1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
5

Which of the following factors put you at risk for injury?

Computers and Technology
2 answers:
gizmo_the_mogwai [7]3 years ago
8 0

Answer:

1.Repetitive motions

2.Prolonged exposure to vibration

3. Long periods of localized pressure

Explanation:

Monica [59]3 years ago
4 0

Answer:

Prolonged exposure to vibration

Long periods of localized pressure

Explanation:

Repetitive motion is certainly not harmful, but prolonged repetitive motion can be a cause for injury. This is because if you are in repetitive motion for a long time, you exert a lot of force on your body, and that is certainly going to effect your body. And after a certain limit, even death can be a case. Hence, one should be very concerned about the time limit while their body goes through the repetitive motion.

However, neutral position we are always safe, as it’s an ideal position, as in this position, the work done is zero. Work done= force x displacement. And displacement in neutral position is zero. Hence, zero energy is lost. Hence, we are safe in this position.

Hence the above answer.

You might be interested in
Dora electronically transferred $591.68 from her checking account to Matt's checking account. In what column of the check regist
Allisa [31]
The answer is D.Payment/Debit
4 0
3 years ago
Read 2 more answers
Select all that apply.
Molodets [167]

The Big Five Factor: neuroticism, extraversion, openness, and conscientiousness.

3 0
3 years ago
Explain the need for data structures when developing software.
Sergio [31]

Solution:

It is  important because, it has to do operation on so without, data structures and algorithms.

It performs these operation:  

 1)Take an input

2) Process it  

3) Give back the output.

The input can be in any form, for ex while searching for directions on google maps,  the starting point and the destination as input to google maps, while logging in to any social sites, We have to give our email and password as input and so on.

Similarly, in the third step, the computer application gives us output in some form or the other.

To make this process efficient, we need to optimize all the three steps.

4 0
3 years ago
Who conceptualizes the design and the working of a website
Citrus2011 [14]
Answer is "Web Designer".

Web Designers are the "artists" of the website. They conceptualize the layout and functionality of the site, from features to format. They may do little coding, and are mostly involved in the creative elements of web design. The Web Developer is less big-picture, and more knitty-gritty building of the website. She is the one who does the coding and actually builds the website, using the web designer's model. 
3 0
3 years ago
PLEASE HELP ASAP!!!!!!!!!!!
Bingel [31]

Answer:

True

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • What are some useful properties of current electricity
    13·2 answers
  • Sara has a habit of stealing money from her brother Charlie. When he found out, Charlie rebuked Sara in the presence of his frie
    11·1 answer
  • Charles would like to visit a specific page on the World Wide Web. How should he do it? Enter the address in a search engine cli
    15·2 answers
  • Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 3
    14·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
  • Were can i watch unexpected free season 3
    9·1 answer
  • 45 points!
    10·2 answers
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!