1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
8

Write 5 things that can be done to avoid computer vision syndrome

Computers and Technology
2 answers:
weeeeeb [17]3 years ago
6 0
Get a comprehensive eye exam.
Use proper lighting.
Minimize glare.
Upgrade your display.
Adjust your computer display settings
Blink more often.
Exercise your eyes.
Take frequent breaks.
Anestetic [448]3 years ago
4 0

Answer:

Use Proper Lighting. Improper lighting is one of the main causes of eye strain. ...

Follow the 20-20-20 Rule. Exercising your eyes is a great way to avoid straining them. ...

Use the Right Equipment. ...

Adjust Your Settings. ...

Take Frequent Breaks

source:www.edgeit com

You might be interested in
How do you use a Hard Drive
Ray Of Light [21]
Plug it into pc and wahlah
3 0
3 years ago
Read 2 more answers
Keisha wants to change the default printer before printing an e-mail. Which steps will accomplish this task?
Angelina_Jolie [31]

Answer:

The steps that will accomplish the task are;

On the File tab, clicking Print and choosing the desired printer from the Printer drop-down list

Explanation:

In steps required to change the default printer on Microsoft Outlook before printing as e-mail are as follows;

1) Select the File tab on the Menu bar

2) Click on the Print option on the File's Menu

3) From the Print window displayed under the File Menu in Microsoft Outlook select the desired printer from the Printer options drop-down list

The steps that will accomplish the task are On the File tab, clicking Print and choosing the desired printer from the Printer drop-down list.

8 0
3 years ago
Suppose you want to delete an existing file from within word. What would you do?
Oksana_A [137]
Go in to ur files and find the file and delete it
5 0
3 years ago
Creating a map of your current knowledge is called __________.
poizon [28]

Answer:

D - Concept-mapping

Explanation:

3 0
3 years ago
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
Other questions:
  • You are running an application in Google App Engine that is serving production traffic. You want to deploy a risky but necessary
    9·1 answer
  • Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
    10·2 answers
  • All objects in an object-oriented program are instantiated (created) from a ____.
    12·1 answer
  • The internet connects millions of computers connected through millions of ____ worldwide.
    9·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • Consider a Games Expo for Children. Six competitions are laid out for the expo. Tickets are sold according to the age and gender
    11·1 answer
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    5·1 answer
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • HELP ME PLEASE ASAP
    6·1 answer
  • Presentations must have what to be efffective
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!