1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
9

Trish bought a new computer that she has been using for a few weeks. She is starting to experience pain in her wrists, back and

neck. What measure should Trish take to reduce strain while working on the computer?
Computers and Technology
2 answers:
Ostrovityanka [42]3 years ago
5 0

<span>Good Posture – Trish should look for a good ergonomic chair that will help with her aches.  She should identify her natural posture and memorize it.</span>

<span>Regular movement and work organization – Encourage regular breaks and stretch or walk around the office.  At least once an hour is recommended.</span>

Position of the screen – Trish should consider factors such as distance, height, and angle of the screen.






Harman [31]3 years ago
3 0

Answer:

The answer will be "ensure back support by using cushions" for plato users.

Explanation:

Site itself indicates that this is the correct answer, just posting this so if anyone comes to this in the future it would make it easier for them.

You might be interested in
For homework, we were given this photo and to figure out what it is. It is up close and labelled “ too close to tell” but I have
dalvyx [7]
I honestly have no idea on what this is... but im guessing its some sort of tool or food in somebodys mouth... probably isn't but oh well..
7 0
3 years ago
The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
Papessa [141]
The above statement is FALSE.

The layout gallery displays 9 slide layouts NOT 10. 

These 9 layouts have various<span> placeholders to define text and content positioning and formatting.

</span>1 - Title slide
2 - Title and content
3 - Section Header
4 - Two content
5 - Comparison
6 - Title only
7 - Blank 
8 - Content with Caption
9 - Picture with Caption
8 0
3 years ago
The following binary numbers are 4-bit 2's complement binary numbers. Select all operations that generate overflow. Verify your
kogti [31]

Answer:

The 4-bit 2's complement = 0100 = 4

Explanation:

Let the binary number = N

Hence, N-bit = 2∧N

The 4-bit can be as follow: 1100

Hence, the 2's complement = 0011 + 1 = 0100

3 0
4 years ago
Select the three statements that best describe benefits to testing a system.
tester [92]

Answer:

Following are the three statements which best describe  benefits to testing a system.

Explanation:

First

Allows you to correct inaccurate requirements

Second

Allows you to validate characteristics

Third

Allows you to capture the required behavior of the system

7 0
3 years ago
Your company shares a building with a competitor’s branch office. Recently, you noticed that some computers other than company c
ki77a [65]

Answer:

Disable SSID Brodcasting, Lower Radio Power Levels, Enable MAC Filtering

3 0
3 years ago
Other questions:
  • If the value of the expression,
    13·1 answer
  • As we learned in this lesson, a byte is about the same amount of memory as a character, such as the letter 't'. There are approx
    13·1 answer
  • What is the meaning of Android
    12·2 answers
  • A free Linux forensics tool
    7·1 answer
  • Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his compute
    15·1 answer
  • 6. How might you go about securing an internship or job on LinkedIn?
    14·2 answers
  • In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
    14·1 answer
  • Your task is to build a palindrome from an input string.A palindrome is a word that readsthe same backward or forward. Your code
    12·1 answer
  • What does c++ programming mean?
    7·1 answer
  • Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!