1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
10

One of the most toxic components of a computer is the _________.a. plastic in the keyboardb. silicon in the glass of the compute

rc. lead embedded in the glass of the monitord. copper in the wires of the cords
Computers and Technology
2 answers:
gayaneshka [121]3 years ago
8 0

Answer:

c. lead embedded in the glass of the monitor

Explanation:

Lead is asubstance that stop electromagnetic wave at a certain diameter, so in computer systems, it is used in the monitor screen of a CRT or cathode-ray tube monitor to prevent such radiation from reaching the users.

Lead poisoning occurs when lead comes in contact with the blood, which can cause vomiting, respiratory and nervous system complications and death in worse cases.

Burka [1]3 years ago
3 0

Answer:

C. Lead embedded in the glass of the monitor.

Explanation:

Cathode Ray Tube (CRT) monitors have lead embedded in their glass. Exposure to small quantities of lead can lead to lead poisoning. There are about 2.2 kilograms of lead in a big CRT monitor.

This amount of lead is mixed with the glass to improve the optical quality and to stop radiation from affecting the user.

Exposure to lead can cause the following:

  1. Constipation.
  2. Irritability,
  3. Headaches
  4. Aggressive behavior and so much more.
You might be interested in
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
_____ consists of the instructions that direct the operation of the computer system and enable users to perform specific tasks,
kaheart [24]

Answer:

Software

Explanation:

6 0
3 years ago
Which part of the cryosphere comes directly from the atmosphere?
marin [14]
The answer to this question is C.
4 0
3 years ago
Read 2 more answers
An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
ValentinkaMS [17]

Answer: Style inheritance

Explanation:

Style inheritance is used to design style sheets. It is a process in which properties are inherited by children from a parent element. For example you wish that all text on a page use same font color i.e. red. You can apply they following style for <body> tag like {body color:red;}. All the elements in the web page will inherit this font color. This is better to use than to create styles for each tag. Every heading and paragraph will be displayed in this font color until you define different color for particular element.

3 0
3 years ago
4. The NIMS Management Characteristic of Chain of Command and Unity of Command means that each person: A. Continues to report di
Kipish [7]

Answer:

The answer is "Option C"

Explanation:

This system facilitates the establishment by state, Municipality, Militaristic, Provincial and local governments of a detailed, national framework for disaster response. This command structure of each person refers to only a single ICS boss because of NIMS management, and the wrong option can be defined as follows:

  • In option A, The Continuous report describes your daily details.
  • In option B, These reports are not in one ICS supervisor.
  • In option D, It can not assign different competences.
8 0
3 years ago
Other questions:
  • What is the difference between www vs internet in information technology?
    13·1 answer
  • Select the best answer for the question. 19. While broadcasting a football game, the announcer exclaimed, "I can't believe it. C
    7·2 answers
  • What element of a timeline helps to mark progress of the project?
    15·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • At the frequency of 2.4 GHz what is the free-space path loss in dB.
    9·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • What do you do when your computer shuts down
    15·2 answers
  • Cuantos MB son 8,192 kb?​
    13·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!