1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
6

What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap

acitors?
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
3 0

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
You might be interested in
Which of the following is used to describe an authentication scenario in which a user logs in using a PIN and a security token
Irina-Kira [14]

Answer:

Two-factor authentication (A form of multi-factor authentication)

Explanation:

Though the question didn't put in the options, there are no two ways about the answer than the following:

When there is a case of using two or more authentication methods to authenticate a user into a system, the scenario is called a multi-factor authentication. In the case where the authentication methods are specifically and expressly given to be two (PIN and security token in this case), it is known as 2-factor or two-factor authentication.

<em>Hope this helps!</em>

5 0
3 years ago
Read 2 more answers
The main devices in a rectifier are:
Oksana_A [137]

A rectifier generally uses diodes.

8 0
3 years ago
Read 2 more answers
Which item is most important for a successful website design?
ahrayia [7]
I believe the answer is keep the target audience in mind
3 0
3 years ago
Read 2 more answers
if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
MrRissso [65]
1. Work on your weaker areas, and adjust how you learn this class material
4 0
2 years ago
Why when i click home on iphone i still at my grandma house
kramer

Answer:i don't know

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • What Is the output of the following: =OR (5 &lt;7, 16*Rand ()&gt;23,FALSE)
    5·1 answer
  • I NEED IT FOR TODAY FOR KEYBOARDING TEST! GIVE ME CORRECT ANSWER PLZ!
    12·2 answers
  • What is one of the benefits of using templates for your email marketing campaigns?
    10·1 answer
  • Question 1 Multiple Choice Worth 5 points)
    10·1 answer
  • What is a scholary or systemic investigation or injury about a subject?
    14·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • I need help ASAP please and thank you!
    6·1 answer
  • Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
    13·2 answers
  • Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Whi
    11·2 answers
  • 11:25
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!