1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
5

Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m

aintenance plans are developed: (2 Marks) Select one or more: Computer Software Specification Computer Hardware Specification Computer location or environment Computer Use Computer Speed
Computers and Technology
1 answer:
zimovet [89]3 years ago
5 0

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

You might be interested in
In Asch’s study which of these lowered conformity rates
skad [1K]

Answer:

D. all of these are correct

Explanation:

option d is correct answer

3 0
3 years ago
Read 2 more answers
While working on a presentation, Jack lost all the data because he switched off his computer unknowingly. On which of these comp
Lelechka [254]

Random Access memory(RAM) stores data temporary until the computer is switched off

3 0
3 years ago
Read 2 more answers
What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res
Basile [38]

Answer:

Domain controller                    

Explanation:

  • A domain controllers is a server which acknowledges authentication requests and validates users access on the computer network in order to use the resources.
  • This is done by the domain controller by verifying the username and password.
  • It also allows user to access the other domain and also access the resources of other domain.
  • For example there is a network of multiple computers and each computer requires authentication i.e user is asked to provide the username and password.
  • Authenticating every computer and managing is not easy so a computer is appointed this task of authentication other computers.
  • This computer  is called domain controller which can easily maintain these authentication details of the users.
  • The authentication information (login details) of users, computers and shared resources is saved in Active Directory database.
  • If a user requests access to the resource via login then the login details (username and password) of the user should match with that stored in the Active Directory in order to grant access to the user.
  • Domain controller enables resources sharing and is good for large networks and provides with improved security.
4 0
3 years ago
Jenny is working on a laptop computer and has noticed that the computer is not running very fast. She looks and realizes that th
Ulleksa [173]

Answer:

1. She Should Order C. SO-DIMM DDR 3

2. a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.

Explanation:

8 0
3 years ago
The______ technique helps you explode possible risks by providing access to risk areas identified in the past. It also provides
Natalka [10]

Answer:

Threat and Hazard Identification and Risk Assessment

Explanation:

Its the threat and hazard identification and risk assessment technique that helps in exploding possible risks, which have been identified in the past. Also, it lists the solutions that were being brought to use for getting rid of the risk, and also list the outcome. Thus, you get the complete picture of the risk involved through the THIRA. And thus, you can easily get rid of them.

6 0
4 years ago
Other questions:
  • Copyrighted software that is distributed at no cost for a trial period is called?
    12·1 answer
  • Is I5 9100 is better than i5 9400
    6·1 answer
  • Clep allows students to do all of thw following except which?
    9·2 answers
  • A beginning driver may tend to oversteer. This means the driver what? Btw Cars are technology so that is why it is under Compute
    11·1 answer
  • Using the find and replace tool would be most appropriate when
    6·2 answers
  • Write a program that prompts the user for an integer and then prints all prime numbers up to that integer.
    7·1 answer
  • What reason best explains why complementary colors are important to web page design?
    5·2 answers
  • If an image has only 4 colors, how many bits are necessary to represent one pixel’s color? Describe a new custom encoding that u
    8·1 answer
  • Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
    7·1 answer
  • To view a friend's calendar, you must request access.<br> A) True<br> B) False
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!