1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
6

1. The correct definition of ergonomics is: (a) The correct way to position your feet when in front of electronic equipment. (b)

How to use a computer to view safety software. O (c) The creation and adjustment of products and systems, so that they are comfortable and safe for day to day use. (d) The creation of products and systems that will not be so comfortable so as to cause the user to fall asleep while using it.​
Computers and Technology
1 answer:
fgiga [73]3 years ago
6 0

Answer:

I'd assume it's C.

Explanation:

hope this helps!

You might be interested in
ASCII can be translated into over a million characters, making it a global code. True or false?
satela [25.4K]

The answer is False.  ASCII have at the most 128 different characters.  And these 128 characters mainly represent the Latin Alphabet, meaning that characters of many other alphabet/languages can not be represented.

8 0
3 years ago
Read 2 more answers
How to get the blade out of a pencil sharpener?
agasfer [191]
Poke hole with thin but strong object
Or buy new sharpener
7 0
4 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
When considering the purchase of a major software application, managers need to also consider the following potential downside:
Anastasy [175]

Answer:

The answer is B.The package seldom totally fits the company's needs

Explanation:

7 0
4 years ago
Consumer protection laws are meant to
lord [1]
B) prevent unfair or deceptive business practices.
5 0
3 years ago
Other questions:
  • Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has
    7·2 answers
  • What do you like most about brainly?
    13·2 answers
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • How would you convert an integer value to a float value in Python?
    10·1 answer
  • What does a capitalist economy allow people to do?
    11·2 answers
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th
    13·1 answer
  • PLS HELP subject (Microsoft Excel ) True or False:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!