1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
9

What is the best way to protect computer equipment from damage caused by electrical spikes?

Computers and Technology
2 answers:
Nat2105 [25]3 years ago
4 0
Plug equipment into a surge protector because that will take most of the spike of electricity. The plugging everything via USB will be okay if it is connected to a surge protector. Turning off the equipment when not in use will only make the battery live longer if it gets spiked while it is off it will still be messed up. Recharging equipment is only good for when you don't have any power and need to use this certain device. So now that i have gone over all of the options it should be clear that plugging your electronics into a surge protector is best out of all of the options.
suter [353]3 years ago
3 0

Answer:

the short answer would be D plug equipment into surge protector

Explanation:

You might be interested in
Free points,
Radda [10]

Answer:

thank you i really needed that and plus i just lost point by putting a question i mean i was asking for help and i still don't know the answer

hope u feel better

5 0
3 years ago
Read 2 more answers
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
What is machine learning
Katyanochek1 [597]

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

5 0
3 years ago
Read 2 more answers
A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
BARSIC [14]
The answer is A) digital signature
8 0
3 years ago
The color gradient is
Kipish [7]
A range of position dependent colors
8 0
3 years ago
Other questions:
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • To make sure that you do not get too tired when typing for long periods, how often should you get up and stretch? Every 15 minut
    9·1 answer
  • Enter a formula in cell b7 to calculate the average value of cells b2:b6
    13·1 answer
  • HELP 11 pointsw to the person who helps me
    11·2 answers
  • Does white space have visual weight? Yes or No
    7·2 answers
  • 11) A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one chil
    7·1 answer
  • 3. Why is human resource plan made​
    11·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
  • Difine the term pigment​
    14·3 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!