1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
11

Select each procedure that will keep the computer safe and working properly. Turn the power off on the computer before shutting

down. Wash your hands thoroughly before using the computer. Gently type on the keyboard. Download software from the Internet without permission. Set your water bottle on a table that is away from hardware.
Computers and Technology
2 answers:
Serhud [2]3 years ago
8 0

Answer:

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

The procedures that will keep the computer safe and working properly are:

-Gently type on the keyboard because it will allow it to last longer because if you press the keys too strong they could get stock or it can have problems with the settings and symbols, numbers and letters can start appearing on a different key.

-Set your water bottle on a table that is away from hardware because this will allow you to avoid throwing the water on the computer which will damage it.

The other options will not keep the computer safe and working properly because turning the power off before shutting it down can damage the hard drive, downloading software from the Internet without permission can cause a virus or a malware to infect the computer and washing your hands thoroughly before using the computer won't do anything to maintain it working properly or safer.

mariarad [96]3 years ago
5 0
I would say Gently type on the computer. Set water away from computer.
You might be interested in
Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number an
Zanzabum

Answer:

See explaination

Explanation:

/File: ValidateCheckDigits.java

import java.io.BufferedWriter;

import java.io.File;

import java.io.FileWriter;

import java.io.IOException;

import java.util.Scanner;

public class ValidateCheckDigits {

public static void main(String[] args) {

String fileName = "numbers.txt"; //input file name

String validFileName = "valid_numbers.txt"; // file name of the output file

//Open the input file for reading and output file for writing

try(Scanner fileScanner = new Scanner( new File(fileName));

BufferedWriter fileWriter = new BufferedWriter( new FileWriter(validFileName))) {

//Until we have lines to be read in the input file

while(fileScanner.hasNextLine()) {

//Read each line

String line = fileScanner.nextLine().trim();

//calculate the sum of first 5 digits

int sum = 0;

for(int i = 0; i < 5; i++) {

sum += Integer.parseInt( line.charAt(i) + "");

}

//Get the last digit

int lastDigit = Integer.parseInt(line.charAt(5)+"");

//Check if the remainder of the sum when divided by 10 is equal to last digit

if(sum%10 == lastDigit) {

//write the number in each line

fileWriter.write(line);

fileWriter.newLine();

System.out.println("Writing valid number to file: " + line);

}

}

System.out.println("Verifying valid numbers completed.");

} catch(IOException ex ) {

System.err.println("Error: Unable to read or write to the file. Check if the input file exists in the same directory.");

}

}

}

Check attachment for output and screenshot

4 0
3 years ago
After a customer buys a computer or receives service from Top Computers and Service, a service representative contacts each cust
AlladinOne [14]

Answer: False

Explanation:

 The given statement is false, as the survey information basically represent feedback in which the service representative contact each and every customers to collect the feedback.

Feedback is in the form of information in which it represent the reaction in the scenario to the output but it basically affects as an input. Therefore, the survey information is in the form of input not as output.

7 0
3 years ago
How can we work together to fix problems with our websites
Virty [35]
Add a Value Proposition. ...
Website Navigation. ...
Call to Action Text. ...
Call to Action Colors. ...
Try The 10-Foot Test. ...
Carousels. ...
Social Proof. ...
Testimonial Pages.
8 0
3 years ago
Given f(x) = -2x2 + 5x - 1 and g(x) = 3x + 4 determine a simplified
lukranit [14]

Answer:

-6x^4 + 7x^3 + 17x^2 -4x

Explanation:

( f x g )( x )

Substitute

[( -2x^2 + 5x -1 )( 3x + 4 )]( x )

Use the Distributive Property

[-2x^2( 3x) + 5x( 3x) - 1( 3x) -2x^2( 4) + 5x (4) -1 (4)] (x)

Simplify

( -6x^3 + 7x^2 + 17x -4)(x)

Distributive Property

-6x^4 + 7x^3 + 17x^2 -4x

7 0
3 years ago
a particular variety of database that works by connecting tables to each other. It is the most popular form of database and the
NeTakaya

Answer:

Relational Database      

Explanation:

  • Relational Database is the type of database in which data is stored and presented in the form of tables and it is used to access, manipulate and manage data.
  • Table is also called a relation. It consists of rows and columns where rows represent a record of data and columns represent the attributes of the data.
  • Every table has a primary key which uniquely identifies a row in a table and a foreign key is used to establish relationships among tables.
  • In relational database domain is used to define specify the possible values that an attribute can have.
  • Constraints can also be applied to the values of the attributes in the table.
  • There are many advantages of a relational database.
  • It can organize and manage bulk of information.
  • It is easy to add or delete data in the relational database according to the change in requirements.
  • Relational database ensures the consistency and integrity of data when many users obtain the same database at same time by using concurrency control methods.
  • It ensures security by limiting access rights to the data.
  • It also eliminates data redundancy and dependency using normalization technique which ensures data integrity and accuracy.
3 0
3 years ago
Other questions:
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • Windows _____ is a system notification utility and gives quick access to settings for items like screen brightness and network c
    8·1 answer
  • Write an SQL statement to list the Name of employees who have worked on a property in New York .
    7·1 answer
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • Write a program that displays the following menu:
    8·1 answer
  • I really want to know the best way to deal as much heart as possible plz tell me
    7·2 answers
  • What is a type of transition used for music in Earsketch
    11·1 answer
  • WHAT DOES THE SCRATCH CODE BELOW DO?
    7·1 answer
  • In 1839, Talbot released the paper-based process which he called _ to the public.
    5·1 answer
  • [2]<br> (c) Describe how the microprocessor can determine when to sound the clock alarm.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!