1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
4 years ago
5

Describe three ways to protect the computer and all peripheral devices from damage

Computers and Technology
1 answer:
omeli [17]4 years ago
3 0

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

You might be interested in
A byte in memory is identified by a unique number called its
Murrr4er [49]
It is identified by its address number.
4 0
4 years ago
I’m order to protect your passwords, don’t use easy-to-guess information, don’t share your passwords, and NEVER change your pass
Elena L [17]

Answer:

true!

Explanation:

its better to know your password :))

3 0
3 years ago
Just-in-time management could be best defined in which of the following ways?
Tamiku [17]
The right answer for the question that is being asked and shown above is that: "c.)studying the actions and efficiency of workers." Just-in-time management could be best defined in the way of <span>c.)studying the actions and efficiency of workers</span>
4 0
4 years ago
Read 2 more answers
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
Discuss the purpose of these Windows CLI commands
yanalaym [24]

Answer:

 The window CLI command in the computer is basically stand for the command line interface. The command line interface is basically define as interacting with the various computer programs where the users use the command in the program by using various command lines.

The basic purpose of the CLI commands is that it takes less resources of the computer system. In earlier year of the computing this command used as a standard way for interacting with the computer other than mouse.

The command line interface (CLI) is basically handle the interface of the program. It is also known as command line processor.

7 0
3 years ago
Other questions:
  • A client has macular degeneration resulting in moderate visual impairment. The client works as a data entry clerk and wants to c
    15·1 answer
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
    12·1 answer
  • Are self driving cars essential for the future of transportation
    10·1 answer
  • How would you create a tint of a color?
    6·1 answer
  • Next, Kim decides to include a diagram of a frog’s life cycle in her presentation. She wants to use an image that is part of a p
    15·2 answers
  • Fill up the blank:- The picture that graphically represents the items you use in Windows is called a/an .......
    5·1 answer
  • Help a brotha out..................
    10·1 answer
  • A search for reliable information is a search for what?
    14·1 answer
  • The act of getting information out of memory storage
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!