Describe three ways to protect the computer and all peripheral devices from damage

Answers

Answer 1

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. 


Related Questions

What is jpeg? what considerations have to be kept in mind with jpeg?

Answers

Joint Photographic Experts Group

A right turn should be from the right lane into the right lane of the roadway entered. True or false. A. True B. False

Answers

it depends if it's America or another continent but assuming it's America I would say A.True

Which of the following definitions describes a receptacle ground fault circuit interrupter (GFCI)? A. Includes an extension cord B. Protects a worker by increasing the duration of an electrical shock C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet D. Replaces a circuit breaker on the main circuit board Suspend Assessment

Answers

C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet

_____ does not allow changing service or bandwidth because a website allows illegal media sharing

Answers

Final answer:

Net Neutrality does not allow changing service or bandwidth because a website allows illegal media sharing.

Explanation:

Net Neutrality ensures that internet service providers treat all online data equally, prohibiting discrimination or favoritism. It doesn't permit altering service or bandwidth based on the content of websites, including those facilitating illegal media sharing. Upholding Net Neutrality principles means ISPs can't selectively throttle or block access to specific sites or services.

Instead, they must provide consistent and nondiscriminatory access to all online content. This ensures fair and open access to information and services for users, regardless of the nature of the content they access. Thus, Net Neutrality safeguards against arbitrary restrictions based on the legality or illegality of online activities.

To research scholarly information for her history project, Lucy should most likely visit a

a .com website.
b .edu website.
c .gov website.
d .org website.

Answers

Answer: The correct answer is choice b, a .edu website.

Explanation: In order to research scholarly information for her history project, Lucy should most likely visit a .edu website. Websites that end in .edu are normally educational institutions, which which be the most likely to contain scholarly articles.

To research scholarly information for her history project, Lucy should most likely visit a .edu website. The correct option is b.

What is a website?

A web page (or webpage) is a World Wide Web hypertext document. A web server serves up web pages to the user, which are then displayed in a web browser.

A website is made up of several web pages that are linked together by a common domain name.

The world wide web is made up of all of the websites put together. The website can be of various types, such as an e-commerce website, a social media website, or a blog website, and each website serves a different purpose, but they all have several linked web pages in common.

When choosing a domain name, one of the top-level domain names that can be used is "edu." It generally refers to the domain name's owner as a four-year college or similar educational institution.

Thus, the correct option is b.

For more details regarding a website, visit:

https://brainly.com/question/19459381

#SPJ6

List three considerations when you choose memory.

Answers

1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)

After a worksheet has been displayed in page layout view, page breaks are indicated by ________ in normal view.

Answers

After a worksheet has been displayed in page layout view, page breaks are indicated by dotted lines in normal view. Typical view for used for creating and viewing presentation slides is called normal view and is also known as slide view. Which offers a full size view of a slide, making it easier to create a slide.

A web application server that is compromised in a cross-site scripting attack is said to be

Answers

Cross-site scripting attack ( XSS ) occurs when malicious script are injected into web sites. An attacker uses web application to send malicious code.
Answer:
A web application server that is comprised in a cross-site scripting attack is said to be B. injected.     

When you tell a computer what to do, you are providing input?

Answers

True: Input is the command which we give it to the computer to perform a certain task.

In other words, A computer is an electronic machine that processes information, it takes in raw information (or data) at one end, stores it until it's ready to work on it, chews and crunches it for a bit, then spits out the results at the other end. All these processes have a name. Taking in information is called input, storing information is better known as memory (or storage), chewing information is also known as processing, and spitting out results is called output

Spreadsheet software creates a ____, composed of a grid of columns and rows

Answers

Spreadsheet software creates a worksheet, composed of a grid of columns and rows.

