1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
9

Which is the best defense against ESD?

Computers and Technology
2 answers:
yarga [219]3 years ago
4 0

Wear protective devices like wrist straps, sole grounders, and/or conductive shoes. These items help to prevent electrostatic charge from building. 4. Keep your components in the anti-static bag until you are ready to install them.

plz mark me as brainliest :)

sertanlavr [38]3 years ago
4 0

Answer:

Wear protective devices like wrist straps, sole grounders, and/or conductive shoes. They prevent electrostatic charge from building up.

Hope it answers the question:)

You might be interested in
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
vichka [17]

Answer:

spooler

Explanation:

A print server uses a print spooler as a software holding area for jobs waiting to be printed.

8 0
3 years ago
Read 2 more answers
What dose a bios system do?
ANTONII [103]
BIOS instructs the computer on how to preform basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer
4 0
3 years ago
Read 2 more answers
What information will you find in the 16-bit field in an IP datagram?
faust18 [17]

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

7 0
3 years ago
Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
VladimirAG [237]
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which shows three dimensional data is known as Bubble chart. It also can be seen as the variation of scatter plot where bubbles replace the data points.
4 0
3 years ago
What are QBASIC Operators ?​
Anna35 [415]

Answer: There are four types of operators in QBASIC. They are Arithmetic Operators, Relational Operators, Logical Operators and Sting Operator. a. Arithmetic Operators. Arithmetic Operators are used to perform mathematical calculations like addition, subtraction, division, multiplication and exponential. :)

5 0
4 years ago
Read 2 more answers
Other questions:
  • Is a way of grading web pages by the number of other web pages that link to them?
    10·1 answer
  • Ismael would like to insert a question mark symbol in his document. What steps will he need to follow to do that?
    10·2 answers
  • ____________ are used to store all the data in a database
    6·2 answers
  • PLEASE HELP!!!!!!!!!!!!!!!!!!
    6·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • What is a left hand door lever?
    13·2 answers
  • When you are giving a presentation, which of these elements will help you to explain the content better
    9·1 answer
  • In a singing competition, there are 34 more men than women
    5·2 answers
  • List four things that must be taken into consideration when evaluating different resources of information (and explain ANY ONE f
    8·1 answer
  • Technology, by itself is neither good nor bad.<br> A) true<br> B) false
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!