeze your accounts to help prevent loss. They can freeze your Social Security number for you. They can prosecute people who have stolen your identity.They can ensure you get a job after the investigation When writing 2525 as 2n2n, which statement is true about the value of nn?ResponsesThe value of nn is 1515 because (25)5=21(25)5=21 and (21/5)5=21(21/5)5=21, so 25=21/525=21/5.The value of n is 1 5 because ( 2 5 ) 5 = 2 1 and ( 2 1 / 5 ) 5 = 2 1 , so 2 5 = 2 1 / 5 .The value of nn is 1515 because (25)5=21(25)5=21 and (21/5)5=20(21/5)5=20, so 25=21/525=21/5.The value of n is 1 5 because ( 2 5 ) 5 = 2 1 and ( 2 1 / 5 ) 5 = 2 0 , so 2 5 = 2 1 / 5 .The value of nn is 55 because (25)5=21(25)5=21 and (25)5=21(25)5=21, so 25=2525=25.The value of n is 5 because ( 2 5 ) 5 = 2 1 and ( 2 5 ) 5 = 2 1 , so 2 5 = 2 5 .The value of nn is 55 because (25)5=21(25)5=21 and (25)5=20(25)5=20, so 25=2525=25.The value of n is 5 because ( 2 5 ) 5 = 2 1 and ( 2 5 ) 5 = 2 0 , so 2 5 = 2 5 . Two fruit flies with normal wings are crossed. Among their offspring are 89 with normal wings and 33 with dumpy wings. What are the genotypes of the parents? Which trait is dominant? _____________________ Which trait is recessive? Explain how you know. A marine biologist and cancer researcher worked together to isolate the green fluorescent protein (GFP) gene from a sample of jellyfish DNA. Scientists have successfully inserted this gene into a cancerous tumor in humans in order for the tumor to glow so it can be more easily removed during surgery. What biotechnology is used to accomplish this procedure? Gel electrophoresis Polymerase chain reaction Restriction enzyme digestion Transgenic technologyA is incorrect Giovanni is having difficulty learning english. He keeps putting verbs at the end of sentences. For example, instead of saying "the dog ate the bone," he says, "the dog the bone ate. " giovanni is having trouble with. Which of these animals would you NOT find in the Amazon River in South America an example would be if indians would change their language it would be hard for them to adjust What is the density of a pumpkin with a mass of 2.0 kg and a volume of 0.0060 m3 ? 330 kg/m3 0.003 kg/m3 0.012 kg/m3 1200 kg/m3 PLEASE HELP HURRY!!!! Government may place legal limits on prices when it is determined that prices are unfairly____for buyers or unfairly___for sellers.Choose matching definitiona. high; lowb. marginalc. rise; falld. government From question 28 -29 Help please access to accurate information and building cognitions are listed as being important for which environmental component of wellness? Which use of land is most likely to result in erosion?A. applying compost to soil to feed lifeB. plowing fields parallel to a hillsideC. planting vegetation along a hillD. leaving large stretches of land undeveloped The quadrilateral ABCD is a parallelogram if pairs of consecutive angles are supplementary. Given the angle measures, prove that quadrilateral ABCD is a parallelogram by finding the value of x. A = 120 2x B = 70 + x C = 105 x2 D = 40 + 4x