1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
12

What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent

Computers and Technology
1 answer:
sashaice [31]3 years ago
8 0

Answer:

A. 50 percent

Explanation:

The correct option is - A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.

You might be interested in
Identify the type of error described
Arturiano [62]

Answer:

ZeroDivisionError

ValueError

Explanation:

ZeroDivisionError occurs when you attempt to divide a number by 0.

ValueError occurs when the argument passed into a function holds the wrong value. In this case, the string is not numeric which cannot be passed into the float() function.

Hope this helps :)

5 0
3 years ago
What is the most common type of communication?
tamaranim1 [39]

Answer:

technology texting

Explanation:

omega lol

6 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
An antonym for the word “help” which may be found in a dictionary is a. Assist c. Hold b. Abandon d. None of these
Luba_88 [7]
I would have to say the answer is abondon
5 0
3 years ago
Read 2 more answers
Please I have been having a problem with this assignment of mine but I have not gotten an answer. Idiot know if anybody could be
ICE Princess25 [194]

Answer:

ummm

Explanation:

your on your own it doesn't makes since

3 0
3 years ago
Other questions:
  • Why is the Vigenere cipher hard to crack? (select 2)
    6·1 answer
  • An electronic device that can accept data as input, process it according to a program, store it, and produce information as outp
    6·1 answer
  • Write pseudocode instruction to carry out each of thefollowing computational operations.
    10·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • What is output if the user enters -5?
    12·2 answers
  • What is Mobile Edge Computing? Explain in tagalog.​
    5·2 answers
  • Imaging a computer is part of what phase of conversion?
    14·1 answer
  • What number is represented as a binary code of 101110
    5·2 answers
  • In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powere
    8·1 answer
  • What do you think is the most effective way to ensure that code adheres to good coding standards.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!