what involves reducing the electricity consumed and environmental waste generated when using a computer?

Answers

Answer 1

The process of reducing electricity consumption and environmental waste generated when using a computer is known as computer energy efficiency and environmental sustainability.

Computer energy efficiency and environmental sustainability involve various practices aimed at minimizing the electricity consumed and reducing environmental waste generated during computer usage. Here are some key aspects:

Power management: Implementing power management features such as sleep mode, hibernate, and automatic power-off settings helps conserve energy by reducing power consumption during periods of inactivity.

Hardware selection: Choosing energy-efficient components, such as low-power processors, solid-state drives (SSDs), and LED monitors, can significantly reduce energy consumption compared to less efficient alternatives.

Energy-efficient settings: Optimizing computer settings, such as screen brightness, display sleep time, and minimizing background processes, helps reduce energy usage.

Recycling and disposal: Properly disposing of electronic waste by recycling old computers and peripherals prevents harmful environmental effects and promotes responsible waste management.

Virtualization and cloud computing: Adopting virtualization technologies and utilizing cloud-based services can reduce the need for physical hardware, leading to lower energy consumption and less environmental waste.

By implementing these practices, individuals and organizations can contribute to the overall reduction of energy consumption and environmental impact associated with computer usage, promoting sustainability and a greener approach to technology.

Learn more about environmental sustainability here:

https://brainly.com/question/21538467

#SPJ11


Related Questions

An all-in-one printer is also known as a multi-function printer. It includes a printer, scanner, copy machine and / or fax machine.true or false?

Answers

An all-in-one printer is also known as a multi-function printer. It includes a printer, scanner, copy machine and / or fax machine: true.

What is a printer?

In Computer technology, a printer can be defined as an electronic output (peripheral) device that is designed and developed for printing paper documents containing texts or images.

What is an all-in-one printer?

An all-in-one printer is sometimes referred to as multifunction peripheral or multi-function printer and it can be defined as a type of printer that is designed and developed to comprise all or some of the following;

PrinterScannerCopy machineFax machine.

Read more on printer here: brainly.com/question/17100575

#SPJ1

Match the following.
1. the process of reducing repetition of data
data normalization
2. individual categories of data you will enter in a database
records
3. a field that is a unique identifier for each record in the table
fields
4. data that is entered in the database
primary key
5. a link between two tables
relationship

Answers

Answer:

1192783728439

Explanation:

an expression attached to an if statement should evaluate to a boolean data type. True or False?

Answers

True. An expression attached to an if statement is used to test a condition, and the condition must evaluate to a boolean data type, which can only be either true or false.

In programming languages such as C, C++, Java, and Python, a non-boolean expression is implicitly converted to a boolean value in the if statement's condition. Any non-zero numerical value, non-empty strings, and non-null objects are converted to true, while zero, empty strings, and null objects are converted to false. It is important to ensure that the expression attached to an if statement is of the proper type to avoid errors and unexpected behavior in the program.  An expression attached to an if statement is used to test a condition, and the condition must evaluate to a boolean data type, which can only be either true or false.

Learn more about program :

https://brainly.com/question/11023419

#SPJ4

Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs to have several other applications open so that he can research the project. ​

Answers

Answer:

d. Task View

Explanation:

Based on the scenario being described within the question it can be said that the best feature for this would be the Windows 10 task view. This is a task switcher and  virtual desktop system included in the Windows 10 operating system, and allow the individual user to quickly locate, manage, open or hide different windows/tasks. Such as having several projects open in different monitors running at the same time.

What rules, if any, would you put in place to regulate the use of facial recognition technology?

Answers

Transparency: Any organization that uses facial recognition technology should be transparent about its use, including the purpose and scope of the technology.

Informed Consent: Individuals should be informed about the use of facial recognition technology and provide their explicit consent before their images are captured, stored, or used.

Accuracy: The facial recognition technology should be accurate and unbiased in its results, and organizations should be held accountable for any errors or biases in the system.

Privacy: Facial recognition technology should be used in accordance with data privacy regulations and guidelines.

Limitations: There should be clear limitations on the use of facial recognition technology, including how it is used, when it is used, and who has access to the data.

