1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
2 years ago
6

What safety do you need to have ready to start a device repair?

Computers and Technology
1 answer:
lorasvet [3.4K]2 years ago
7 0

Answer:

Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.

You might be interested in
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
Using more than one array to store related data is called _____________ arrays.
Makovka662 [10]
It is called matrix arrays
6 0
2 years ago
Read 2 more answers
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
What can you do if brainstorming only gives you a small or incomplete idea?
Grace [21]

Answer:

D. All of the above

Explanation:

5 0
3 years ago
A thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually und
Misha Larkins [42]
The item you described is a skimmer it is oftem=n placed and left for an amount of time or watched from afar than when no on is looking they run-up and extract it for its data
3 0
3 years ago
Other questions:
  • Name the months that have 30 days​
    6·2 answers
  • The font color grid is located in the color group on the design tab. (points : 2) true false
    9·1 answer
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • Can someone solve this for me please? It’s part of an escape room.
    13·2 answers
  • Yuri, a medical assistant, has been asked to send an account of a patient's last office visit to another doctor's office. The te
    6·2 answers
  • Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to
    8·1 answer
  • Which step in the software development life cycle involves making improvements based on user feedback?
    15·1 answer
  • 1.An algorithm used to find a value in an array is called a ______________.
    7·2 answers
  • wooooooooo helll yeaaa made it to ACE baby now road to whatever next, lil present imma be doing You tube soon soo ideas will be
    7·2 answers
  • A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause thi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!