What is the proper course of action for the following scenario? You want to expand a computer’s capability to play and process video. Which of the following must you do?
Install a video card into a socket on the motherboard
Install a video card into a slot on the motherboard
Install a video card into a port on the motherboard
Install a video card into a chipset on the motherboard

Answers

Install a video card into a slot on the motherboard Since you're wanting to install a new video card in your computer, let's look at the provided options and see what makes sense. Install a video card into a socket on the motherboard * Most motherboards have sockets that you can use to replace the processor or increase the amount of RAM they have. So plugging a video card into a socket doesn't make sense in this context. Install a video card into a slot on the motherboard * Most motherboards have expansion slots that you can plug in new devices and cards such as video cards, audio cards, etc. This makes sense in the context of you adding a new video card to your computer and is the correct choice. Install a video card into a port on the motherboard * Ports are generally used to attach external devices for the computer to communicate with. Some examples would be serial ports, or USB ports. The video card you're adding will likely have some video ports such as HDMI, DVI, or other types to connect to the monitor, but as mentioned, ports are generally used to communicate with devices EXTERNAL to the computer. So this is a bad choice. Install a video card into a chipset on the motherboard * The chipset on a motherboard is the set of support chips to provide the processor with access to the bus controlling data traffic on the motherboard between expansion slots, I/O devices, RAM, etc. Motherboards are generally designed around a chipset and you can not replace the chipset to upgrade the motherboard. So this is the wrong answer.

Answer:

Install a video card into a slot on the motherboard

Explanation:

Which are types of online resources that students can use for help? Check all that apply.

Answers

What are the choices ?

Answer:

A, B,E.

have a great day

What information would be included in the data portion of an ethernet frame on an ip network?

Answers

I hope this is a trick question. The header portion of a packet has the networking stuff. The data portion has, the data.

1. How should a cover letter begin?
A. With an informal greeting like "Hey, there!"
B. With the hiring manager's name
C. With the name of the position
D. With "To Whom it May Concern"

2. If an occupation is projected to neither grow nor decline over the next 10 years, how would you rate the job outlook?
A. Advancing
B. Steady
C. Strong
D. Weak

Answers

I am not sure about 1 but on number 2, the answer would be B because the occupation is staying the same, or steady
A cover letter began with the hiring manager's name. Thus, option (B) is correct. When the job  is projected to neither grow nor decline over the next 10 years, then it is inferred as Steady. Thus, option (B) is correct.

What is a Cover Letter?

A cover letter refers to the document attached with the resume  that provides additional information about skills and experiences related to the job which the applicant is applying for. It is also known as application letter.

It is written in the paragraph form which includes about candidate's skills  experience and achievements in relation to the position. Furthermore, it is begun with the hiring manager's name.

If over the next ten years, an occupation neither increase nor contract, is shows that it that stable situation.

Therefore, It can be concluded that  option (B) is correct for first question and option (B) is correct for second question.

Learn more about cover letter here:

https://brainly.com/question/14204316

#SPJ2

To connect multiple usb devices to a single usb port, a ____ can be used.

Answers

USB hubs can be used in this situation. These hubs typically have four to six USB ports, and can thereby allow the connection of more devices than the typical one-to-one connection that a standard USB port will give. This allows the user to expand the number of devices that the computer can read at any one time.

If a computer is having trouble navigating to a website when you enter the url into the browserâs address box, but is able to access the site when you enter the web serverâs ip address, which server available to your network should you make sure is functioning correctly?

Answers

"DNS" domain name server. It's like a phone book. Say you typed in " Facebook.com" it goes to the DNS. The dns server looks up the up address for you. So you don't have to remember IP address.

What is the difference between a syntax error and a logical error?

Answers

A syntax error can be a simple mistake as a typo or an extra space. A logical error has to do with the code structure, and if it makes sense.

Hope this helps!

Richard works in a café for six hours a day and is paid $6 per hour for any extra time worked. If Richard worked 6.5 hours on Monday, 6 and a half hours on Tuesday, 6 hours on Wednesday, 6 hours on Thursday, and 6 hours and 30 minutes on Friday, how much extra money will Richard earn that week?

Answers

assuming he works 6 hours a day,
Richard would be paid $6 extra that week

What type of file system is used by sdxc memory cards?

Answers

Answer:

ExFAT

Explanation:

A: Required: Create and delete file of the programs are a. process control b. file management ... question_answer Q: 350. __________ is used to shift processes so they are contiguous

Which device provides access to wireless/mobile devices within a local area network?

Answers

A wireless router is the main source of wireless network access (or WiFi), providing devices such as phones, tablets and laptops with connection to the network.

