1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
5

Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m

aintenance plans are developed: (2 Marks) Select one or more: Computer Software Specification Computer Hardware Specification Computer location or environment Computer Use Computer Speed
Computers and Technology
1 answer:
zimovet [89]3 years ago
5 0

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

You might be interested in
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
ycow [4]

Answer:

Promiscuous mode

Explanation:

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…

✓ Promiscuous mode

7 0
2 years ago
What type of lens was used to take this picture?
Leona [35]

Fish-eye because this is how you would see through a "fish eye" point of view in a rounded tank that is commonly used.

May I please have brainliest

4 0
3 years ago
A 16M X 16 main memory is built using 512K X 8 RAM chips and memory is word addressable.
Yanka [14]

Answer

The answer and procedures of the exercise are attached in the following archives.

Step-by-step explanation:

You will find the procedures, formulas or necessary explanations in the archive attached below. If you have any question ask and I will aclare your doubts kindly.  

7 0
3 years ago
1) Which of the following would you NOT see on a Windows 10 Start menu?
Sati [7]
Task view

I hope this helps you :)
3 0
2 years ago
What is this screen called? (I attached a picture)
Anna11 [10]

Answer:

graph screen is the correct answer

8 0
3 years ago
Read 2 more answers
Other questions:
  • Insert a row above the selected row
    11·2 answers
  • In several languages, the visual development environment is known by the acronym ____.
    12·1 answer
  • For which of the following is a bulleted list more appropriate than a numbered list?
    6·1 answer
  • ANYONE GOOD WITH CODING IN C++
    14·1 answer
  • What are two reasons why tuples exist in Python?
    9·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • Which of the following actions is most likely to be effective in reducing the digital divide at a local level? A Creating an app
    9·1 answer
  • The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.
    10·1 answer
  • What are the routes through with Virus transmitted into computer<br>system?​
    15·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!