cual es la diferencia entre tala y poda

Answers

Answer 1

Answer:

talar es talar árboles

y podar podar sesped


Related Questions

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

What is an FPS? Describe the acronym as it applies to video games and explain two games popular in the 2000s that flourished in this game category.

Answers

1. Short for frames per second, fps is a measure of how many full screen, still images are captured or displayed in one second of video recording/playback or video game play.

Define cyber law with its area ​

Answers

Answer:

Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements

Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

What is monitor ?why it is necessary for computer system ?​

Answers

Answer:

Monitor is an output device that displays information in pictorial or text form. A monitor usually comprises a visual display, some circuitry, a casing, and a power supply.

 It is important as it allows for proactive response, data security and data gathering and the overall good health of a computer system.

what is draft pls help me​

Answers

Answer:

draft like as a rough draft it pretty much a set were you can play and the do the real thing

Drafting refers to actually writing the words of the paper. As part of the writing process, you will write multiple drafts of your paper. Each rough draft improves upon the previous one. The final draft is simply the last draft that you submit.

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

What kind is a utility file that shrinks the size of a file

Answers

Answer: Compression

Explanation:

In what way can the data be visualized to get the answer that is required?

Answers

Answer:

Data visualization is the graphical representation of information and data. By using visual elements like charts, graphs, and maps, data visualization tools provide an accessible way to see and understand trends, outliers, and patterns in data.

In the world of Big Data, data visualization tools and technologies are essential to analyze massive amounts of information and make data-driven decisions.

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

in database systems, a table is also known as a _____.

Answers

Answer:

a relation

Explanation:

In database systems, a table is also known as a file.

What do you mean by database systems?

A database is a structured collection of data that is stored and retrieved electronically in computing. Small databases can be kept on a file system, whereas large databases are kept on computer clusters or in the cloud. Database design encompasses both formal techniques and practical factors, such as data modelling, efficient data representation and storage, query languages, sensitive data protection and privacy, and distributed computing issues such as concurrent access and fault tolerance. To gather and analyse data, a database management system (DBMS) is the software that communicates with the end users, applications, as well as the database itself.

One of the various types of the system object type *FILE is a database file. A database file provides specifications of how input data from internal storage is to be presented to a programme and how output data from a programme is to be presented to internal storage.

To learn more about database systems
https://brainly.com/question/28481695

#SPJ2

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity

Answers

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

Helppppppp pleaseeeewweeweee

Answers

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets

URGENT We use HTML5 in lightweight web pages which load faster and put less strain on web servers.

A. True
B. False

Answers

Answer:

A. true i think?

Explanation:

im not sure but i hope it help

NEED HELP ASAP!!

Given that myGrade = 65, consider the conditional operator (myGrade<=65) ? myGrade+10: myGrade=myGrade+5. What is the value of myGrade after the conditional operator executes?

Answers

Answer:

75 is the answer and marke me as brainleast

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

This question is worth 15points

Why do you think that computer programs use different data types? Wouldn't it be simpler if they treated all data the same? Why or why not?
What would happen if, for instance, a date were treated like an integer? Please answer all of the questions.

Answers

Answer:

The data type defines wich operations can safely be performed to create, transform and use the variable in another computation.

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

We have,

Computer programs use different data types for a variety of reasons:

- Efficiency:

Different data types allow programs to allocate memory and perform operations more efficiently.

- Precision:

Different data types have different levels of precision. For example, using floating-point numbers allows for decimal values but might introduce rounding errors, while integers are exact but can't represent fractions.

- Semantics:

Different data types convey meaning and help programmers and the compiler understand how the data should be used.

- Operations:

Different data types support different operations. For instance, you can't perform arithmetic operations on text strings as easily as you can on numbers.

- Type Safety:

Using distinct data types helps catch errors early in the development process. If you accidentally treat a string as an integer or vice versa, type systems can catch such errors during compilation.

If a date were treated like an integer:

- Loss of Semantics:

Treating a date as an integer would strip away its meaning. Dates have attributes like day, month, and year, which would be lost if they were treated as integers.

