1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
15

Consider the following scenario and prescribe a solution. Situation: Tenisha is moving to Ohio to attend college. It is very hum

id there in the spring and summer, and lightning storms are frequent. What can Tenisha do to protect her laptop while she is at school?
Computers and Technology
1 answer:
xz_007 [3.2K]3 years ago
3 0

Answer:

Unplug the computer during a lightning storm

Explanation:

If there is a lightning storm you should always unplug your laptop or laptop or computer. If the lightning hits your computer you fried it and you can't use it anymore, but, if you unplug it it will save it from getting it fried. Always unplug your your computer during a lightning storm!

Hope it helps! :D

Have a great day! :)

You might be interested in
What is used to configure data sources for applications that require access to a database?
Radda [10]
A network is used to configure data sources for applications that require access to a database?
6 0
3 years ago
Which heading function is the biggest?<br> 1. h1<br> 2. h2<br> 3. h3
sattari [20]

Answer:

h3

Explanation:

sub to Thicc Panda on YT

6 0
3 years ago
Read 2 more answers
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
2 years ago
Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely tru
madreJ [45]

Answer:

D. The image will require fewer bits in order to be represented.

Explanation:

Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

5 0
2 years ago
A technician needs to configure wireless Internet access in an open warehouse environment. After installing the equipment, the t
ValentinkaMS [17]

Answer:

Change the antenna placement.

Explanation:

At times, varying signal strengths can be as a result of wrong antenna position. However, this can be addressed by changing the position of the antenna.

4 0
3 years ago
Other questions:
  • Which social networking function came first?
    9·2 answers
  • 1) If a client requests timestamping every two minutes, how would it look? a) [00:02:00] b) [00:06:00] c) (00:04:00)
    15·2 answers
  • Naruto Uzumaki who likes naruto ??? who waches it??
    14·2 answers
  • The Mail Merge option is located in which tab? a;home b;insert c;refernces d;mailings
    11·2 answers
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • When assigned to a cell, the __________ function returns a number that corresponds to the system date and time beginning with De
    12·1 answer
  • What is responsible for recording an image of an object with camera <br> Pls I neeed it right know
    8·1 answer
  • He should identify his various
    6·1 answer
  • When creating a report,you can mske groups and subgroups by?​
    5·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!