1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
5

Which of the following is an easy steps to take to avoid ESSD well working on your computer?

Computers and Technology
1 answer:
Monica [59]3 years ago
7 0

C.) Keep your body in contact with the metal area of the computer


Generally, you want to keep contact with something metallic with clear path-to-ground. For instance, painted metal can do the job, but not as efficiently.

There are other ways to go about avoiding ESD, but this is the best option given in your question.

You might be interested in
You have a new phone. What determines what type of messages you can send?
prohojiy [21]
B the services provided by the provider
6 0
3 years ago
1. Which of the following options will allow you to insert a quick table? (1 point) Insert ribbon > Shapes drop-down menu
emmasim [6.3K]
Quick tables are tables<span> that are stored in galleries as building blocks and can be reused and accessed at any time.</span>
The following option will allow you to insert a quick table:
Insert ribbon -> Table drop-down menu

Yous should click on the ribbon (tab) Insert and then from the Table drop-down in the Tables group, select Quick Tables.
5 0
3 years ago
Read 2 more answers
What is the technological singularity and what are the dangers it brings to man
professor190 [17]
The definition according to google and the dictionary of technological singularity is the following : The technological singularity (also, simply, the singularity) is the hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization.

The dangers this brings to man kind is the fact that people will turn out to not be people or there may be a different species considered as humans or human kind .Also we were made as humans from something else artificial super intelligence will basically be forming from us which means it will be forming from something that was already mean basically meaning there will be something changed within the species or artificial super intelligence itself.
3 0
3 years ago
What does a virus do to a computer? How can it be fixed?
miv72 [106K]
A virus can do many things from burn up your hard drive to just annoy you with ads. the best thing you can do if you think you have one is take it to a professional
4 0
3 years ago
Which of the following is true for an API? I. Allows different devices to connect with each other II. Allows for Interactivity b
Zina [86]

Answer:

All of the above.

Explanation:

API is an acronym for application programming interface and it can be defined as a software intermediary (computing interface) comprising of sets of codes, tools and protocols that helps software applications and the computer to communicate with each other, as well enable the exchange of data. Some examples of popular APIs are Go-ogle, Face-book, Twitter etc.

The main characteristics and functions of an application programming interface (API) includes;

I. Allows different devices to connect with each other.

II. Allows for Interactivity between devices and software.

III. Messenger program that takes requests and delivers the response back to the user.

IV. Allows the creation of applications that access the features or data of an operating system, application, or other services.

V. Specifies how software components should interact.

VI. Used when programming graphical user interface (GUI) components

6 0
3 years ago
Other questions:
  • How is a network printer identified on the network?
    8·1 answer
  • You want to deploy software using group policy. what is necessary before deciding to assign the software to your user accounts?
    11·1 answer
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • When planning a presentation, there are several factors you need to consider. Which of the following is one factor you should co
    8·1 answer
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • before Katie turns in the paper she typed she wants a peer to review it and give her feedback Katie uses her all in one printer
    10·1 answer
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!