WHAT ARE THE RISK OF DUST​

Answers

Answer 1

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out


Related Questions

Help me get this
Also use these commands

Answers

sry for this but you shouldn’t post thsi again and put it closer cause no one can see the pic

Someone please tell me what lambda does! in python!! I need help

Answers

Answer:Lambda Technologies is the he is the group name encompassing a Premier materials research laboratory with an engineering and production enterprise dedicated to the development and optimization of of surface treatments our company has been selling materials for over four decades with over 150 years of combined experience in more than 20,000 research programs we are proud of our corporate legacy in record or around standing performance in meeting or customers needs room training all excellence groundbreaking innovation and committed hard-working employees we are able to provide more than just data we provide complete service enhancement solutions are resources that can include all of our technical papers he studies defraction notes and downloads we are a well known source of research in education materials on the understanding measurement and controls of residual stress

Explanation:

What happens if an email server cannot find a matching username or the mailbox is full

Answers

Answer:

if the email server cannot find a matching username, you need to verify your email. I think at least.

Explanation:

Answer:

it do not send your e-mail

Why is it a good practice to use functions in programming? Select the best answer.

A.It is faster to run the code using functions.

B.Functions allow us to reuse common code.

C.All of these are correct.

D.It is easier to debug the code using functions.

Answers

Answer:

C. All of these are correct answer from the options for the question that u have given...

The good practice to use functions in programming is all of these are correct. The correct option is C.

What are functions in programming?

The repetitious codes are removed by breaking a program down into functions, which not only reduces the size of the program but also improves its effectiveness. If there were repetitive codes, we would need to alter the program from several locations rather than just one.

As a result, organizing programs into functions aid in good administration and shortens programs by removing repeated code. A functional programming language is a particular kind of language that allows for the creation and application of pure mathematical functions, along with the use of conditional expressions and recursion to carry out various computations.

Therefore, the correct option is C. All of these are correct.

To learn more about functions in programming, refer to the link:

https://brainly.com/question/24297344

#SPJ6

Where are methods listed in a UML class diagram showing three parts?
in the top third of the diagram
in the middle third of the diagram
in the bottom third of the diagram
anywhere in the diagram a lowercase m is shown

Answers

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

Which of the following is NOT an acceptable way to create a color?


A) O "cyan"
B) O "#ff2341"
C) blue
D) "RGB (0, 15, 234)"

Answers

The option that is not an acceptable way to create a color is blue.

How can I create a color?

There are a lot of ways to create  some unique color  such as the additions of  colors together.  An example is the addition of purple, orange, and green together.

Note that blue on its own cannot create another color and as such, The option that is not an acceptable way to create a color is blue.

Learn more about color from

https://brainly.com/question/4431200

#SPJ2

I really need help with this question, I can’t fail this please :) tysm

Answers

Answer:

i think its the third one, i hope this helps

Explanation:

Part B
There are many different ways that a user could tell us that he or she would like to add two numbers in our calculator program. The user could type “add”, “Add”, “ADD”, or “+”, to name a few possibilities. Of course, as humans, we know exactly what is meant, even if the word is capitalized. But the Python Interpreter can’t tell that “add” is the same as “Add”.

We can use a list to make our program a bit more robust. We can also use the IN operator to check for certain values in that list. Take a look at this if statement’s opening line:

if operation in [“add”, “Add”, “ADD”, “+”]:
Make those changes in your program and verify that it works.
Consider all of the possible words the user might enter to subtract, multiply, or divide.
Rewrite the first lines of each of your if statements to use lists.
Thoroughly test your new program, trying out each of the four operations.
Share the link to your Python code in REPL.it with your teacher by clicking on the share button and copying the link.

Answers

Answer:

The Python programming language is a great tool to use when working with numbers and evaluating mathematical expressions. This quality can be utilized to make useful programs.

This tutorial presents a learning exercise to help you make a simple command-line calculator program in Python 3. While we’ll go through one possibile way to make this program, there are many opportunities to improve the code and create a more robust calculator.

