1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
2 years ago
12

Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​

Computers and Technology
1 answer:
Ira Lisetskai [31]2 years ago
6 0

The types of issues that is seen are:

  • Electrocution
  • Fire
  • Tripping over wires and others.

<h3>What is the physical safety about?</h3>

There are a lot of of physical safety issues that can come up from using ICT devices.

A fire outbreak can occur if there is an issue with the wiring of the computer system or when there is too much voltage supplied and this is therefore a type of physical safety issues in the computer room.

Note that Electrocution is said to be the death or bad injury that is known to be caused as a result of an electric shock from electric current that tends to pass through the body.

Hence, The types of issues that is seen are:

  • Electrocution
  • Fire
  • Tripping over wires and others.

Learn more about Electrocution from

brainly.com/question/1810934

#SPJ1

You might be interested in
The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering
valentinak56 [21]

Answer:

The following are the explanation for each command, with the SMTP protocol considering only RFC 821.

Explanation:

The key commands of the SMTP protocols which take the RFC 821 into account are as follows:

HELLO -  

A client receives that order to describe himself  

HELP-  

It asks by the receivers to submit the command information as argument  

QUIT -  

It is used to terminate the message.  

-FROM MAIL  

The clients use it to acknowledge the message's sender.  

NOOP -  

The client does not use any procedure to verify the receiver status as required by the receiver's reply form.  

RCPT-  

The user needs it to determine the intended beneficiary.  

SAML-  

It sends or ends the specific mail which is sent to the mailbox or the SAML

RESET-  

The existing email transaction is aborted.  

SEND- The mail to be sent by the recipient's terminal, not its mailbox, is specified.  

TURN-  

It allows the sender to change position and recipients.  

VRFY-  

Verification checks the recipient's address.

 

7 0
3 years ago
While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
Darina [25.2K]

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

4 0
3 years ago
The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the Major
LiRa [457]

Answer:

apply a filter by age with a value more than 20

Explanation:

First, we must create the spreadsheet with the fields student, age, grade level, major and minor.

For example:

If we want to create a filter, we must mark headings with the left click, then we must go to the tab Home --> at the section Editing, click in Sort & filter then Filter.

We must click in the field Age --> number filters --> greater than 20.

8 0
4 years ago
Which of the following is not a good technique for photographing groups? Visiting the location.
algol13
I think it's wait until you get started to decide on the props and camera settings...
4 0
3 years ago
When comparing alternative methods for making information systems identification and selection decisions, top management's selec
Softa [21]

Answer: b) False

Explanation:

Alternative method that is used for information system consisting of prototyping, outsourcing, end-user development mechanism, system life cycle etc for building a system.

  • These process consist of focusing on user requirement, using high level programming languages, development of prototype,creation of package, database etc instead of cross-sectional phase,selection decisions,top management option etc.
  • Therefore, the correct option is option(b) as the statement is false.
3 0
4 years ago
Other questions:
  • The _____ command icon looks like a small clipboard with a page attached.
    6·1 answer
  • Examples of algorithm
    5·1 answer
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the docum
    9·1 answer
  • The nl2br() function can be used to convert new line entries in a text area into html ________________ tags.
    13·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads
    8·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • Which of the following statements about recommendation engines is TRUE?A: An online recommendation engine is a set of algorithms
    10·1 answer
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!