1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
2 years ago
15

Taking a break is necessary while using your computer or any other gadget. What are ways of having a break? Give five examples

Computers and Technology
2 answers:
BartSMP [9]2 years ago
7 0
I think you could sit down.

Do something you enjoy like playing with a ball.

Relaxing

Play with your friend.

Take a walk.
mina [271]2 years ago
3 0

Answer:

1) is to stretch or do some workouts

2) is to read

3) is to play outside for an hour

4) is to do gardening

5) is rest

You might be interested in
A sequence of repetitive operations performed to evaluate the ability of a PC to operate at peak efficiency for a defined time p
iragen [17]

Answer:

False.

Explanation:

The description provided matches better with Software performance testing, and shouldn't be confused with a benchmark.

In computing, a benchmark is a tool or software designed to measure the average performance of another program, by running several tests and trials against it.

A performance testing is designed to measure the performance and responsiveness of a computer system (not a program) under a heavy workload.

8 0
3 years ago
Viết chương trình hoàn chỉnh các yêu cầu sau:
Blababa [14]

Explanation:

the perimeter of an aluminium sheet is 120 CM if its length is reduced by 10% and its breadth is increased by 20% the perimeter does not change find the measure of the length and the breadth of the sheet

4 0
3 years ago
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
A spreadsheet program of a computerized version of _______
Romashka-Z-Leto [24]

the answer is "Paper-based Accounting"

8 0
3 years ago
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
Other questions:
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • ECG mashine is an example of
    12·1 answer
  • Which fact does lean green eco machines present to show that electric cars are not perfect
    13·2 answers
  • Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses Binary Coded Decimal (base 10
    10·1 answer
  • What is the Role of an algorithm?
    11·1 answer
  • When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choic
    15·1 answer
  • Write a Python function called readlinesmton that accepts the name of the file (i.e. filename), starting line number (i.e. m) an
    7·1 answer
  • How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records,
    6·1 answer
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
  • write an algorithm to settle the following question: a bank account starts out with $10,000. interest is compounded monthly at 6
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!