- Limited Operations:

Integers can't directly perform operations related to date manipulation, such as finding the difference between two dates or determining the day of the week for a given date.

- Error-Prone:

Treating dates as integers would likely lead to confusion and errors. It would be easy to make mistakes when handling date-related calculations and comparisons.

- Lack of Flexibility:

Dates have a complex structure, including leap years, varying month lengths, and time zones. Treating them as integers wouldn't allow for representing these complexities.

Thus,

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

Learn more about computer programs here:

https://brainly.com/question/33841076

#SPJ3

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

What steps can be used to run the Accessibility Checker? 1 Click the tab. 2. Go to the group. 3. Click and then Check Accessibility. 4. The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities.

Answers

Answer:

file, info, check for issues.:)

Explanation:

The Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.

What is accessibility checker?

Your work is compared to a set of standards by the accessibility checker, which highlights any potential issues for users with impairments. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is. Making sure that the content you publish is accessible to users is the essence of accessibility.

Choosing File > Info. Choose "Check for Issues" Look into accessibility. Choose a problem from the Inspection Results. Review the How to Fix in the Additional Information, then edit your document as necessary. The Accessibility Checker categorizes each issue as an error, warning, or advice depending on how serious it is.

Thus, the Accessibility Checker will then review the file and notify you of anything that is unclear or inaccessible for users with disabilities. Hence option 4 is correct.

To learn more about accessibility checker, refer to the link below:

https://brainly.com/question/30012324

#SPJ5

1. What are the electronic hand tools presented in the video? 2. How many cleaning materials where used to maintain the tools? 3. Enumerate the steps in maintaining the hand tools presented in the video clip.

Answers

I don't think you can answer the question without a video

What security feature on a smartphone prevents the device from being used until a passcode is entered?

Answers

Answer:

Lock Screen

Explanation:

The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer:

cyber security I think that is what it is

Explanation:

m

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.

Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on data?

Answers

Answer:

data-driven decision

Explanation:

While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!

why is it necessary to have a w-2 or 1099 form when using tax preparation software?

Answers

The reason why it is necessary to have a w-2 or 1099 form when using tax preparation software is to:

Allow the software engineer to report his income

According to the given question, we are asked to show the reason why it is necessary to have a W-2 or 1099 form when a software engineer is preparing software.

As a result of this, we can see that these two forms are both used by the Internal Revenue Service so that individuals such as the software engineer can report their income and make their tax payments.

Read more here:

https://brainly.com/question/24749083

A backup utility can ensure that data is not lost if your computer or disk drive
fails. *
True or false

Answers

false




have a good day

Which career path involves working directly with computer networks?

Answers

The career path involves working directly with computer networks are analyst, network manager, and data analyst.

What are Networking?

Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.

Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.

Read more about the networking :

https://brainly.com/question/1027666

#SPJ1

Answer: Computer systems administrator

Explanation:

define the term software with example​

Answers

Answer:

A software or computer software essentially a type of programs which enable the users to perform some particular specific task or actually used to operate their computer. It essentially directs all of the peripheral devices on the entire computer system- what exactly to do and how exactly to perform a task. A software plays a key role of a mediator between the user and the computer hardware. In the absence of software, a user essentially can’t perform any task on a computer. A software product development company is the one which develops software for the users.

Explanation:

hope it will helpful for you

In computing we generally have two parts, the Hardware which we can feel and touch and the Software which are a set or collection of instructions or commands the computer can understand and executes, We cannot touch it

Examples of softwares are

Excel WindowsiTunesMs Word

Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.

In summary we use programming Languages to write software programme for the computer to execute.

