1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
9

What is the best way to protect computer equipment from damage caused by electrical spikes?

Computers and Technology
2 answers:
Nat2105 [25]3 years ago
4 0
Plug equipment into a surge protector because that will take most of the spike of electricity. The plugging everything via USB will be okay if it is connected to a surge protector. Turning off the equipment when not in use will only make the battery live longer if it gets spiked while it is off it will still be messed up. Recharging equipment is only good for when you don't have any power and need to use this certain device. So now that i have gone over all of the options it should be clear that plugging your electronics into a surge protector is best out of all of the options.
suter [353]3 years ago
3 0

Answer:

the short answer would be D plug equipment into surge protector

Explanation:

You might be interested in
When importing data using the Get External Data tools on the Data tab, what wizard is automatically
Dvinal [7]

Answer: text import wizard

Explanation:

6 0
2 years ago
Which of the following operations would best allow you to place 3D building models at their proper height on the terrain (e.g.,
arsen [322]

Answer:

The answer is "Option C"

Explanation:

Base heights are related to it as measurements of height or z-values as they are extracted by mathematics which serves to define the ground of that same world. Once applying a datatype, it can be any entire amount, that will become the level of the function in meters beyond the ground, and wrong choices can be described as follows:

  • In option A, It is a part of extra dimensions object, that's why it is wrong.
  • In option B, It wrong because the offset tool allows the quick and easy offsetting of the lines.
  • In option D, It emphasizes the recovery charts, that's why it is incorrect.
5 0
3 years ago
Why was unicode invented?
lilavasa [31]
Unicode is a universal computing standard to represent texts in most writing systems. It was invented to store most of the world's characters. It started during 1987. Joe Becker from Xerox was the one who made a proposal for Unicode.
6 0
3 years ago
Read 2 more answers
A device is sending out data at the rate of 1000 bps. How long does it take to send
vredina [299]

Answer:

0.01 second ; 0.008 seconds; 800 seconds

Explanation:

Given that:

Sending rate = 1000 bps

Rate of 1000 bps means that data is sent at a rate of 1000 bits per second

Hence, to send out 10 bits

1000 bits = 1 second

10 bits = x

1000x = 10

x = 10 / 1000

x = 0.01 second

2.)

A single character 8 - bits

1000 bits = 1 second

8 bits = (8 / 1000) seconds

= 0.008 seconds

3.)

100,000 characters = (8 * 100,000) = 800,000

1000 bits = 1 second

800,000 bits = (800,000 / 1000)

= 800 seconds

4 0
2 years ago
When virtualization is used and bare-metal solutions are implemented, what is the item that resides between the virtual machines
Yakvenalex [24]

That's the hypervisor.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
    9·1 answer
  • I need help answering these questions!
    11·1 answer
  • ¿Es especial que mi cumpleaños sea el día de San Valentín?<br><br> si o no
    11·2 answers
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • Create a dictionary password cracker or a brute force
    13·1 answer
  • Write a SELECT statement that returns three columns: EmailAddress, OrderID, and the order total for each customer. To do this, y
    14·1 answer
  • In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
    10·1 answer
  • Which of the following is NOT a reason to include comments in programs
    10·2 answers
  • What starts with p and ends with orn
    15·2 answers
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!