1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
8

Describe 2 health risks posed by computers

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
4 0

Answer:

Bad posture and eye strain are two health risks posed by computers. Hand and wrist problems are other health risks posed by computers.

You might be interested in
write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has bee
MakcuM [25]

Answer:

[24, 35, 9, 56 Approach #3: Swap the first and last element is using tuple variable.

8 0
3 years ago
Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evalua
Veseljchak [2.6K]

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

8 0
3 years ago
Why computer known as tool of information​
S_A_V [24]

Answer:

because it has the ability to capture the whole information you need or downloaded

8 0
2 years ago
Monero is cryptocurrency that focuses on transparency of ownership. True or false
dangina [55]

Answer:

TRUE

Explanation:

4 0
3 years ago
Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer. Assume t
kodGreya [7K]

Answer:

sendObject(John_Doe);

Explanation:

The above code has been written in Java.

Since the calling class is the same that declares it, to invoke the method, simply call its name with its argument(s) in a pair parentheses. The name of the method is "sendObject" and its argument is a reference to an object of type Customer saved in a variable called "John_Doe". This can be written as follows:

sendObject(John_Doe);

Hope this helps!

3 0
3 years ago
Other questions:
  • This is a list of commands that tell your computer what to do. A icon B FAT C GUI D menu
    5·2 answers
  • The acronym is used to define the process that allows multiple devices to share a single routable ip address.
    6·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
    14·1 answer
  • Why is it important to brain storm and develop concepts prior to selecting an idea that you wish to move forward with as a solut
    7·1 answer
  • An electronic storage file where information is kept is called a cpu. true false
    11·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • How is the bootstrap program started?
    6·2 answers
  • HELP ASAP !!! What should be a one-page document?
    7·1 answer
  • (03.05 LC
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!