We’ll be using math operators, variables, conditional statements, functions, and handle user input to make our calculator.

Prerequisites

For this tutorial, you should have Python 3 installed on your local computer and have a programming environment set up on the machine. If you need to either install Python or set up the environment, you can do so by following the appropriate guide for your operating system.

Step 1 — Prompt users for input

Calculators work best when a human provides equations for the computer to solve. We’ll start writing our program at the point where the human enters the numbers that they would like the computer to work with.

To do this, we’ll use Python’s built-in input() function that accepts user-generated input from the keyboard. Inside of the parentheses of the input() function we can pass a string to prompt the user. We’ll assign the user’s input to a variable.

For this program, we would like the user to input two numbers, so let’s have the program prompt for two numbers. When asking for input, we should include a space at the end of our string so that there is a space between the user’s input and the prompting string.

number_1 = input('Enter your first number: ')

number_2 = input('Enter your second number: ')

After writing our two lines, we should save the program before we run it. We can call this program calculator.py and in a terminal window, we can run the program in our programming environment by using the command python calculator.py. You should be able to type into the terminal window in response to each prompt.

Output

Enter your first number: 5

Enter your second number: 7

If you run this program a few times and vary your input, you’ll notice that you can enter whatever you want when prompted, including words, symbols, whitespace, or just the enter key. This is because input() takes data in as strings and doesn’t know that we are looking for a number.

Explanation:

Hope This helps with your coding

( If it doesn't then sorry)

True or false: Machine learning lets computers
learn how to do things they weren't
specifically programmed to do.

Answers

Answer:

True

Explanation:

PLEASE ANSWER ASAP!!!

Name the error that can happen as a result of adding binary numbers.

Answers

Answer:

Sometimes, when adding two binary numbers we can end up with an extra digit that doesn't fit. This is called an overflow error. This sum is fine as the original numbers have two digits, and the result of the sum also has two digits.

Explanation:

Type the correct answer in the box. Spell all words correctly.
Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?
To prevent strain and key correctly, Ben should
his fingers gently over the keys with his wrist in a flat position.

Answers

Explanation:

Type the correct answer in the box. Spell all words correctly.

Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?

To prevent strain and key correctly, Ben should use his fingers gently over the keys with his wrist in a flat position.

If Tamya makes $1000.00 gross monthly income and her total payroll deductions are $294.00, what is her net income?

Answers

Answer:

$751

Explanation:

From the question we have the following information;

Gross income = $1000.00

Deductions =   $294.00

Now we know that;

Net income = Gross income - Deductions

Therefore;

Net income = $1000.00 -  $294.00

Net income = $751

Boolean Operators help filter information when completing a ________ ________

A. web search
B. column making​

Answers

The answer would be A: Web Search :)

You have a database with three tables: one each for products, suppliers, and distributors. You need to locate the product ID number for hammers and find out who supplies them. Which database component would perform this task?

A. Form
B. Table
C. Report
D. Query

Answers

Answer:

I would say A... But that's just me

Explanation:

Hopefully this helps you :))

Answer:

The answer is C: Query

Explanation: I just did it in Edge 2021. Trust me its right! I hope this helps! :)

Choose all items that are true about the two example of HTML shown on the right.
A. Example 1 will display differently than example 2 in a web browser.
B. They are styled differently, but will look the same in a web browser.
C. Example 2 is easier to analyze and repair.
D. The styling in example 2 is required by modern web browsers.

Answers

Answer:

“They are styled differently, but will look the same in a web browser” & “The styling in example 2 is required by modern web browsers”.

Explanation:

Answer:

B and C

Explanation:

definition of data redundancy​

Answers

Answer:

Data redundancy occurs when the same piece of data exists in multiple places, whereas data inconsistency is when the same data exists in different formats in multiple tables. Unfortunately, data redundancy can cause data inconsistency, which can provide a company with unreliable and/or meaningless information

Can someone tell me 5 facts about Registers and RAM, please?