Oversight: There should be independent oversight to ensure that the use of facial recognition technology complies with all applicable laws and regulations and to monitor its potential misuse.

Protection against abuse: Strong legal and technical safeguards should be put in place to prevent the misuse of facial recognition technology, such as its use for discriminatory purposes, surveillance of marginalized groups, or tracking of individuals without their consent.

These rules could be further refined and adapted based on the specific context, application, and societal values of the region or country where the technology is being used.

To learn more about language

https://brainly.com/question/16936315

#SPJ11

consider the computing load of a sum of 100 scalar variables and one matrix subtraction of a pair of two-dimensional array with dimensions 100x100. assume the matrix subtraction is fully parallelizable, calculate the speedup using 100 processors assuming 10 processors carry 20% of the load and the rest load is shared among the rest 90 processors evenly?

Answers

To calculate the speedup using 100 processors with 10 processors carrying 20% of the load and the rest of the load shared among the remaining 90 processors evenly, we can use Amdahl's Law.

The formula for calculating the speedup is:

Speedup = 1 / ((1 - P) + (P / N))

Where:

P is the portion of the load that can be parallelized (in this case, the matrix subtraction)

N is the number of processors

In this case, the scalar variable sum is not parallelizable, so the portion that can be parallelized (P) is only the matrix subtraction.

P = 1 (since the matrix subtraction is fully parallelizable)

N = 100

Speedup = 1 / ((1 - 1) + (1 / 100))

= 1 / (0 + 0.01)

= 1 / 0.01

= 100

Therefore, the speedup using 100 processors, with 10 processors carrying 20% of the load and the rest of the load shared evenly among the remaining 90 processors, is 100.

learn more about processors here

https://brainly.com/question/30255354

#SPJ11

how does credit card fraud detection work when might detection fail?

Answers

Can someone plz explain me what this button does and I’m scared to click it
It’s like a square and it’s window 10

Can someone plz explain me what this button does and Im scared to click it Its like a square and its

Answers

Answer:

if i remember correctly that button is used to short cut tabs or do something with the current page

Plotly visualizations cannot be displayed in which of the following ways Displayed in Jupyter notebook Saved to HTML. files Served as a pure python-build applications using Dash None of the above

Answers

Plotly visualizations can be displayed in all of the following ways:

Displayed in Jupyter notebook: Plotly visualizations can be rendered directly in a Jupyter notebook, allowing you to view and interact with the charts within the notebook environment.

Saved to HTML files: Plotly charts can be saved as standalone HTML files, which can then be opened and viewed in any web browser. This allows you to share the visualizations with others or embed them in web pages or documents.

Served as pure Python-built applications using Dash: Plotly's Dash framework allows you to build interactive web applications entirely in Python. With Dash, you can create complex data-driven applications that incorporate Plotly visualizations as part of their user interface.

Therefore, the correct answer is: None of the above

learn more about visualizations here

https://brainly.com/question/32099739

#SPJ11

What is the last step of the ethical decision-making process?

Answers

Answer:

The last stage of this process is the adaptation stage.

Explanation:

In this stage, the clinician will look to adapt the selection or solution of the ethical dilemma by refining it, or by returning to the evaluation and selection stages to find and choose a better solution.

Adaption stage I believe tell me if I’m wrong or right okay thanks and that’s it

which field in the tcp header provides the information for the receiving network device to understand where the actual data payload begins?

Answers

The "Data Offset" field, also known as the "Header Length" field, is a TCP header field that gives the receiving network device the knowledge it needs to determine where the real data payload starts.

What TCP header field is in charge of identifying the receiving process?

The transmission and receiving processes are identified by TCP using the IP address and port number (16-bit value), respectively. A TCP connection is uniquely identified by the two end sockets, which are pairs of an IP address and port number.

Which header field in a TCP segment is responsible for flow control?

The window size refers to how much data a source can send before an acknowledgement is required.

To know more about TCP header visit:-

https://brainly.com/question/29562357

#SPJ1

complete the following program, which displays the number of minutes in equivalent hours:minutes format.

Answers

Considering the available options, the route that would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1 is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

What is Route in IP address?

