1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
4 years ago
5

Describe three ways to protect the computer and all peripheral devices from damage

Computers and Technology
1 answer:
omeli [17]4 years ago
3 0

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

You might be interested in
Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group nor
zhuklara [117]

Answer:

profiles

Explanation:

<h2><u>Fill in the blanks </u></h2>

Anomaly detection systems make use of <u> profiles</u> that describe the services and resources each authorized user or group normally accesses on the network.

5 0
3 years ago
Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage informati
Katarina [22]

Answer:

Embedded System

Explanation:

Embedded System are designed to make physical products and devices and helping in diagnose problems as well.

3 0
3 years ago
Establishing a telephone call would be impossible without signaling.<br><br> True or False
musickatia [10]

Answer:  True.

Explanation:

When a user wants to make a phone call, he needs to inform to the called party, that he wants to call him.

The only way to do this, is setting up a connection between the two phones, which is started by the calling party informing to the phone switch which is directly connected to, that he wants to make a call, picking up the phone, which modifies his connection state, making him available for calling.

The switch then signals him (sending him an audible call tone) so he can send the digits that identify the called party.

When the destination switch identifies the called user, signals him also (sending in this case a ringing tone).

When he picks up his phone, answering  the call, the connection is set up, and both people can talk each other.

Without all this signaling process, it would be completely impossible to set up the call.

6 0
3 years ago
1. Which of the following accurately describes a piece of work that contains a Creative Commons: No Derivative Works license?
frez [133]
1. B
2. C
3. C
Just did the test, these are the right answers!
3 0
3 years ago
Read 2 more answers
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
4 years ago
Other questions:
  • On a chart created in excel, the horizontal axis is also called the ____.
    15·1 answer
  • A technique that’s used to route traffic to different destinations, depending on factors like location, congestion, or link heal
    10·2 answers
  • For your biology class, you will be giving a presentation of the findings of a plant growth experiment. Which application is bes
    7·1 answer
  • Fred has just added DSL service at his home, with a separate DSL modem and consumer-grade router with four Ethernet ports. Fred
    13·1 answer
  • Select the correct answer.
    9·1 answer
  • Write a program to calculate the farthest in each direction that Gracie was located throughout her travels. Add four print state
    10·1 answer
  • In a paragraph, describe in detail a practical real-world example of where you would implement a singly-linked list and why a si
    8·1 answer
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
  • What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that
    9·1 answer
  • You are asked to analyze events in a firewall log that occurred six months ago. when you analyze the log file, you notice events
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!