Answers

[tex]\int\limits^a_b {x} \, dx \left \{ {{y=2} \atop {x=2}} \right. \lim_{n \to \infty} a_n \neq \neq \geq[/tex]Answer:

A register is a temporary storage area built into a CPU. ... The instruction register fetches instructions from the program counter (PC) and holds each instruction as it is executed by the processor. The memory registers are used to pass data from memory to the processor.

PLS MARK BRAINLIEST!!!

PLEASE

:

Read the code snippet below and determine which markup language it is:



Sound Card
Creative Labs
Sound Blaster Live
80.00



The code is an example of the (Blank) markup language.

Answers

Answer:

Sound Card

Explanation:

what is the importance of knowing and following a step /steps of the personal computer disassembly

Answers

So that in case of emergency caomeone spills food or liquid you know what precautions to take

Answer:

emergency pils at a doctor

Choose the best option to answer each question on design or development.

Answers

i am sorry. I cannot see the options...

Answer:

design

requirements

code

(in that order)

Explanation:

it was right on edge

Can someone please help me with this assignment on Edhesive. I just need the storyboard and code. thank you.

Answers

Answer:

i need points im so sorry

Explanation:

True or False? Security code is almost always open source!
True
False

Answers

Answer:

its true

Step-by-step explanation:

Security code is almost always open source is a false statement. Check more about  Security code below.

What is security code?

The  Security code  is known to be the number that is known to be found in the front or back of any credit cards. It is made just  for security use.

Conclusively,  Security code is almost always open source as one cannot get it except one is told about it. Therefore, it is not an open source.

Learn more about  Security code from

https://brainly.com/question/26260220

A website is unencrypted. Which tool can be used to stop the website’s traffic and analyze the information on it?

Answers

Answer:

Explanation:

Web analytics is the computation, amassing, study and reporting of web data for purposes of accepting and adjust web custom. although, Web analytics is not just a method for measuring web traffic but can be used as a tool for job and market study, and to determine and become better the effectiveness of a website. Web analytics applications can also help companies measure the broadcast advertising attacks. Web analytics support information about the number of users to a website and the number of page views. It helps measure traffic and popularity trends which is useful for market study.

how many people in the world

Answers

Answer:

Around seven billion people

ayo which one is better genshin impact or fortnite, i personally prefer genshin impact since it's not boring and it has so many other things you could do when you're not doing a story quest or daily commissions

Answers

Answer:

Genshin Impact and you can fight me on it.

Explanation:

The game has way more to explore and offer with different fighting styles which include Magic and Swords fighting. It also has more story and I appreciate that!  

The side quests to get tedious though so the final rating  is 8.79//10.00

Answer:

genshin

Explanation:

1 Sales tax
5.00%
Use the image to help you answer the question.
Which formula will tell you the total "Before tax"
price using cell references?

A. =3+2+50
B. =B8
C. =B4+B5+B6
D. =B4*B5*B6

Answers

Answer:

Future value (FV) tells you the value in the future of money deposited in a bank account ... We can use Excel to make a table of how the future value grows with the ... 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. A. B. C. D. E. F. Interest. 6% ... To answer the question, we compute the IRR of the investment and compare it.

Explanation:

Answer:

C. = B4+B5+B6

Explanation:

Edge 2020

if you hard working right now go to this EASY question


#BRAINLY and I will give you brainlist something I forgot what's it called for your hard work

Answers

Ok, where is the question so I can try my best?
Whats the question??? Lol

Write a program to convert centigrade to Kelvin. It should display value in centigrade and then the value in Kelvin just as you displayed squares in the previous question. The range to be followed for this conversion is from 50-100 degree celsius.

So, it should look like this:
1. Centrigrade: 50 --> Kelvin: 323.15
2. Centrigrade: 51 --> Kelvin: 324.15
3. Centrigrade: 52 --> Kelvin: 325.15
etc.

Answers

Answer:

for degree in range(50, 101):

   kelvin = degree + 273.15

   print("Centrigrade: {} --> Kelvin: {}".format(degree, kelvin))

Explanation:

*The code is in Python.

