1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
9

Trish bought a new computer that she has been using for a few weeks. She is starting to experience pain in her wrists, back and

neck. What measure should Trish take to reduce strain while working on the computer?
Computers and Technology
2 answers:
Ostrovityanka [42]3 years ago
5 0

<span>Good Posture – Trish should look for a good ergonomic chair that will help with her aches.  She should identify her natural posture and memorize it.</span>

<span>Regular movement and work organization – Encourage regular breaks and stretch or walk around the office.  At least once an hour is recommended.</span>

Position of the screen – Trish should consider factors such as distance, height, and angle of the screen.






Harman [31]3 years ago
3 0

Answer:

The answer will be "ensure back support by using cushions" for plato users.

Explanation:

Site itself indicates that this is the correct answer, just posting this so if anyone comes to this in the future it would make it easier for them.

You might be interested in
To delete only the selected contents of the table, but not the table itself, ____.
Volgvan

To delete only the selected contents of the table, but not the table itself, you need to click on this cell in the table.

6 0
3 years ago
Can someone help me pz?
Katarina [22]
Yes definitely. now what do you need help with?
8 0
3 years ago
Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
ANEK [815]

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

            <u>                                     </u>

1001     | 1001  0001  000

           <u>  1001                             </u>

           <u> 0000  0001             </u>

                        1000

            <u>            1001             </u>

                        0001  000

                             <u>    1 001  </u>

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                <u>                                     </u>

1001         | 1001    0001   001

                <u> 1001                           </u>

                 0000 0001

                       <u>     1001                  </u>

                            1000

                          <u>  1001              </u>

                            0001  001

                    <u>        0001  001      </u>

                                   0000

No error

7 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
What can you do to make sure no one outside your company can gain access to its wireless network?
Oksana_A [137]

Disable SSID broadcasting, Lower radio energy groups, and Enable MAC filtering.

<h3>Why would you disable SSID broadcasting?</h3>
  • Disabling the SSID Broadcast is one method of ensuring your wireless web.
  • This procedure will stop other users from detecting your SSID or your wireless network title when they attempt to view the available wireless networks in your area.
  • The network character exists delivered to wireless devices, which is the reason for disabling the SSID broadcast.
  • A typical wireless adapter and its associated software will identify and list all available SSIDs for networks that are within range.
  • When somebody disables SSID broadcast on any of those networks, the network will no extended show up in the wireless adapter's list of known networks.

To learn more about Disable SSID broadcasting, refer to:

brainly.com/question/15289342

#SPJ4

The complete question is:

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.

What can you do to make sure no one outside your company can gain access to its wireless network?

6 0
2 years ago
Other questions:
  • Which of the following office online apps is most effective for creating multi media presentation
    10·2 answers
  • As a rising photographer who has recently been recognized for several impactful images, why might you explore copyright protecti
    13·1 answer
  • Adam has decided to add a table in a Word doc to organize the information better. Where will he find this option? Insert tab, Il
    6·2 answers
  • How is marketing related to the other functions of a business
    14·1 answer
  • When a CPU executes instructions as it converts input into output, it does so with
    12·1 answer
  • Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
    10·1 answer
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • 3.2 code practice question 2. Not in a rush.​
    15·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!