1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
3 years ago
7

Which of the following are examples of nontoxic materials used in computer equipment?

Computers and Technology
1 answer:
inessss [21]3 years ago
8 0

Answer: Gold, Silver, Copper

Explanation:

Gold is very useful in computers as it can be used for connectors, connecting wires and even memory chips. It is a nonreactive metal and so is not toxic unless it is consumed (and in large quantities).

Silver is another nontoxic metal used in computers to make circuit boards, cellphones and even keyboard components. Finally there is the very important copper which is a useful electronic component for more than just computers. This non-toxic metal has contributed significantly to the development of many things electrical including, as already mentioned, computers.

You might be interested in
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator t
AnnZ [28]

Answer: Malicious association

Explanation:

 The malicious association is the situation where the wireless device are mainly configured so that they can connect by using the cracked device such as laptop to the organization network.

 This type of access point is known as access point (AP). It basically enabled the operator for stealing the password form the user. In the wired network, it penetrate by legitimate the wireless AP (Access point). The hackers also create the computer virus in the network.

3 0
3 years ago
A tracking signal A. is computed as the mean absolute deviation​ (MAD) divided by the running sum of the forecast errors​ (RSFE)
ladessa [460]

Answer: B.

​

Explanation:

8 0
3 years ago
A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company n
Tema [17]

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.

8 0
2 years ago
BADM-Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this cou
barxatty [35]

Answer:

WooW We Have To All This Which Class can you Please tell

5 0
3 years ago
Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
patriot [66]

Answer:

Pre-order: Kirk, Chekov, Khaaaan, Spock, Scotty, McCoy, Sulu, Uhuru

In-order: Chekov, Khaaaan, Kirk, McCoy, Scotty, Spock, Sulu, Uhuru

Post-order: Khaaaan, Chekov, McCoy, Scotty, Sulu, Uhuru, Spock, Kirk

Explanation:

The binary search tree is described in the diagram below.

The pre-order traversal of the binary tree gets the root, then the left node and right node. The in-order traversal picks the left node, the root node, and then the right node while the post-order traversal of the binary tree follows the left node, right node, and then the root node.

6 0
3 years ago
Other questions:
  • Workspace How do the following technologies help you in your quest to become a digital citizen: kiosks, enterprise computing, na
    6·1 answer
  • What component of a motherboard is not considered to be a field replaceable unit?
    12·1 answer
  • What can you do to make sure you have a healthy credit report
    13·2 answers
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • In C++ Please :
    6·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • Xavier buys a computer for $525, which includes taxes. He pays for the computer over a 12-month period by paying $48.13 per mont
    8·2 answers
  • Anyone know how to delete it in my laptop
    10·1 answer
  • Hi who plays among us
    9·1 answer
  • Jim is working on a network design for a small office running a Windows file and printer server with Internet
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!