What are five don’ts of using a computer

Answers

Answer 1

Answer:

Do not eat or drink near technology

Do not open unexpected or unknown email attachments

Do not install unknown programs

Do not forget about updating apps

Do not force anything closed

Do not get it dirty or wet

Do not wash your computer

Do not punch your computer


Related Questions


Who plays a role in the financial activities of a company?

Answers

The chief financial officer

Raina remembered when she taught Amara to draw. What happened?

Answers

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

- BRAINLIEST answerer

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

Difference between web browser and search engine.​

Answers

Answer:

A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.

Explanation:

is invalid in the select list because it is not contained in either an aggregate function or the group by clause.

Answers

Answer:

Column

Explanation:

how are digital computer classified on different types​

Answers

Answer: we can sub-categorize digital computers as General Purpose Computer & Special Purpose Computer.

Michelle wants to define the scope of a software development project for the benefit of her company. How does defining the scope of a

software development project help a company?


A It helps communicate effectively with the client

B. It helps deliver a project as per the client's requirements.

C It helps prepare a legal agreement

D. It helps decide the project budget

Answers

Answer:

im pretty sure its A

Explanation:

it makes more sense

Answer:

It helps deliver a project as per the client’s requirements.

Trust me... I took the test

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

True or false: The Internet and the World Wide Web are not synonymous. The WWW is just one part of the Internet, and its primary use is to correlate and disseminate information. The Internet includes the WWW and also other forms of communication systems such as email.

Answers

True or false: The Internet and the World Wide Web are not synonymous. The WWW is just one part of the Internet, and its primary use is to correlate and disseminate information. The Internet includes the WWW and also other forms of communication systems such as email.

Answer : True

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

a virtual network of websites connected by hyperlinks is called

Answers

Answer:

it is called the World wide Web

How do you create a website​

Answers

Well, you would need a website builder program. Such as WordPress, Web.com, Gator Builder, and dozens of more. After you have the base and the look, depending on the program you would need to do some scripting.

Scripting may sound easy but depending on the language it takes some time to learn.

Or you could hire someone, you know that works too

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Answers

Answer:

The term spyware refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends

Answers

Answer:

G00GLE Photos? I'm not sure what you mean.

Explanation:

Search engine Photos is the type of website would allow Evan, an avid traveller, to share photos and videos with his friends.

What is meant by website?

A website, often referred to as a web site, is a compilation of web pages and related content that is uploaded to at least one web server and given a common domain name. A group of World Wide Web pages that are often available online and connected to one another by a person, company, higher education institution, government, or other organization.

The primary objective of certain websites is to only present, disseminate, or display certain data or content online.

A website is a collection of connected web pages with a common domain name. The website can be made by anyone, including individuals, groups, and businesses. All websites are a part of the World Wide Web.

Thus, it is Search engine Photos.

For more details about website, click here:

https://brainly.com/question/19459381

#SPJ2

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.

Answers

Answer:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

# num 2 #

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

# num 3 #

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

# num 4 #

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

# num 5 #

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

# num 6 #

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

Explanation:

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

See more about python at brainly.com/question/13437928

State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient

Answers

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

External fragmentation may need a lot of compaction and it is an expensive operation.

The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

https://brainly.com/question/23636593

what are overlapping geographical areas within a cellular network called?

Answers

Overlapping geographical areas within a cellular network is called cells

Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like

Answers

It uses network usage monitoring software to know the level of traffic on that local network.

We can arrive at this answer because:

Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.

To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.

More information:

https://brainly.com/question/8118353

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

When using ________ access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

Answers

When using sequential access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

CODEHS 3.5.4 Obi-Wan Says



You should ask the user for three pieces of information

You should confirm their name and how many droids and Wookiees they want to meet

You should confirm their name and how many droids and Wookiees they want to meet

Answers

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

# prompts user of name

num_droid = int(input('number of droids : '))

#prompts for number of droids

num_wooks = int(input('number of wookiees : '))

#prompts for number of wookiees

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

#displays the information as a complete sentence

A sample run of the program is attached

Learn more : https://brainly.com/question/25506437

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

What is Acronyms in Design and Technology?

Answers

Answer:

In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.Students also take into account the ethical, legal, aesthetic and functional factors that inform the design processes.

Explanation:

Hope its help

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406

Other Questions
4) 4+ 1 =a) 5b) 57212c) 51d) 572612 When a child is more than two standard deviations underweight for his or her age, the child is suffering from a condition called _____. which amendment gave citizenship to all people born in the u.s.? Yuri computes the mean and standard deviation for the sample data set 12, 14, 9, and 21. He finds the mean is 14. His steps for finding the standard deviation are below. S = StartRoot StartFraction (12 minus 14) squared (14 minus 14) squared (9 minus 14) squared (21 minus 14) squared Over 4 EndFraction EndRoot. = StartRoot StartFraction negative 2 squared 0 squared negative 5 squared 7 squared Over 4 EndFraction EndRoot. = StartRoot StartFraction 4 0 25 49 Over 4 EndFraction EndRoot. = StartRoot StartFraction 78 Over 4 EndFraction EndRoot. = StartRoot 19. 5 EndRoot. What is the first error he made in computing the standard deviation? Yuri failed to find the difference between each data point and the mean. Yuri divided by n instead of n -1. Yuri did not subtract 9 - 14 correctly. Yuri failed to square -2 correctly. Hi! Unusual question but many points are offered! Can someone give me a brief essay about the history of Dream Smp? It's not for me but I really do need this. No links or anything like that to cheat points. Thank you! Reeses sister earns $15 per hour. The store offers her a raise - a 6% increase per hour after a raise how much will Reese sister make per hour How might the meaning of this sentence apply to Charlies life in ""Flowers for Algernon?"" help and maybe explain how to solve I just want to double check if I did this right Write an expression.1 a. 49 divided by the difference of x and 2 simplify 2 by 3 multiply by 2 plus 3 1 by 3 When reactants are not used to make new substances, are they destroyed? how are yams processed to prepare them for shipping and purchasing by a consumer In Canada, just as in the United States, voting in an election is considered A. an illegal actB. a civic responsibilityC. a requirement by lawD. an act of civil disobedience Part BBased on the information in the article, how could plants be used in the future to help counteract some humanemissions? Function or not functional? Pls help tyyy Which answer choice best explains how the bolded participle is used in this sentence?The battered wall of the castle still stood after the battle.a It is used as an adjective to describe the noun wall.b It is used as a noun and serves as the subject of the sentence.c It is used as an adverb to describe the verb stood. d It is used as a verb to describe the main action of the sentence. When the pigeon calls the crow a a tufted crane he is? A farm tractor starting from the rest attains a speed of 36000 m/s after covering a distance of 2000 m. Work out the magnitude of the net force the tractor weighs 5000 kg. und Economics (2020)19.2.2 Quiz: Types of Economic SystemsQuestion 1 of 10An economy that gives private businesses and individuals freedom to makeeconomic decisions is aA. mixed economyO B. traditional economyO C. market economyD. command economySUBMIT