IP routing generally transmits packets from one network to another host on another remote network.

The process of IP routing involves evaluating routing tables to specify the following hop address of the packet that should be sent.

Therefore, Considering the available options, the route that would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1 is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

Learn more about IP Routing here:

brainly.com/question/6991121

#SPJ1

Which type of network device directs data packets to other networks until each packet reaches its destination, and thus forms the Internet backbone? a. switch b. router c. server d. bus.

Answers

The Internet backbone is made up of network devices of the router type that route data packets to other networks until each packet arrives at its destination.

What is the name of the networking device that joins two networks and only allows necessary packets to pass through?

A network device known as a bridge that joins two networks together and only allows necessary data to pass Switch: A network component that joins several devices and filters packets according to their destination inside the joined devices.

Which hardware piece is employed to link a network to the Internet?

Modem. Once you have a computer, connecting to the Internet really doesn't require any additional hardware. You require a modem as your main piece of hardware.

To know more about Internet backbone visit :-

https://brainly.com/question/5620118

#SPJ4

The step-by-step procedure to solve any problem is called an

Answers

Answer:

Algorithm

Explanation:

Solve the following activity in pairs . Eldar uses a controller with a circuit to light 16 LED lamps which are labeled from 1 to 16 . When the controller a gives signal to a LED lamp , it changes its state (ON or OFF ) . In the beginning, all the LEDs are swi hed OFF . Eldar has found a sequence of lightning: On the 1st second controller lights ON all LED lamps . ( 1 .... 2 ... 3 .....) On the 2nd it lights ON the LEDs that are even in the circuit. ( 2 ... 4 ... 6 .... ) On 3rd second it lights every third LED in the circuit. ( 3...6...9...) And so it continues in similar way... Which LEDs must be switched ON after the 16th second​

Solve the following activity in pairs . Eldar uses a controller with a circuit to light 16 LED lamps

Answers

Answer:

Non  of the LED lamps present will be switched on after the 16th second

Explanation:

From the question, the operation of the controller with time are;

The LED lamp the controller lights up on the 1st second = All LED lamps

The LED lamps the controller lights up on the 2nd second = All even numbered LED lamps = Every other lamp with a number which is a multiple of 2

The LED lamps the controller lights up on the 3rd second = Every other LED lamp with a number which is a multiple of 3

Given that the LED lamps continues in that way, the LED lamps the controller lights up on the 16th = The 16th LED lamp which is a multiple of 16

Therefore, the LED lamp(s) the controller lights up after the 16th second = The 17th or more LED lamp = Non  of the LED lamps present will be switched on after the 16th second

The net force on a vehicle that is accelerating at a rate of 1.2 m/s2 is 1500 newtons. What is the mass of the vehicle to the nearest kilogram?

Answers

Answer:

The mass of the vehicle is 1250kg

Explanation:

Given

\(Net\ Force = 1500N\)

\(Acceleration = 1.2m/s^2\)

Required

Determine the vehicle's mass

This question will be answered using Newton's second law which implies that:

\(Net\ Force (F) = Mass (m) * Acceleration (a)\)

In other words:

\(F = ma\)

Substitute values for F and a

\(1500 = m * 1.2\)

Make m the subject

\(m = \frac{1500}{1.2}\)

\(m = 1250kg\)

Hence, the mass of the vehicle is 1250kg

True or False? A list can be linear (items are arranged one after the other) or linked (each item has a pointer to the next item in the list).

Answers

Answer:

True

Explanation:

True

Reasoning it’s true because a list can be linear items arranged one after the other one

T/F: Hadoop is not recommended to company with small amount of data but it is highly recommended if this data requires instance analysis.

Answers

False. Hadoop is a distributed computing framework that is designed to handle large volumes of data, typically on the order of terabytes or petabytes.

While Hadoop can be used for smaller data sets, it may not be the most efficient or cost-effective solution for smaller data sizes. Additionally, Hadoop is best suited for processing batch workloads, rather than real-time or interactive analysis. For small amounts of data that require real-time or interactive analysis, other tools or platforms may be more appropriate, such as Apache Spark or a traditional relational database management system (RDBMS).

