1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
9

Explain four sitting postures in a computer laboratory​

Computers and Technology
1 answer:
Flura [38]3 years ago
8 0
1. Push hips back
2. Adjust seat
3. Sit up straight and roll your shoulders back
4. Feet flat on floor
You might be interested in
E. what component must be compatible with every other component of the computer?
Kryger [21]
The correct answer: The motherboard 

The motherboard which is a piece of technology which has most of the electronics of a personal computer is (usually) found at the center most part of a Central Processing unit (CPU).

The motheboard needs to be compatible with all the components found in the Central Processing Unit because almost all the important components is connected to it. Just imagine if the power which the power suppy supplies to the motherboard is inadequate due to electrical incompatibility, do you think the Central processing unit will work? It won't. As a matter of fact if you turn on the CPU, it will just switch off on itself in just a few seconds. 
8 0
3 years ago
Spam and i report
defon

Answer:

option d is the correct answer

8 0
2 years ago
Read 2 more answers
What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity
Anna71 [15]

Answer:

Size

Explanation:

thats it thats the answer

8 0
2 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
2 years ago
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Other questions:
  • Please answer quick:))))
    7·1 answer
  • In general, what is the leftmost point of a circle with radius r centered at (x,y)?
    8·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • How should you set the OHMS ADJust control on a multitester of analog VOM, for resistance measurements?
    12·1 answer
  • Image-editing software is used to _____.
    15·2 answers
  • java Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins w
    11·1 answer
  • Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
    11·2 answers
  • What is the importance of effectiveness in communication?
    14·1 answer
  • Please anyone, help me.... I'm not sure how to put these all together.<br> 35 points!
    15·2 answers
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!