1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
4 years ago
15

Research the disadvantages of the computer and explain them.​

Computers and Technology
1 answer:
lisabon 2012 [21]4 years ago
3 0

Answer:

Too much sitting-affects the back and makes our muscles tight

Carpal tunnel and eye strain-moving your hand from your keyboard to a mouse and typing are all repetitive and can cause injuries

Short attention span and too much multitasking-As you use a computer and the Internet and get immediate answers to your questions and requests, you become accustomed to getting that quick dopamine fix. You can become easily frustrated when something doesn't work or is not answered in a timely matter.

You might be interested in
Norman Bates has a very unusual hobby what is it?
Allushta [10]

Answer:

<h3>Norman only likes to stuff birds, not other animals.</h3>
8 0
4 years ago
Select the correct answer.
Umnica [9.8K]

Answer:

OB. by zooming in on them

hope it helps

7 0
3 years ago
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
nika2105 [10]

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

6 0
3 years ago
18. Which console pioneered the ability for gamers to save their game and resume from that point?
mina [271]
I think it is D
Hope my answer help
Sorry it is wrong
4 0
3 years ago
What term refers to a hacker that uses
miss Akunina [59]

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

5 0
2 years ago
Other questions:
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • You are looking for ways to pay your higher education costs.Which of the following options will require you to pay back any mone
    6·1 answer
  • Which would a student most likely do in a digital laboratory?
    13·2 answers
  • 5. The operating system has two components
    12·2 answers
  • Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?
    12·1 answer
  • Electrical sign connect mainly to​
    8·1 answer
  • Designing a mouse to fit well in your hand would demonstrate ..?
    14·2 answers
  • LaShawn would like to post photos in a social media app, but the program needs to be modified in order to display a greater vari
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!