Learn more about (RDBMS) here:

https://brainly.com/question/31320091

#SPJ11

Choose the correct term to complete the sentence.
AUPs are also known as ______.

email policies

electronic conduct

standard policies

company policies

Answers

Answer:

Explanation:

standard policies

AUPs are also known as company policies. Check more about AUP below.

What is AUP?

This is known to be the acceptable use policy (AUP). This policy pertains to the use of  a document and it tells one the practices that a user must adhere to for one to be  able to access to a network or the Internet.

Conclusively, Note that a lot of businesses and educational facilities do need that employees or students promised or sign a form of acceptable use policy before they are given network ID and thus it is company policy.

Learn more about network from

https://brainly.com/question/3653791

assume you want to install windows server 2016 in your school. what type of installation you choose? and why?

Answers

The type of installation to choose for Windows Server 2016 in a school would depend on the specific needs and requirements of the school. Here are some factors to consider:

Server role: If the server is going to be used for a specific role (e.g., domain controller, file server, web server), it's best to choose the "Server with a GUI" installation option, as it provides a graphical interface that makes it easier to manage the server.

Hardware resources: If the server has limited hardware resources (e.g., less than 2GB of RAM), it's best to choose the "Server Core" installation option, as it provides a smaller footprint and uses fewer resources.

Security: If security is a concern, it's best to choose the "Server Core" installation option, as it provides a smaller attack surface and is less susceptible to security vulnerabilities.

Familiarity with command line: If the IT staff is familiar with command line interfaces and prefers to manage the server via command line, the "Server Core" installation option may be preferred.

Thus, the decision should be based on the specific needs and requirements of the school, taking into account factors such as server role, hardware resources, security, and IT staff familiarity with graphical vs. command line interfaces.

For more details regarding Windows Server, visit:

https://brainly.com/question/30478285

#SPJ1

Differentiate factors that online merchants have to consider by matching each to a description.
This is a standard policy of many financial institutions that online merchants will have to factor into their budget.
This is an issue that can occur with credit card companies when they restrict a merchant’s access to a payment.
This is how customers make their purchase from an online store.

usage charge
hold back
check out

Answers

Factors that online merchants have to consider are:

This is a standard policy of many financial institutions that online merchants will have to factor into their budget. - usage chargeThis issue can occur with credit card companies when they restrict a merchant’s access to the payment. - hold backThis is how customers make their purchases from an online store. - check out.

Who are online merchants?

Customers or distributors are sold, packaged, and shipped by online merchants. They may check their computer for new orders and process payments for merchandise on a daily basis.

They may then purchase a new product and upload an appealing image of it to the online store.

Learn more about online merchants:
https://brainly.com/question/17256369
#SPJ1

Where is a Pivot Table inserted?
a. Next to the last column of data in your worksheet
b. Below the last row of data in your worksheet
c. It depends on whether you select to insert the Pivot Table in the current worksheet or a new worksheet
d. Above the first row of data in your worksheet

Answers

The Create PivotTable dialog box will prompt you to create a Pivot Table on an Existing Worksheet if you insert one on a data-filled worksheet. One of the options in the Create PivotTable dialog box is this one.

Utilized in spreadsheet applications like Excel, OpenOffice.org Calc, and Ggle Sheets is a data summarization tool called a pivot table. Sorting, counting, and totaling data in a table are its primary uses. In order to create a report, you can summarize the data in a variety of ways using a pivot table.

The dialog box for "Create PivotTable":

In Excel, a new pivot table can be created using the dialog box labeled "Create PivotTable."

Learn more about PivotTable at

brainly.com/question/18410166

#SPJ4

What type of scaling is each of these?
horizontal or vertical
adding a server:

adding memory to a server:

Answers

Answer:

Adding a server: Horizontal Adding memory to a server: Vertical

Explanation:

Answer:

adding a server: horizontal

adding memory to a server: vertical

Explanation:

edge 2022

An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 This binary value is then converted to hexadecimal; the hexadecimal value for "A" will be:

Answers

Answer:

The hexadecimal equivalent of the encrypted A is C2

Explanation:

Given

Encrypted binary digit of A = 11000010

Required

Hexadecimal equivalent of the encrypted binary digit.

