1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
8

Describe 2 health risks posed by computers

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
4 0

Answer:

Bad posture and eye strain are two health risks posed by computers. Hand and wrist problems are other health risks posed by computers.

You might be interested in
Which statement about parallax scrolling is true?
jeka57 [31]

Answer:

The answer is B

Explanation:

I wrote down every slide of this lesson by hand lol. Good luck on the final <3

7 0
3 years ago
Assume variable age = 22, pet = "dog", and pet_name = "Gerald".
xeze [42]

Answer:

You are22years old.Gerladthedogis22

5 0
3 years ago
Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consis
Helga [31]

Answer:

Explanation:

The language I use would do it as

h1$ = copy(h$,1,3)

This may not satisfy you, because your language could be quite different. You might want an input statement of some kind that would define h$. This assumes that somewhere h,h1 are declared as  strings.

You also have to know how to read an input. My language uses readln(input,h)

and how to write it on the screen write(h1) or writeln(h1)

6 0
3 years ago
Which elements of a myth appear in this story from early babylon
g100num [7]
-a setting that may be fake
- Supernatural being/character
- Conflict/ the plot of the story
7 0
3 years ago
What is computer piracy? Describe some examples.
kodGreya [7K]
This is basically another word for plagiarism and it's when you steal someones work and say that it's yours.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that prompts the user to enter a three digit integer and determine whether it is a palindrome number.
    12·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • What are sums of money that are given out for specific reasons?
    5·2 answers
  • The _____ element of the wsdl describes the data being exchanged between the web service providers and the consumers, including
    12·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
  • This feature allows you to adjust your view to see the lower and upper part of a document
    15·2 answers
  • Which validation method would you use for first name on a data form
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!