1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
10

Which of the following is an example of a problem that could be attributed to poor ergonomics?

Computers and Technology
1 answer:
Alenkasestr [34]3 years ago
4 0

I would say B because Carpal tunnel syndrome is caused by repetitive flexing and extending of tendons (it gets worse if it's for a long time) pressure on the median nerve can cause pain numbness and weakness in the hand and wrist. So this is the best answer as it shows there is a poor working environment it would be better if there was something as simple as a mouse pad that the wrist could lay on while using the mouse for example or using padding on the desk could improve the working environment and prevent this.

You might be interested in
In order to get a great sports photograph, you need to do what?
Alik [6]
The answer is Anticipate the action.  <span>In order to get a great sports photograph, you need to anticipate the action.  </span><span>A big part of </span>sports photography<span> is </span>anticipating action.  <span>The photographer will be able to anticipate the action so that the camera will be pointed in the right direction to capture the decisive moments on film</span>
8 0
4 years ago
Read 2 more answers
Which sequence best describes the evolution of computers?
SVETLANKA909090 [29]

Answer:

d. Mainframes came before minicomputers, which led to the development of microcomputers.

Explanation:

The first <em>mainframe</em> was introduced in 1951: The UNIVAC (UNIVersal Automatic Computer I): large computer systems, for general purpose, with hundreds of users (separated from the computer) and fast computations, typically deployed by large business, industry, and government organizations.

The <em>minicomputers</em> are another class of computers that start to evolve since the late of the 1950s and the beginning of 1960s (like LINC, PDP-1, among many others), and focused on to have a more direct contact with the user or programmer, and because of this, it is said that minicomputers were the first 'personal' computers. They were cheaper than mainframes and with less memory capacity.

Finally, the <em>microcomputers</em> appeared around the beginning of 1970s (Micral), and sometime later (Altair 8800,  Apple II) and were firstly used by hobbyists and computers enthusiasts. The term microcomputers have been supplanted nowadays by 'personal computers'.

 

7 0
3 years ago
How is a worm different from a Trojan?
olga_2 [115]

Answer:

C. A worm spread through a network, whereas a trojan hides inside another program.

Explanation:

Worms spread through computer networks, a great example of a popular computer worm that struck the world is the "ILOVEYOU" / "Love Letter for You" worm. The malware infected over ten million personal computers and was spread via the user's email and sent to all addresses in the user's address book.

A trojan virus is essentially a piece of malicious software that looks legitimate from the outside but in under the seal it's highly malicious and destructive; hence how it got it's name "Trojan Horse" which is a reference to an Ancient Greek story of deception.

8 0
3 years ago
Who is better Michealangelo the ninja turtle or Speed Slaver the car This is part of a survey that I need for work.
Pie

Answer:

Michealangelo

Explanation:

Such a classic who can argue

7 0
4 years ago
Read 2 more answers
Please help me with Question number 3. Please!!!
ohaa [14]

Answer:

you’re screen on my end is blank?

4 0
3 years ago
Other questions:
  • A network TAP serves what purpose on a network?
    7·1 answer
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • A public key is part of what security measure?
    7·1 answer
  • The early success of Microsoft was cemented by the release of which software product:
    12·1 answer
  • Which phrase refers to the collection of geospatial data through the use of satellite images/pictures?
    13·1 answer
  • What laws are broken when you hack someone?
    9·1 answer
  • Create the logic for a game that simulates rolling two dice by generating two random numbers between 1 and 6 inclusive. The play
    7·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • 2. What are the 3 Alternative software programs that can be used if you don’t have the Microsoft Office programs?
    8·2 answers
  • Help asap please!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!