1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
6

When using correct ergonomic technique be sure to

Computers and Technology
2 answers:
AysviL [449]3 years ago
8 0
K<span>eep your arms comfortable at your side forming a 90° angle with your upper arms.</span>
irinina [24]3 years ago
7 0

you must relax yourself and make sure your hands are in the right position or you'll get bad cramps in your wrists, and never look down at the keyboard and never type hard on the keyboard it will break.

You might be interested in
Describe encryption at gateways in thePresentation layer of the OSI Reference Model
puteri [66]

Answer:  

In the presentation layer of the OSI reference model provides a variety of coding and functions that can be applied in application layer data. Information send by the application layer are ensured by these functions. As, presentation layer is the important layer in the OSI reference model because it is responsible for important services like  data compression, data conversion, decryption and encryption.

Encryption at gateway is defined as, when the important data is first encrypted using protocol and then it is transferred in the network. And gateway re-director operates in the presentation layer.

4 0
2 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
This whole page needs to be done please help?
ira [324]

Answer:

F, T, F

C. A. C. D. B

that is just it

brainliest please ;)

6 0
3 years ago
How to boost audio live ​
Masteriza [31]
Huh


Hzhanajsjjajajans
6 0
3 years ago
How do films use camera shots?
lorasvet [3.4K]
These advanced camera shots, or angles, are used in film to convey an effect or emotion rather than exemplify a sense of space. Before filming, cinematographers will write out their shot list in order to plan how each scene of their film should be shot
7 0
2 years ago
Read 2 more answers
Other questions:
  • An organization's contact information includes its _____.
    9·2 answers
  • If you can log nto a website to add, edit, or delete content that has been added by you or another user , you are most likley us
    8·1 answer
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but doe
    10·1 answer
  • The icon below represents the ____________.
    8·1 answer
  • Question 4 (Multiple Choice Worth 5 points)
    6·1 answer
  • . In this project, how many times will the [Drive] block be repeated?
    15·1 answer
  • How are 1gls different from 2gls​
    10·1 answer
  • Fun with Characters
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!