1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
5

2.

Computers and Technology
1 answer:
Masja [62]3 years ago
6 0

Answer:

is this a question or not?

You might be interested in
Marcus traded in his 10-year-old truck for a new one. Because it is the first new truck he
Tju [1.3M]

Answer:

Car Insurance

Explanation:

Hope this helps! Please let me know if you need more help or think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

7 0
2 years ago
Which type of software is created on user dimension​
Ratling [72]

Answer:

Application and system software is created on user dimension.

6 0
3 years ago
Write in general about ergonomic injuries and also mention the symptoms that computer users exhibit when they experience these s
Tema [17]

Ergonomic injuries are caused by ergonomic risk factors like awkward or sustained postures, strain, contact pressure, exposure to vibration and exposure to heat or cold. Over time, a combination of these factors may lead to injury, pain, and disability. Ergonomic injuries which can directly or indirectly be related to work environment can affect the nerves, tissues, muscles, tendons, and joints. For instance, on average, an employee may spend about 6-8 hours on the computer.

<span>The symptoms that computer users may exhibit when they experience these musculoskeletal disorders include pain in the shoulders, upper or lower back and the neck. Others include discomfort when making certain movements, loss of coordination, general feeling of cramping, weakness of muscle function, and a sharp burning stabbing  pain in the wrists.</span>
3 0
3 years ago
Read 2 more answers
What is the meaning of the concept (atomically)
Aleksandr-060686 [28]

Answer:

Atomically is the term that describes the individuality in the computer field.So, the executing of the instruction in a program refers and the statement being executed in the individual manner.The atomic execution includes that the the instruction cannot be changed.

In programming terms, atomic action makes sure the a particular instruction will be executed in an isolation though the execution of other instruction might be taking place at the same point of time in the program.

4 0
3 years ago
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
Natali5045456 [20]

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

6 0
3 years ago
Other questions:
  • What does the term Gestalt mean?<br> A image<br> B graph<br> C big<br> D part <br> E whole
    11·1 answer
  • Each phase of the system development life cycle is accomplished as a discrete, separate step. (1 point) (Points : 1.5) True
    7·1 answer
  • Make a java program to enter a two-digit integer and determine if both digits are prime
    6·1 answer
  • Tristan has successfully deleted the blank row. The next thing he wants to do is to increase the length of the first column. A 2
    13·2 answers
  • Where is your network strongest? Where is it weakest? How have you developed your network thus far? How has that influenced who
    5·1 answer
  • How can you ensure that your web pages are compliant with a w3c standard?
    9·1 answer
  • The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
    15·1 answer
  • Briefly explain what are JavaScript librairies​
    12·1 answer
  • Which of the following is NOT a safety practice for working near power lines?
    14·1 answer
  • A small company with 100 computers has hired you to install a local area network. All of the users perform functions like email,
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!