1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
5

Rest or take a break every __ minutes when typing. Please help!

Computers and Technology
2 answers:
Veronika [31]3 years ago
5 0
Rest or take a break every 90 OR 50 minutes when typing.
Hope this helps. =^p
Talja [164]3 years ago
3 0
Maybe like 3-5 I think im right
You might be interested in
Name two primary goals of quality assurance and control programs:
bulgar [2K]

Answer:

The two main goals are to reach CMM level 5, and when the company can be termed as optimized.

The second goal is to minimize the bugs at the current level as well. And this is important, as improvement is one thing, and ensuring you are correct at the current time is another, and which is essential for survival. And you can think of improvement only if you survive.

Explanation:

The dream of all companies is to become Optimized. And they always try to reach CMM level 5, such that they can serve their clients in the best possible manner. And it is the quality assurance team that keeps an eye on the working of the company and keeps on giving their feedback so that the team can provide better service to the clients in the future, and probably reach the CMMI level 5.

The control program makes the operating system better through the development of an environment in which one can run various other programs. And it, in general, formulates the graphical interface and leverage you to run various programs at one time in various windows. And the control programs are also being known as the operating environment.

5 0
3 years ago
A service specialist from your company calls you from a customer's site. He is attempting to install an upgrade to the software,
IgorLugansk [536]

Answer:

kill 1000

Explanation:

3 0
3 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
Content from online educational tools that is not protected under FERPA includes:
Dmitry [639]

Answer:

b. Any metadata that an online tool produces (for example, data about a student’s usage of a tool, or how much time it took them to take an assessment or look at a video) is not protected if it is not tied to any identifying information.

Explanation:

The content form educational tools that are online that is not protected under FERPA(Family Education Rights and Privacy Act) is any metadata that is produced by the online tool.That metadata can contain data about student's usage of a tool etc.

FERPA governs the access educational information and records by public entities.

4 0
3 years ago
Who are the key players in the internet
Anna007 [38]
Gamers my dude, dank memes are also the internet's finest minds
4 0
3 years ago
Other questions:
  • Print "Censored' if userlnput contains the word "darn, else print userlnput. End with newline. Ex: If userinput is "That darn ca
    11·1 answer
  • which type of classroom enable students to attend lectures without being physically present with the teacher
    14·2 answers
  • 14<br> Select the correct answer.<br> Which activity is a marketing technique?
    9·1 answer
  • Settings to control the amount of notifications is a
    10·2 answers
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • Plssssssssssssss help quick
    8·1 answer
  • A list of sources used for in-text citations that appears at the end of a document is called:
    10·1 answer
  • Define and explain the two different methods by which a file can be compressed. Briefly describe one pro and one con for both ty
    13·1 answer
  • Can someone please help me to point out what's wrong with this C program:
    13·1 answer
  • Diffreciate between primary source of information and secondary source of information​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!