1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
6

What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap

acitors?
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
3 0

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
You might be interested in
Assignment 2: Room area
Y_Kistochka [10]

Answer:

a = float(input("Enter Side A: "))

b = float(input("Enter Side B: "))

c = float(input("Enter Side C: "))

d = float(input("Enter Side D: "))

e = float(input("Enter Side E: "))

area1 = 1.0* a * b

area2 = (a - c) * (d - e -b)

area3 = 0.5 * (a - c) * e

print ("Room Area: " + str(area1 + area2 + area3))

Explanation:

happy to help ^3^

5 0
3 years ago
Difference and similarity between cluster computing and Hadoop ecosystem?<br>​
Marysya12 [62]
  • Some things can be similar and still have some differences. The Hadoop ecosystem is known to be the add-ons that make the Hadoop framework more better for some particular big data needs and tastes.

The Hadoop ecosystem is made up of the open source projects and commercial tools that are often optimized to act on different kinds of work especially to big data. It is very flexible

The differences is that cluster is simply a combination of a lot of computers that is set up to work together as one system but a Hadoop cluster is a cluster of computers that is used only at Hadoop. Hadoop clusters are set up to analyze and storing large amounts of unstructured data only in a distributed file systems.

Learn more about systems from

brainly.com/question/10603992

7 0
2 years ago
Read 2 more answers
You typed the word "weather" when you meant to type the word "whether." When will Writer or Word flag this as a misspelling or a
maria [59]

Answer:

It depends on the structure of the sentence.

Explanation:

This will be shown as grammatical mistake because both the spellings are correct. If we write the word weather instead of the whether, Ms word shows the grammatical mistake. This is because, if we want to write the word whether, we should use or in our sentence. Both of these words are comes together.

Example

I will take a leave whether its raining or not.

In above sentence, both whether and or comes together. If we write weather instead of whether it just show the grammatical mistake in the sentence.

4 0
3 years ago
Read 2 more answers
Substances become a form of “self-soothing” when one feels_______. a) stressed b) anxious c) the need for a reward d) all of the
Fynjy0 [20]
The answer vshould be stressed
3 0
4 years ago
Read 2 more answers
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi
slava [35]

Answer: VLAN

Explanation: VLAN(Virtual local area network) is the network technology that lets the user to connect in a virtual( fake) environment and displaying as if they are working in the LAN environment.

It is the used for obtaining the scalability and protection of information while communication. It also helps in adapting the change that occurs in the network and  nodes of the server. Thus, VLAN is the network that should be used in the business to keep sensitive data secure and hosts of the network to connect and communicate .

3 0
3 years ago
Other questions:
  • Write a function: function solution(N); that, given a positive integer N, prints the consecutive numbers from 1 to N, each on a
    14·1 answer
  • What do we call a subset of new media in which groups and their fans can interact directly?
    14·1 answer
  • What is a bug?
    11·2 answers
  • Can anyone fill in the space please
    6·1 answer
  • Create the following SQL Server queries that access the Northwind database. Place them in a zip file and place the zip file in t
    6·1 answer
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • Difference between switch and switch lite
    10·1 answer
  • Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
    10·1 answer
  • Which of the following is an example of two-factor authentication?
    10·2 answers
  • One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!