We start by grouping 11000010 in 4 bits

This is as follows;

1100 0010

The we write down the hexadecimal equivalent of each groupings

1100 is equivalent to 12 in hexadecimal

So, 1100 = 12 = C

0010 is represented by 2 in hexadecimal

So, 0010 = 2

Writing this result together; this gives

1100 0010 = C2

Going through the conversion process;

A is first converted to binary digits by shifting a point to the left

A => 11000010

11000010 is then converted to hexadecimal

11000010 = C2

Conclusively, the hexadecimal equivalent of the encrypted A is C2

In my 4.3 Code practice: Question 1.
Every time I enter an age, it just continues to print **HUG**
What is wrong with my code?

In my 4.3 Code practice: Question 1.Every time I enter an age, it just continues to print **HUG**What

Answers

Answer:

you have the (while) code in whenever it is greater than 0, print hug. if less than, then nothing so flip the inequality thing around again.

Hope this helps plz hit the crown

algorithm and flowchart and c program to display sum of 5 different number​

Answers

The algorithm and flow chart and c program to sum of 5 different number is given below.

Describe C programming?

C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.

One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.

Here's the algorithm to display the sum of 5 different numbers:

Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.

Here's the flowchart for the same:

          Start

             ↓

Initialize sum = 0

             ↓

Prompt user for first number

             ↓

Add first number to sum

             ↓

Prompt user for second number

             ↓

Add second number to sum

             ↓

Prompt user for third number

             ↓

Add third number to sum

             ↓

Prompt user for fourth number

             ↓

Add fourth number to sum

             ↓

Prompt user for fifth number

             ↓

Add fifth number to sum

              ↓

Output sum

               ↓

            End

Here's the C program to display the sum of 5 different numbers:

#include <stdio.h>

int main() {

   int num1, num2, num3, num4, num5, sum;

   printf("Enter the first number: ");

   scanf("%d", &num1);

   printf("Enter the second number: ");

   scanf("%d", &num2);

   printf("Enter the third number: ");

   scanf("%d", &num3);

   printf("Enter the fourth number: ");

   scanf("%d", &num4);

   printf("Enter the fifth number: ");

   scanf("%d", &num5);

   sum = num1 + num2 + num3 + num4 + num5;

   printf("The sum of the numbers is %d\n", sum);

   return 0;

}

This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.

To know more about sum visit:

https://brainly.com/question/13437666

#SPJ9

In a computer instant messaging​ survey, respondents were asked to choose the most fun way to​ flirt, and it found that ​P(D)equals0.660​, where D is directly in person. If someone is randomly​ selected, what does Upper P (Upper D overbar )​represent, and what is its​ value?

Answers

Answer: 0.340

Explanation:

If someone is randomly​ selected, what does Upper P (Upper D overbar )​represent an individual who doesn't flirt directly in person.

Since P(D) = 0.660

Upper P (Upper D overbar )​ will be:

= 1 - 0.660

= 0.340

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:
Reflect on your experience of performing the simulated attacks. What insights did you gain about the attacks and about security from working on these exercises? What are the different types of denial-of-service attacks? How do you detect and respond to these types of events?
The attacks covered in the labs:
4.1.1 Downloading and Installing Wireshark 4.8.1 Configuring Snort 4.8.2 Simulating the DDOS Attack 4.8.3 Confirming the Spoofing Attack in Wireshark 4.8.4 Capturing a Packet Using Wireshark 4.9.1 Performing a Memory-Based Attack 4.9.2 Examining Audited Events 4.10.1 Enabling Logging for Audited Objects

Answers

In the context of computer security, an attack is any malicious attempt to exploit vulnerabilities in a computer system or network, with the goal of stealing data, causing damage, or gaining unauthorized access. Examples include viruses, malware, phishing, and denial-of-service attacks.

During this week’s labs, I gained valuable insights into the world of simulated attacks and security. I learned about different types of attacks, and how they can be detected and responded to. One of the most interesting parts of the lab was simulating a DDOS attack. This exercise allowed me to see how these attacks can overwhelm a server, causing it to crash or become unavailable to legitimate users. Additionally, I learned about memory-based attacks and how they exploit vulnerabilities in software to gain unauthorized access to systems.

