1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
6

What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap

acitors?
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
3 0

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
You might be interested in
The range A2:B4 has how many cells?<br><br> Answers:<br> 2,4,6,8
mylen [45]
6 cells because you have to drag and it becomes six cells .

8 0
3 years ago
Read 2 more answers
Which device allows your computer to talk to other computers over a telephone line as well as access the internet?
Sphinxa [80]

This question has 2 answers that I can see.

The first one would be a Dial Up Modem. These devices allow (or allowed, since they're pretty much obsolete) a computer to communicate over the phone lines and access the internet.

The second option for an answer would be a DSL Modem/Router. In a sense, a DSL (Standing for Digital Service Line) is a bit of a predecessor to traditional Dial Up, using a digital telephone line (However not the frequencies used for voice) to connect a computer or set of computers together and to the internet.

7 0
3 years ago
A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n)
pychu [463]

Answer:

Option c is the correct answer for the above question.

Explanation:

A loop is used to repeat some lines in some specific times which depends on some conditions of the loop. If a person wants to print "welcome" on 5 times then he can do this by two ways one is writing a print statement 5 times and the other is states a loop that executes 5 times through condition. The loop is described or written by three necessary points which are:-

  1. The fist is to initialize the initial value which tells the compiler for the starting point of the loop.
  2. The second is to any action for that condition variable which takes the loop for the direction of ending points.
  3. The third is a condition that defines the ending point of the loop.

The above question also states about the loop in which first and second points are given then the third point is necessary to complete the sentence which is states in option c. Hence the option c is correct while the other is not because--

  • Option 'a' states about the class operator which is not the part of the loop.
  • Option b states about the documentation plan which is also not the part of the loop.

5 0
4 years ago
Which of the following is the main consideration when choosing an appropriate outlet box?
mafiozo [28]
How much power is going through the out let <span />
4 0
3 years ago
Read 2 more answers
mystery_int_1 = 3 mystery_int_2 = 4 mystery_int_3 = 5 You may modify the lines of code above, but don't move them! Above are thr
hodyreva [135]

Answer:

The solution code is written in Python

  1. import random
  2. mystery_int_1 = 3  
  3. mystery_int_2 = 4  
  4. mystery_int_3 = 5
  5. print(str(mystery_int_1) + " " + str(mystery_int_2) + " " + str(mystery_int_3))
  6. while(mystery_int_1 > 0 or mystery_int_2 > 0 or mystery_int_3 > 0 ):
  7.    mystery_int_1 = random.randint(-5, 5)  
  8.    mystery_int_2 = random.randint(-5, 5)  
  9.    mystery_int_3 = random.randint(-5, 5)  
  10.    print(str(mystery_int_1) + " " + str(mystery_int_2) + " " + str(mystery_int_3))

Explanation:

Firstly import random module (Line 1).

Next, create three variables to hold the three mystery numbers (Line 3-5). Display the first set of three mystery numbers in one line (Line 6).

While any one of the three mysteries number  still bigger than zero, the while loop will keep going (Line 8). In the loop, three new mystery numbers will be generated using the randint method (Line 9-11). We presume the random value is in range -5 to 5. Print the new set of mystery number on the same line (Line 12).  

6 0
3 years ago
Other questions:
  • Which file type is used for animated images?
    9·1 answer
  • How do you clean and maintain a mouse, keyboard, optical drive, computer display, and printers?
    7·2 answers
  • Before you enable data deduplication, what tool can you use to determine if data deduplication would benefit the tested volumes
    11·1 answer
  • Which of the following is not a protocal? <br><br>A) HTTP<br>B) FTP<br>C) WWW<br>D) HTTPS​
    15·2 answers
  • In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
    10·1 answer
  • In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
    9·1 answer
  • Of the following hard drives, which one is fastest?
    13·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
  • Which benefit does the Cloud provide to start-up companies without access to large funding?
    8·1 answer
  • What tool allows you to search external competitive intelligence research?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!