1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
14

1. Before operating any power tool, you need to

Computers and Technology
1 answer:
Anna007 [38]3 years ago
7 0

Answer:

where glasses gloves turn on the power tool

Explanation:

You might be interested in
Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
Tomtit [17]

Answer:

a. can use a hosting service to set up the site

Explanation:

Since the retailer has no knowledge on how to code and create a website and online presence for his business, he should consult a hosting service. The service will be able to communicate with the retailer and find out what his wishes are for his online presence. They will be able to create a webpage, social media accounts, and they can advertise the retailer's business.

8 0
3 years ago
What are some programs that you have used that have condition-controlled loops and count-controlled loops?
gladu [14]

Some programs that we have used that have condition-controlled loops and count-controlled loops due to the following reasons.

Explanation:

Condition-controlled loops

A program could be made more intelligent by programming it to avoid hazards. For example, if the robot vehicle is 3 cm from the edge of the table and you tell it to move forwards 5 cm, it will drive off the edge of the table. To stop this from happening, you might write a condition-controlled loop like this:

move forward

repeat until (touching table edge)  

Condition-controlled loops can be used to add a high degree of intelligence to a computer system.

Count Controlled Loops

A count controlled loop is a repetition  structure that iterates a specific number of  times

You can write a count controlled loop using a

while() loop.

For example:

counter = 0

while counter < 5:

print (“This will print 5

times”)

counter += 1

8 0
3 years ago
Ted has $55.00 in his pocket. Which purchase will he be able to pay for with cash?
Alex73 [517]
You just need a little bit of math to solve this. Add up the items and see which one would be equal to $55.00 or less. 

A = $59.90 so this is not the answer
B = $60.94 so this is not the answer
C = $55.99 so this is not the answer

D = $50.97 

D is the correct answer.
3 0
3 years ago
Read 2 more answers
A bulb has a resistance of 15Ω and is rated at 3A. What is the maximum voltage that can be applied across the bulb?
Anastasy [175]

Answer:Wheres the option choice??????????????????????

Explanation:

7 0
2 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
Other questions:
  • Heatsinks used to protect cpus in computers from overheating, are shaped so that their surface area is very large. why is that?
    5·1 answer
  • What type of restrictions may be placed on your license?
    7·1 answer
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • rob just got a new idea for the movie he's making, and he wants to put in late hours to get it done. Which of the following stat
    10·1 answer
  • The feature present in most GUIs that helps organize multiple documents or files is _____.
    5·1 answer
  • If two egg cells are fertilized what will happen?
    10·1 answer
  • What is the cell reference for row 22 and column B? __________<br><br> In excel
    5·1 answer
  • Create a program that calculates the tip and total for a meal at a restaurant. Type the code into an IDLE IDE editor window and
    5·1 answer
  • Question is in photo
    11·1 answer
  • Example of language processor software
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!