Learn more about softwares :

https://brainly.com/question/1538272

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

Answers

Answer:

In the context of data-flow diagrams (DFDs), a(n) entity symbol shows either the source or destination of the data

Explanation:

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

Other Questions
At what point on a heating curve graph does a phase change occur?at each plateauat the first plateauat each slopeat the last slope The effect of pH on a certain enzyme is shown in the graph. At what pH would the enzyme be most effective? Help plzzz is my last chance Which use of pacing best creates a feeling of stress? A. Ring, ring. Answer the phone. Stuff the envelopes. She clutched her temples B. Few days were as exhausting as Mondays, and this Monday was no exception C. As if the traffic jam on the way to work weren't enough, now she was late. D. All day her boss made outrageous demands that left her feeling nervous. SUBMIT 2 SOUS Question involving derivatives and limits...What is the limit as x approaches 2 of (3 f(x) - 15) / (x-2)... where f(2) is 5. The answer is not 0, I checked.the derivative f'(2) is 1/8 in case that's neededit can be either 3/8, , 3.545, or 3/2 how will you know if the vital signs are within normal? Cuanto es 1/3 + 5/8 + 1/2 Plzzzz help meeeeeeee What are the three general classes of neurons that correspond to the three major aspects of nervous system function HELP ME ASAP i could rly use it who my fav celeb who ever can guess it close to the name gets brainest Lee el prrafo, poniendo atencin a las palabras en negrita. Identifica el verbo que est en la forma incorrecta y despus escoge la opcin con la forma correcta. Read the paragraph paying attention to the verbs in bold type. Identify the incorrect verb and then choose the option that has the correct form.Ahora no tengo tecnologa adecuada, pero en cuanto lleg la televisin 3D, invito a mis amistades a jugar videojuegos. Ser bien divertido usar este aparato con realidad virtual!Group of answer choicesSealleguetengainvite What is the equation of the line shown in this graph? Can someone help me? you could give away 70 coffee mugs without charging anything.If you charge $10.00, nobody will buy the coffee mugs. You also figured out that your sales will be decreasingfollowing straight line. Your job is to find the maximum possible revenue from selling the coffee mugs.Answer the following questions:1. Graph the linear relationship between the price of coffee mugs p, and the number of coffee mugs sold S.Hint: To give away 70 coffee mugs means when the price p=0, S(0) = 70. Plot that point on the graph. Find onemore point using the other given condition. Keep in mind S(p) is a linear function. Be careful what will berepresented on the x-axis, and what will be represented on the y-axis.2. Find the equation of the linear function S(p) that describes the quantity sold as a function of the price p.3. The revenue is determined by R = Sp. Express the revenue as a function of the price p.Help: You may look at the examples from the power point for section 2.64. Graph the revenue function. Make sure to label the x - and the y - axis with the appropriate units.5. At which price per coffee mug do you not make any money?6. Find the price per coffee mug that makes the most revenue.7. How many coffee mugs must be sold to maximize the revenue?8. What is the maximum revenue?9. What price per coffee mug you should charge to collect at least $70 in revenue?Your project will be graded based on the following:1. Turned in a hard copy, and an electronic version as a PDF file on Blackboard on time (due date Dec 7or before ) (5pts. deduction per day)2. Completeness (no missing part, show all of your work, calculations, formulas used etc.3. Precision ( correct answers )4. Complete graphthe graph has a titlethe axes are labeled ( make sure you have included the units of measurement)- what action should a member take if it is believed that an opsec disclosure has occurred? Read the poem "Nothing Gold Can Stay" by Robert Frost.Nature's first green is gold,Her hardest hue to hold.Her early leaf's a flower;But only so an hour.Then leaf subsides to leaf.So Eden sank to grief,So dawn goes down to day.Nothing gold can stay.Which word best matches the meaning of the word "gold" in line 1? A. Greedy B. Rare C. Valuable D. Yellow The show gave a 10% discount for students. The full ticket price is $30. How much was the students price? In order to anticipate demand, advertising and promotions must be coordinated with the departments that control inventory. store managers. human resource departments. fulfillment centers. customers. The force the Earth exerts on the sun is equal in magnitude to theforce the sun exerts on the Earth.O Trueo False What is an example of a microorganism acting in a harmful way? Question 6 options: Bacteria infecting a cut. Bacteria aiding in digestion. Bacteria used to create yogurt. Fungi decomposing waste in a septic tank.