1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
4 years ago
5

Which of the following is an easy steps to take to avoid ESSD well working on your computer?

Computers and Technology
1 answer:
Monica [59]4 years ago
7 0

C.) Keep your body in contact with the metal area of the computer


Generally, you want to keep contact with something metallic with clear path-to-ground. For instance, painted metal can do the job, but not as efficiently.

There are other ways to go about avoiding ESD, but this is the best option given in your question.

You might be interested in
Sushant is a new manager and he wants to share his ideas and working protocol with his team.Compare the advantages and disadvant
saw5 [17]

Answer:

Advantages of Oral Communication

  1. Use of visual aids like PowerPoint presentation while explaining his ideas and working protocols would help his team to understand him better.
  2. There is a spontaneous response from the staff which is more genuine than written response.

Disadvantages of Oral Communication

  1. It could prove to be a problem if Sushant has stage fright or is not an effective communicator, which could form an impression of him by the staff.
  2. Staff may forget some of Sushant's words as no memory is as reliable as written information.

Advantages of Written Communication

  1. A well written memo explains the ideas and working protocols that Sushant wants to relay to the staff.
  2. There could be a questionnaire for the staff to give feedback.
  3. Aims, objectives are clearly stated.

Disadvantages of Written Communication

  1. If the written material is too lengthy, it could be a problem to learn or memorise.

It is recommended that Sushant should use written form of communication to convey his ideas and working protocols as it is more effective.

3 0
3 years ago
An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
adell [148]

An excel user should use a relative cell reference when it is important to preserve the relationship to the formula location. When you create a formula that references other cells, excel does not normally "record" the exact cell address. Instead, it looks at the at the relationship that cell has to the other cell containing the formula.

7 0
3 years ago
1. What makes discrimination different from harassment? (Don't give me definitions.)
-BARSIC- [3]
Discrimination includes acting against a race whereas harassment isn’t not allowing a race to do something but instead insulting them. For example not giving someone of a certain race a job is discrimination but if someone followed a person of another race down the street calling them rude names, that’s harassment
7 0
3 years ago
____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the dat
IgorLugansk [536]

Answer: Online analytical processing

Explanation:

Online analytical processing(OLAP) is the method through which multi-dimension analytical queries can be resolved.User can attain selected query data as per their selection and then assess and analyze them from different view point.

  • It helps in viewing and reporting , planning ,performing analytical calculation, collecting data in data cubes etc.
  • Other options are incorrect because data adjacency, Ad hoc reporting ,data segregation and E-discovery are not the mechanism through which query and storage of data in data cubes take place.
  • Thus, the correct option is online analytical processing
3 0
3 years ago
What does Verizon child allow parents to do? My parents recently got the app and put it on my phone so I was wondering...
HACTEHA [7]
It allows them to turn on and turn off your internet; also if you were wondering incognito or any private browsing still countermeasures all devises they can use to access your history
4 0
3 years ago
Other questions:
  • 2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
    5·1 answer
  • Press the ____ key(s) to erase one character to the left of the insertion point.
    10·2 answers
  • The first time you start Outlook on a home computer, the ____ feature guides you to provide information that Outlook needs to se
    11·1 answer
  • What are two most common types of microcomputers? a. IBM-style PCs and Macs c. Clients and Servers b. Mainframes and Minicompute
    14·1 answer
  • Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The follow
    7·1 answer
  • I used the app and my answers were still wrong??????how
    8·2 answers
  • Can someone please help me with 6.8 Code Practice adhesive.
    14·2 answers
  • . It has been said that technology will be the end of management. Maybe. How about artificial intelligence
    9·1 answer
  • Stay safe and search answers up if you need ​
    14·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!