1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serious [3.7K]
2 years ago
15

What does a computer monitor look like when struck really hard?

Computers and Technology
1 answer:
sveticcg [70]2 years ago
5 0

Answer:

physical damage could include broken glass or ink splotches on the display, distorted images, or discoloration

You might be interested in
Because it manages all other software the computer which software is most important
Wewaii [24]

Answer: second option: Operating system...

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language.

Hope this helps... Stay safe and have a Merry Christmas!!!!!!! :D

6 0
3 years ago
Read 2 more answers
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the syste
velikii [3]

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

7 0
3 years ago
When using the camelCase naming convention, the first word of the variable name is written in lowercase and the first characters
Lerok [7]

Answer:

The answer is "True".

Explanation:

CamelCase is an invitation for the name composed of several words, it includes in one word with the first letter of each several words capitalized so, that every word which makes up into the name can be understood quickly, into this tag convention.

  • It provides capitalize on the first letter of each word, which increases the ability to read.
  • It mainly uses programming variables, SOAP, and XML.
3 0
3 years ago
How do you know that clicking on an item in a menu will display a submenu?
BabaBlast [244]
<span>The item is followed by three dots.

Generally, especially inside web browsers (such as chrome, IE, etc), they will have three dots vertically down. This is the menu that will display groups of submenu's (such as history, bookmarks, etc) as well as other tools that can be used.


hope this helps</span>
3 0
3 years ago
Read 2 more answers
Assume you are part of the systems development team at a medium-sized organization. The database will enable sales reps to have
Ivan
This is my answer


2. Presenting to a non-technical manager should be much more high-level, with few if any technical details. The focus should be on how the database design will benefit the business (for example, with faster report generation). Presenting to a technical manager would be focused much more on the technical aspects of the database, with less of a focus on the business benefits of the design.
6 0
3 years ago
Other questions:
  • Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
    7·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • As a member of the accounting group,
    10·1 answer
  • Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
    6·1 answer
  • What is the film format that many filmmakers feel is superior to any other format?
    13·1 answer
  • Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
    12·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • Each of these is a step in cEach of these is a step in conflict resolution: Evaluate solutions suggested. Define the problem. De
    7·1 answer
  • When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
    5·1 answer
  • Tips to identify email scams.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!