1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
3 years ago
7

Which of the following are examples of nontoxic materials used in computer equipment?

Computers and Technology
1 answer:
inessss [21]3 years ago
8 0

Answer: Gold, Silver, Copper

Explanation:

Gold is very useful in computers as it can be used for connectors, connecting wires and even memory chips. It is a nonreactive metal and so is not toxic unless it is consumed (and in large quantities).

Silver is another nontoxic metal used in computers to make circuit boards, cellphones and even keyboard components. Finally there is the very important copper which is a useful electronic component for more than just computers. This non-toxic metal has contributed significantly to the development of many things electrical including, as already mentioned, computers.

You might be interested in
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
Yuri [45]

Answer:

# include<iostream>

#include<conio.h>

using namespace std;

main()

{

char choice;

cout<<"Enter your Choice"

cin>>choice;

switch (choice)

{

case 'y':

cout<<"Your request is being processed";

break;

case 'n':

cout<<"Thank you anyway for your consideration";

break;

case 'h':

cout<<"Sorry, no help is currently available";

default:

cout<<"Incorrect Choice";

break;

}

getch();

}

Explanation:

In this program, a character type variable named as choice is selected for the input. This choice variable can be y, n or h as per requirement of the program. Switch statement is chose for the selection of output statement with respect to its mentioned input.  This program shows the output statement for above mentioned characters. In case of any other character the program returns Incorrect choice and ends.

7 0
3 years ago
A material systems developer typically combines the skills of a programmer with the multitasking expectations of a
shusha [124]

Explanation:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

don't delete my answer this time i try to help ppl

3 0
3 years ago
Why are peripherals added to computers?
Novay_Z [31]

Answer:

To expand their capabilities

Explanation:

They allow users to do more with computers

7 0
3 years ago
In excel what happens when rename a sheet from sheet1 to inventory​
makvit [3.9K]

Answer:

Explanation:

The sheet name at the footer of the screen gets changed from sheet1 to inventory.

4 0
3 years ago
Other questions:
  • Can you help please.
    11·1 answer
  • Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
    5·2 answers
  • The actual database of Active Directory shared resources is stored on one or more computers designated as:
    6·1 answer
  • A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the p
    11·1 answer
  • Write the class definition for a class named Employee. The class should include data members for an employee object%u2019s name
    12·1 answer
  • Where can the Ease of Access and Speech Recognition centers be found?
    6·2 answers
  • A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the admi
    7·1 answer
  • Cú pháp câu lệnh xóa thủ tục
    12·1 answer
  • Write a definition in your own words for GUI. Do not copy and paste please.
    8·2 answers
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!