There are many different types of denial-of-service attacks, including volumetric attacks, protocol attacks, and application-layer attacks. Volumetric attacks flood a network with traffic, overwhelming servers and other network infrastructure. Protocol attacks exploit vulnerabilities in the network protocol, while application-layer attacks target specific applications or services.

To detect and respond to these types of events, it is important to monitor network traffic and log events. Tools like Wireshark and Snort can be used to capture and analyze network traffic, allowing administrators to identify potential threats. In addition, it is important to have a plan in place to respond to security incidents, including procedures for isolating compromised systems, containing the damage, and restoring services.

Overall, the labs provided a valuable learning experience, allowing me to gain hands-on experience with simulated attacks and develop a deeper understanding of security best practices.

To know more about  attack  visit:

https://brainly.com/question/14298491

#SPJ11

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

This is a subjective question, hence you have to write your answer in the Text-Field given below. hisht74528 77008 Assume you are the Quality Head of a mid-sized IT Services organizati

Answers

As the Quality Head of a mid-sized IT Services organization, your primary responsibility is to ensure the delivery of high-quality services and products to clients.

This involves establishing and implementing quality management systems, monitoring processes, and driving continuous improvement initiatives. Your role includes overseeing quality assurance processes, such as defining quality standards, conducting audits, and implementing corrective actions to address any deviations or non-compliance. You are also responsible for assessing customer satisfaction, gathering feedback, and incorporating customer requirements into the quality management system. Additionally, you play a crucial role in fostering a culture of quality within the organization by promoting awareness, providing training, and encouraging employee engagement in quality initiatives. Collaboration with other departments, such as development, testing, and project management, is essential to ensure quality is embedded throughout the organization's processes and practices.

Learn more about Quality Management Systems here:

https://brainly.com/question/30452330

#SPJ11

Other Questions
Why do many of Europe's countries work together on space projects?Obecause they have a verbal agreement from many years agoObecause they value collaboration from a very young ageObecause they are required to by lawObecause they are too small to take the projects on by themselves Can someone plz help me with this one problem plz plz!!! i need help! i lost my notes Fill in the blanksChoice for number one:divided by,multiples by,added to,subtracted fromChoice for blank number two:6x18=108,6+18=24, 6+12=18,6x3=18Choice for blank number 3:6,24,108,3 2). What is the number of permutations for a 6 digit number using thedigits 0 - 9. if numbers cannot be repeated. Please help first correct answer gets brainliest give two examples of energy transfer by conduction between twoobjects J'adore les pommes et les cerises. J'aimeA. les crales.O B. les fruits.C. les lgumes.O D. la viande. PLS HURRY THIS IS DUE TODAY!!!I WILL GIVE BRAINLIEST!!!!NO LINKS AND NO STEALING POINTS,PLS ANSWER IF YOU KNOW FOR SURE WHAT IT IS!!!THE QUESTION IS IN THE PICTURE ATTACHED! Di runs at a rate of 4 meters per second. Which equation models the situation?d = distance traveledt = time spent running4 = dtd = 4tt = 4dd = 4d What is the image of (3,0) after a dilation by a scale factor of 1/3 centered at theorigin? If the money supply is growing at a rate of percent per year, real gdp (real output) is growing at a rate of percent per year, and velocityloading... is constant, what will the inflation rate be? what is the equation of the blue graph? Which group's beliefs influenced some traditional West Africa religions?A. Agnostics B. AtheistsC. AnabaptistsD. Animists What is the relationship of the following two structures? a. enantiomers b. diastereomers c. constitutional isomers d. identical Can someone solve this quickly is used to establish a mood of sociability rather than to communicate important information or ideas. group of answer choices phatic communication linguistic relativity rhetoric grammar P(x) = x^2-4x+4 ti x =2 help me please I beg youu a ball has a mass of 0.273 kg just before it strikes the earth after being dropped from a building 52.3 m tall. what is its de broglie wavelength?