Create a for loop that iterates from 50 to 100 (Note that the starting value is included, but the ending value is not included in the range method. That is why you need to write range(50, 101) to iterate from 50 to 100)

Convert the centigrade to kelvin using formula (Note that the degree variable represents the each centigrade degree from 50 to 100 and you need to add 273.15 to convert it to Kelvin)

Print the result as in requested format

Search and read all phenomenon listed below and identify the ICT platform they used.

PHENOMENON

1. EDSA and Cardinal Sin
2. EDSA dos
3. Million people march against Pork Barrel
4. Disaster relief operations and mobilization​

Answers

Answer:

1. Radio broadcast

2. Text brigades

3. Social media and change website

4. Internet and text brigades

Explanation:

I'm having issues posting my answer. Please go through the attachment.

Answer:

1. Radio broadcast

2. Text brigade

3. Social media and change website

4. Internet and text brigades

Explanation:

ICT can serve as a medium through which change can be effected in a society.

1 EDSA and cardinal

The ICT used here was the radio.

2. EDSA dos

The ICT that was used her was the text brigades.

3. Million people march

The ICT used here was social media and the change website.

4. ICT used here is internet and text messaging.

Please I have provided background information to what caused these events. I typed my answers but the editor did not allow me post it.

Thank you.

In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the magnetic stripe on these cards. (b) State two ways that the supermarket computer would check the credit card.

Answers

Answer:

Explanation:

Two items on the magnetic strip are, Credit Card info and Balance

Two ways supermarket may check are the PIN pad you are using to pay or their reciept system.

Other Questions
HELP GIVING BRAINLIEST!!!!!!!!!!!!!! Yo el yogur en el desayuno. O tomo O toma O compartes O comparte De ejemplos de interjecciones A basketball league awards 2 points for a win and 1 point for a tie. One team has four more wins than ties and has earned 32 points. How many games has the team won? Could someone explain how to do this, I have no idea how... The acceleration of the object may be zero and the velocity of the object may not be equal to zero Logan took out a $600 loan 2 years ago. He paid back $690. This included the original loan amount and the interest charged to him. What was the annual interest paid Logan paid? Show all work or explain in detail how you got your answer. Pt. A- Joe bob G gallons of gasoline for $2.85 per gallon and sea cans of oil for $3.15 per can. what expression can be used to determine the amount Joe spend on gasoline and oil. Pt. B- joe spent $15. He bought w cans of oil. About how many gallons of gasoline did he buy?A- 2.5B-3C-3.5D-4 4 - (2x - 3) 3 what is the value of x An almost infinite variety of types of love exists. The love for parents for their children is very different from the love of brothers for their sisters, of wives for their husbands, of kids for their pets, and on and on.-Choose two (2) people in your life whom you love, and explain how your love for each of them is different. Lucy uses a code to open a lock.The code is a letter followed by a 2-digit number.The letter is L or U.The number is a prime number between 20 and 30Write down all the possibilities for Lucy's code. plz answer all of them Which properties of operations could be used to show that (-5p + 9) + (-2 + p) is equivalent to (-5p) + p + 9 - 2? Guided PracticeDetermine whether the function rule models discrete data, continuous data, or neither.A hardware store sells bolts for $.35 apiece. The function C(p) = 0.35p relates the total cost of the bolts to the number p purchased.A.neitherB.continuous dataC.discrete data Read the excerpt from the song, "Brother, Can You Spare a Dime?"They used to tell me I was building a dreamWith peace and glory ahead-These lines emphasize the pre-Great Depression belief thatpeace and glory were the ultimate goals of WWI.O the American dream was beyond reach.American businesses were imperishable.there would always be work available. If my radius is 10 what is my circumference Capitalism and communism please help me what is the value of 4.112-8 Which of the following constants can be added to x ^2 - x to form a perfect square trinomial?1/41/21urgent Angles A and B are adjacent angles and are supplementary. The measure of A is (3x+10), and the measure of B is (12x+35).Write an equation that can be used to determine the value of x.Enter the correct answer in the box. the original price of a pair of sneakers is $89.00 the store advertizes a sale for 15% off what is the sale price for the sneakers