1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
12

Outline the dangers arising as a result of using computers​

Computers and Technology
1 answer:
Lemur [1.5K]3 years ago
6 0

Answer:

Visual impairment

Physical Health problem

Explanation:

The benefits of computers are so numerous a d has been an essential business and educational tool every organization must possess for one purpose or the other. Such is how immense its importance is. However, the computer also comes with it's own risk, which may include :

Visual impairment is a major problem most computer users face or will likely encounter in the future due to prolonged exposure of the eyes to the light emanating from the screen. This visual challenge is populary called the. Computer Vision Syndrome.

Similarly, related health related issues affecting the physical body such as the back, hip, neck pains which result from postural position when using the computer.

You might be interested in
‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
Law Incorporation [45]
"The increased availability of mobile digital devices has had a positive impact on how young people use their free time."

There are many different views that you could take upon this subject.  

1) You could say that the increased availability of mobile digital devices has allowed children to increase their academic success, by being able to search for and complete assignments using these devices.

2) You could say that the increased availability of mobile digital devices allows for children to occupy themselves by providing games, videos, books, and other things to provide them with entertainment, a learning experience, and more.

Hope this helps!
4 0
4 years ago
Trish has bought a new computer, which she plans to start working on after a week. Since Trish has not used computers in the pas
Elenna [48]
Go on the windows sign and type in run and then type temp and %temp% or prefetch
8 0
3 years ago
Read 2 more answers
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Jake is photographing his pet puppy. He wants to preview the image the camera will capture. What part of the camera that is insi
german

A. i think that is right

3 0
3 years ago
Read 2 more answers
4. In Microsoft Word you can access the _______ command from the "Mini toolbar".
3241004551 [841]
Hello there!

The correct answer is Save As Command.

Hope This Helps You!
Good Luck :)
6 0
3 years ago
Other questions:
  • What is a project manager?
    6·2 answers
  • One particularly effective form of providing feedback is for the receiver to ________. restate the message in his or her own wor
    14·1 answer
  • Problem: you need to write a code that read 2 array of size 10x10 of zero and ones that represent black
    8·1 answer
  • A device combined with a switch, router, and wireless access point is called what?
    9·2 answers
  • Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To d
    14·1 answer
  • Which one is not considered part of the cinematography team?
    7·2 answers
  • For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters
    6·1 answer
  • True/false
    8·1 answer
  • Assume you define a vector in the following way:
    5·1 answer
  • Which activity is performed during high-level design in the V-model?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!