1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
2 years ago
8

To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat

ions, a(n) ____, which contains a built-in battery, can be used.
Computers and Technology
2 answers:
pickupchik [31]2 years ago
8 0

To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuations, an <u>uninterruptible power supply (UPS)</u>, which contains a built-in battery, can be used.

<u>Explanation</u>:

An uninterruptible power supply (UPS) is a device that allows a computer or server powered up for a short time, when the electricity goes off. UPS device also provides uninterrupted service during power fluctuation.

A battery is inbuilt in the UPS and provides power for few minutes to the computer to shut down it in a proper manner.

UPS is available at affordable cost and can be maintained at low cost compared to generators.

Studentka2010 [4]2 years ago
3 0

To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuations, an UPS, which contains a built-in battery, can be used.

<h3><u>Explanation:</u></h3>

An uninterruptible power supply (UPS) is a thing that enables a computer to continue working for at least a little time when the prime power source is dropped. UPS devices also shield from power breakers.

A UPS comprises a battery that "potencies in" when the machine senses a loss of potential from the primary source.  When all power drops out, any data in your computer's random access memory is eradicated. When power breakers transpire, a UPS prevents the surge so that it does not corrupt the computer.

You might be interested in
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
Ad libitum [116K]

Answer:

a) all cabling hope it helps

3 0
2 years ago
______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide dec
Alex777 [14]

Answer: Data analytics

Explanation:

3 0
2 years ago
PLEASE HELP ASAP (answer is needed in Java) 70 POINTS
8_murik_8 [283]

import java.util.Scanner;

public class MyClass1 {

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     int smallest = 0, largest = 0, num, count = 0;

     while (true){

         System.out.println("Enter a number (-1 to quit): ");

         num = scan.nextInt();

         if (num == -1){

             System.exit(0);

         }

         else if (num < 0){

             System.out.println("Please enter a positive number!");

         }

         else{

             if (num > largest){

                 largest = num;

                 

             }

             if (num < smallest || count == 0){

                 smallest = num;

                 count++;

             }

             System.out.println("Smallest # so far: "+smallest);

             System.out.println("Largest # so far: "+largest);

         }

     }

   }

}

I hope this helps! If you have any other questions, I'll do my best to answer them.

6 0
3 years ago
Given an array a, declared to contain 34 elements, write an expression that refers to the last element of the array.
Mice21 [21]
If the language is zero indexed:

a[ 33 ]
4 0
3 years ago
A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol.
son4ous [18]

Answer:

The answer is "Three-way handshake".

Explanation:

In this mechanism, two processes associated with communication throughout SEO techniques. In this, the sequence of data packets and recognized by the number of exchanges during the threefold handshake process.

  • This method initiating the process between two apps,  Handshaking begins whenever a computer sends the message to its system.
  • The process of the communication system has been established into the two devices,  which simply send many messages, which allow them to settle the protocol for communication.
6 0
3 years ago
Other questions:
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • How do online note-taking tools support students’ academic goals? Check all that apply.
    9·2 answers
  • A number of related records that are treated as a unit is called
    6·1 answer
  • c724 wgu True or false. A storage device consists of all the components that work together to process data into useful informati
    10·1 answer
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • Why is the song Twinkle Twinkle Little Star an example of ternary form?
    10·1 answer
  • Super Scores
    11·1 answer
  • How to determine the critical crack size for a<br> plate
    15·1 answer
  • What keyword is used in Java to create a parent/child relationship between two classes?
    14·1 answer
  • Tinh T = a1*a2*a3*...an<br><br> Giúp em với
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!