1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
15

WHAT ARE THE RISK OF DUST​

Computers and Technology
1 answer:
Step2247 [10]3 years ago
3 0

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out

You might be interested in
In excel, combining two or more selected cells into one cell is called ____ cells
n200080 [17]
The answer that would best complete the given statement above would be the word "MERGING". So here is the complete statement. <span>In excel, combining two or more selected cells into one cell is called MERGING cells. Hope this answers your question. Have a great day!</span>
4 0
3 years ago
Differcence between displayed output and printed output
Harrizon [31]

Answer:

The display output specifies the variable's data type and returns output line by line. The print output, on the other hand, does not indicate the variable's data type and does not deliver output line by line. The print output can be used to portray any type of data, such as a string or an approximate value. The display output is a Python programming capability that is used to comprehend a line of text given by the user.

6 0
2 years ago
How to convert ascii to hexadecimal?
Deffense [45]
ASCII is an agreement on which number represents which typographic character. Using this table you can look up the number of any character. For instance, "A" has 65, but that is a decimal. Next step is to represent this decimal number in hexadecimal. You can do that by taking the divisor and remainder of a division by 16. Numbers beyond 9 are represented as a through f. Hexadecimal numbers are commonly prefixed by "0x" to make them recognizable.

So "A" = 65 = 4*16+1 = 0x41

And "Z" = 90 = 5*16+10 = 0x5a

There are ASCII tables that have the hexadecimal value in them, to make the task easier (www.asciitable.com).

If you want to do this programmatically, you can write something like this (node.js):

console.log( Buffer.from('AZ', 'utf8').toString('hex'));

Note that the 0x prefix is not shown here.
7 0
3 years ago
if you want to present slides to a fellow student or co workers which productivity software should you use to create them?
Aleonysh [2.5K]

I think a presentation would be the answer.

Hopefully this helps, have a good day.

6 0
3 years ago
You are the project manger for Xylophone Phonics. It produces children's software programs that teach basic reading and math ski
____ [38]

Answer:

The correct answer is A.

Explanation:

Even though the B option, Analogous Estimating, can be used to predict parameters such as cost, scope etc. based on other similar projects done in the past, it is not the best option in our situation because we don't have enough information on the project to give us a detailed estimation. So the technique we should use is given in option A as Monte Carlo Analysis.

Monte Carlo Analysis is especially effective when there are a lot of unknowns or variables in play such as in our case where we don't have a lot of details. It can be used to predict the uncertainties, risks and their impacts on our project.

I hope this answer helps.

3 0
3 years ago
Other questions:
  • Gina's teacher has sent her a Word document that contains the names of all the students who are participating in the
    11·2 answers
  • What option is used to combine several objects so that they can be treated as a single unit
    6·1 answer
  • What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
    6·2 answers
  • Using the mouse to move or copy cells is called ____.
    15·1 answer
  • unittttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt
    7·1 answer
  • The pc card and cardbus devices are being replaced by what technology?
    14·1 answer
  • The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users t
    8·1 answer
  • Edhesive coding practice 3.4​
    13·2 answers
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!