1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
4 years ago
13

What are some negative impacts of using a laptop that impact you negatively?

Computers and Technology
2 answers:
Maru [420]4 years ago
8 0

The display also admits rays that are "dangerous to the human eye" and when looking at the screen for to long it can become dangerous. I have a Laptop and personally i spend way to much time on it, but it is very unlikely to get hurt by the types of rays. Which come with all computer screens in general.

Sunny_sXe [5.5K]4 years ago
5 0
You can become too attached to it but not only just laptops but technology as well.
You might be interested in
In the secure development lifecycle, how must the specific security needs of software being developed be defined?- Coding phase
Karo-lina-s [1.5K]

Answer: Requirements phase

Explanation:Requirement phase in the SDL(secure development life-cycle) is the phase where the security is fused with integrity part for any product. This mechanism is done to know about the requirement of the product in the security field. This is done to achieve the completeness in the product and to recover the mistakes that had happened earlier in the product due to security issues.

Other phase given in the option are for making the code, designing the model of product and testing the products aspects respectively.

4 0
3 years ago
a cisc-style instruction set has a large number of high-level instructions that perform highly complex operations in a single st
NikAS [45]

Both desktop and laptop computers employ CISC (complex instruction set computer) CPUs. Small programs are on CISC machines. It requires a lot of time to execute because it contains a great deal of compound instructions.

<h3>What do you mean by CISC?</h3>

Both desktop and laptop computers employ CISC (complex instruction set computer) CPUs. More complex instructions can be processed by this kind of CPU. For instance, a single instruction might load two values, add them, and then store the outcome back in memory.

A computer that, in contrast to a computer with a limited instruction set, allows individual instructions to perform numerous processes and need a large number of cycles to complete (RISC).

Small programs are on CISC machines. It requires a lot of time to execute because it contains a great deal of compound instructions. In this case, a single set of instructions is safeguarded in stages; each instruction set contains more than 300 distinct instructions. On average, instructions take two to ten machine cycles to complete.

To learn more about CISC refer to:

brainly.com/question/13266932

#SPJ4

8 0
2 years ago
Anyone here play sims 4 and know how to help me with his last exception file?
zysi [14]

Answer:

Explanation:

What game is this

3 0
3 years ago
Consider the following classes:
aleksandrvk [35]

Answer:

The answer is toy

Explanation:

I think toy is the odd one out

4 0
3 years ago
What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as
mars1129 [50]

Answer:

C. Cluster analysis

Explanation:

<em>Cluster analysis </em>or clustering is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

This statistical method is used to group similar objects into respective categories by <em>identifying trends and patterns</em>.

Cluster analysis is typically used in the <em>exploratory phase of research </em>when the researcher does not have any per-conceived hypotheses. It is commonly not the only statistical method used, but rather is done in the early stages of a project to help guide the rest of the analysis.

5 0
4 years ago
Other questions:
  • To evaluate trends in the workforce, investigate
    14·1 answer
  • Why do we use modem while<br>accessing the internet or email​
    10·1 answer
  • What folder holds 32-bit programs installed in a 64-bit installation of windows?
    12·1 answer
  • What is the process of getting as many people as possible to visit your website called? A. Maximizing keyword potential B. Direc
    9·2 answers
  • Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data c
    7·1 answer
  • In which step is a metaphor used in planning a multimedia presentation
    15·1 answer
  • Organizations must protect their sensitive information through digital security measures and their _____ through physical securi
    13·2 answers
  • PLZ HELP ME!!
    8·2 answers
  • Consider the following static method.
    9·1 answer
  • How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!