1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
14

Which device protects computer systems from voltage fluctuations?

Computers and Technology
2 answers:
nika2105 [10]3 years ago
7 0

Answer:

A  surge protector protects computer system from voltage fluctuations

Explanation:

voltage fluctuations are known as rapid and dangerous changes in the voltage supply to an electrical equipment, this occurs when an equipment requiring higher load is connected to the power supply of  the equipment.  they are also know as voltage spikes.

A surge protector is an electrical device used to protect all electrical appliances including computer system from dangerous voltage spikes and power surges, it grounds excessive voltage thereby protecting the equipment from damage and preventing electrical fires in the process  

meriva3 years ago
6 0
A fuse protects computer system from voltage fluctuations
You might be interested in
The lcm of two numbers can be equal to the smallest number in the set. true false
jarptica [38.1K]

Answer: False

Explanation:

8 0
3 years ago
Read 2 more answers
CALL NOW $+1-855-241-6569$ aol mail not working on windows ## aol desktop gold email not working||USA||**2020*
LenKa [72]

Answer:

extra 5 points lol

Explanation:

6 0
3 years ago
Why is web arnea of so much commetition today
Sonja [21]

Answer:

try checking your internet or reset your computer if that still dosnt work try putting all your stuff on an USB stick and then after you did that factory data reset your computer and that should work but before you reset your computer take it into a computer specialist

Explanation:

8 0
3 years ago
Who initially developed what is now known as the internet?
Alinara [238K]

Answer: The correct answer is scientist Robert Kahn and Vint Cerf in a project funded by the US Department of Defense.

Explanation: The first workable prototype of the Internet was developed by Robert Kahn and Vint Cerf in the late 1960s with the development of ARPANET, or the Advanced Research Projects Agency Network. This project used packet switching to allow multiple computers to communicate on a single network and was originally funded by the US Department of Defense.

The technology continued to grow in the 1970s after scientists developed Transmission Control Protocol and Internet Protocol, or TCP/IP, which is a communications model that set standards for how data could be transmitted between multiple networks. This was followed in 1990 by the invention of the World Wide Web by Tim Berners-Lee. This is the most common way for people to access the information that is on the internet.

7 0
3 years ago
Read 2 more answers
Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnotice
Romashka [77]

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

  • APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.
  • Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

6 0
3 years ago
Other questions:
  • A low-level language has a low level of ___________ because it includes commands specific to a particular cpu or microprocessor
    5·1 answer
  • Vitamins and minerals dissolve easily in water.True or false?
    5·1 answer
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • Difference between switch case and if else statement.​
    11·1 answer
  • "in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y?"
    11·1 answer
  • The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry? horiz
    14·2 answers
  • What is an automatic update and when should you use it
    10·1 answer
  • What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
    13·1 answer
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
  • which of the following statements about the evolving relationship between traditional newspaper operations and blogging is true?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!