1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
2 years ago
6

1. The correct definition of ergonomics is: (a) The correct way to position your feet when in front of electronic equipment. (b)

How to use a computer to view safety software. O (c) The creation and adjustment of products and systems, so that they are comfortable and safe for day to day use. (d) The creation of products and systems that will not be so comfortable so as to cause the user to fall asleep while using it.​
Computers and Technology
1 answer:
fgiga [73]2 years ago
6 0

Answer:

I'd assume it's C.

Explanation:

hope this helps!

You might be interested in
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
1
brilliants [131]

Answer:

The appropriate answer is "Distributed system".

Explanation:

  • Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of  mainframes, processors as well as stationary machines, it can be programmed.
  • A distributed machine has massive program modules, which operate as a single device on many machines.
6 0
3 years ago
Select the correct answer. Which of these is a function of the marketing team of a game development studio? A. creating art elem
Alexus [3.1K]

Answer:

C. testing

Explanation:

4 0
3 years ago
Read 2 more answers
You need to immediately terminate process id 2129. which command should you use?
kolezko [41]
<span>The kill -9 2129, kill -s KILL 2129, or kill -KILL 2129 commands</span>
8 0
3 years ago
Def pig_latin(word): """ ------------------------------------------------------- Converts a word to Pig Latin. The conversion is
Virty [35]

def pig_latin(word):

   if word[0].lower() in 'aeiou':

       word = word + 'way'

   else:

       t=''

       for x in range(len(word)):

           if word[x].lower() in 'aeiou':

               break

           if word[x].lower() == 'y' and x>0:

               break

           else:

               t+=word[x].lower()

       if word[0].isupper():

           word = word[len(t):]+word[:len(t)].lower()+'ay'

           word = word.title()

       else:

           word = word[len(t):]+word[:len(t)].lower()+'ay'

   return word

word = 'test'

pl = pig_latin(word)

print(pl)

I wrote my code in python 3.8. I hope this helps.

5 0
3 years ago
Other questions:
  • ORANGE COLORED SIGNS AND FLAGS MEAN THAT YOU MUST BE ALERT FOR:
    8·2 answers
  • In 1-2 sentences, describe how to change the font.
    8·2 answers
  • What is the best use of a line chart? to show parts of a whole while emphasizing specific data to compare and contrast discrete
    9·2 answers
  • Write a program to convert a fraction to a decimal. Have your program ask for the numerator first, then the denominator. Make su
    10·1 answer
  • HELP PLZ !!
    13·1 answer
  • What are the cues that a website is safe to use for exchanging sensitive information?
    10·1 answer
  • Write a MATLAB program to accomplish the following: Create two vectors, a and b, where vector a contains all positive integers l
    10·1 answer
  • Given a number count the total number of digits in a number
    12·1 answer
  • Each bolt diameter in the standard system can have one of two thread pitches, or UNE.​
    10·1 answer
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!