1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
14

How do i protect my computer from electrical spikes

Computers and Technology
2 answers:
trasher [3.6K]3 years ago
6 0
<span>Verify electricity levels
</span><span>Confirm that supply circuits are grounded properly
</span><span>Don't overload circuits
</span><span>Use a UPS/surge protector
</span><span>Properly calculate UPS/surge protector capacity
</span><span>Replace damaged or faulty UPS/surge protectors
P</span><span>rotect telecommunications links
</span><span>Test power supplies
</span><span>Maintain proper operating temperatures
</span><span>Maintain proper insurance</span>
Setler [38]3 years ago
5 0
I believe the answer is bloody purple poop that is the size of an extra large grilled cheese 
You might be interested in
one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or
Vinil7 [7]

Answer:

1. The data will not be tallying up - there will great variations and deviance.

2. There will be not enough data points

Explanation:

The management style, though it uses one manager, is not devoid of problems in the system. For example, there will be great difficulty in the collection of accurate data to properly define the system. This presents a great misinformation on the outcome of the data process. This is likely to be caused by the first factor that is the data having a lot of discrepancies. The discrepancy causes the data to be meaningless in terms of the trends displayed. In addition, the lack of enough points posses a challenge to the data collection and processing procedure. The data base management system can be used to concentrate data on a central point of reference.

3 0
3 years ago
Rafael needs to add a title row to a table that he has inserted in Word. What should he do? Use the alignment options. Use the M
raketka [301]

Answer:

Answer is C

Explanation:

6 0
2 years ago
Read 2 more answers
Electronically, or on paper draw a Binary Search Tree using the values below. Note: Insert each value into the tree in order fro
maria [59]

Answer:

A.)  in order traversal - 9 32 35 14 27 25 2 7 29

B.) pre-order traversal - 25 14 32 9 35 27 7 2 29

C.) post-order traversal - 9 35 32 27 14 2 29 25

Explanation:

Given - 25, 14, 7, 32, 27, 2, 29,9,35

To find - On a separate electronic page or sheet of paper:

1. List the values using in order traversal

2. List the values using pre-order traversal

3. List the values using post-order traversal

Proof -

Given values are -

25, 14, 7, 32, 27, 2, 29,9,35

1.)

In order is -

9 32 35 14 27 25 2 7 29

2.)

Pre-order is - (Root left right)

List nodes of first time visit

25 14 32 9 35 27 7 2 29

3.)

Post-order is - (Left Right Root)

List nodes of third time visit

9 35 32 27 14 2 29 25

5 0
3 years ago
In a spreadsheet, what is the rectangular space where a row meets a column?
e-lub [12.9K]
This space is called a cell
6 0
2 years ago
Read 2 more answers
Typically, you need to score _____ or higher on an AP exam to receive college credit for the AP course in the subject tested by
ss7ja [257]

the answer is A). 3 or higher

7 0
3 years ago
Read 2 more answers
Other questions:
  • How do the search methods differ for primary and secondary data?
    10·2 answers
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • What can you do to help create a safe online environment?
    8·2 answers
  • Who is gossip girl.....
    8·2 answers
  • How are water resources and air adversely affected by environmental degardation?​
    8·1 answer
  • How to block admin on school chromebook managed by admin
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!