1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
6

What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap

acitors?
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
3 0

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
You might be interested in
What type of software is developed by volunteers, contains code in the public domain, and helped to make Linux popular
valentina_108 [34]
Perhaps I’m being 5tup1d but I think your describing open source soft in general. Linux and a lot of periphery that runs on Linux is open source so it did play a large role being that it’s not proprietary like Windows and windows adjacent soft.
5 0
2 years ago
A keyboard, mouse, and microphone are examples of ________.
kykrilka [37]

Answer:

A keyboard, mouse, and microphone all are examples of <u>peripheral devices.</u>

Explanation:

hope this helps

5 0
2 years ago
Read 2 more answers
How to get fast frontend development online job as a beginner?​
mezya [45]

Answer:

hmmm well what is your magager?? every job will ask you what you can do.

3 0
3 years ago
Rachel wants to make sure that she uses effective communication skills at work. Which of the following is an example of somethin
BartSMP [9]

dont use slang or words like lol

5 0
3 years ago
Read 2 more answers
The field of informatics helps bring the right information to healthcare teams and patients at the right time which may improve
zalisa [80]

Answer:

True

Explanation:

The word informatics is derived from the French word Informatique and it describes the science of using  information & communication technology (ICT),  to communicate, for the management of knowledge, prevention of errors and supporting of decision making. The application of effective informatics to health care delivery will definately lead to better results.

6 0
3 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • Formatting. Given input that represents a floating point number, that is, made up of digits and at least one decimal point, conv
    15·1 answer
  • Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren
    13·1 answer
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
    14·1 answer
  • to edit text boxes in a template, first A click on the text box you want to edit B begin typing C format the front D drag the te
    5·2 answers
  • . Write a C++ Code to get a multiline statement Str1 from a user with a ‘$’ as return character (Hint:
    6·1 answer
  • ) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message
    11·1 answer
  • Most of the internal operations in a computer use hexagonal numbering true or false
    13·1 answer
  • Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is p
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!