Name two purposes of creating a microsoft account for use in visual studio 2015

Answers

Creating a Microsoft account for use in Visual Studio 2015 means that you will get a better and optimized user experience, with several benefits.
Some of the purposes why you should create an account are:
1. free software, training and support from Visual Studio and broad range of benefits
2. synchronized Visual Studio Settings, which means that you will have for example the same layout, window and color theme, or whatever you select in the settings, every time you log in with your account


Attacks that take place against web based services are considered to be what type of attack?

Answers

cyber attack is correct

In spreadsheet software, use ____ to create meaningful data summaries to analyze worksheets containing large volumes of data.

Answers

In spreadsheet software, use pivot tables to create meaningful data summaries to analyze worksheets containing large volumes of data.

in order to reduce the file size of an image in word the user should use

Answers

To reduce the file size of an image in Word, the user should compress the image. This action can be done through the Picture Tools in Word by selecting the image, then choosing the Compress Pictures option, which allows the user to reduce the image resolution and delete cropped areas.

Reducing the file size of images can make documents easier to share and quicker to open, especially important when dealing with large files or limited storage capacity. In Word, this is typically achieved through the in-built Compress Pictures feature, found in the Picture Tools format tab. This feature helps the user adjust the image properties to minimize its file size while attempting to maintain an acceptable level of image quality. Another option includes saving the image with a lower resolution or using a more efficient image format before inserting it into the Word document.

import static java.lang.System.*;
import java.util.Scanner;

public class Sales{

//you haven't learned about "static" yet but take it on faith that it is needed
//we'll discuss in future classes what it actually means and why you need it
//create a private static variable for price
//create a private static variable for discountRate - it's an integer
//create a private static variable for tax


// the sale method takes in no parameters
// there are 3 print satements and the method returns the final sale price
public static double sale(){

//write your code here. Use the Word doc example as a guide to what the print statements
//should look like. Don't forget the "return" statement.

}

/*
*The main method is what is executed when the "run" button is clicked.
*It is necessary, in this case, for the program to be tested.
*Actually study this code and trace through it to see how the Scanner is used to assign
* values to the variables. Also pay attention to the use of print, println and \n to cause the
* output to be formatted the way it is in the example.
*/

public static void main(String[] args){
Scanner kb = new Scanner(System.in);
System.out.print("Please enter a price: ");
price = kb.nextDouble();
System.out.println(price + "\n");
System.out.print("What is the tax rate? ");
tax = kb.nextDouble();
System.out.println(tax);
discountRate = (int)(Math.random() * 40);
System.out.println("Result returned is " + sale());
}
}




Can anyone help with this

Answers

First you add the three static variables as instructed:

    private static double price;
    private static int discountRate;
    private static double tax;

Then you implement the sale() method:

public static double sale(){
    System.out.printf("Price before discount: %.2f\n", price);

    double sale = price * (1-(double)discountRate/100.0);
    System.out.printf("Price after discounting %d%% but before tax: %.2f\n", discountRate, sale);

    sale *= (1+tax/100.0);
    System.out.printf("Discounted price with %.1f%% tax added: %.2f\n", tax, sale);

    return sale;
}

I kind of took a stab at how to calculate the sale. Not sure if the tax has to be added before or after the discount. But I'm sure you can fix that if needed.

To get a sense of your digital footprint, you should: Question 2 options: Google yourself regularly, and monitor what your friends post, in case they've posted something about you Google yourself once a year Google yourself every five years Delete all of your accounts and start fresh

Answers

Let us examine the given answers.

a) Google yourself regularly, and monitor what your friends post.
  Verdict: This answer is correct, but it is also necessary to look for yourself on other search engines.

b) Google yourself once a year
  Verdict: Once a year is better than doing nothing, but more than once a year is preferable.

c) Google yourself every five years.
  Verdict: The time interval is too long. Your reputation could easily be damaged, or your identity could be stolen in less than 5 years.

d) Delete all your accounts and start fresh.
   Verdict: This will not solve the problem of having your reputation damaged, or having your identity stolen. Information on the web is preserved ins storage vaults for long periods of time.

Answer: 
Google yourself regularly, and monitor what your friends post. Also, search for your name on other search engines.

What would happen if computers only had input peripherals and a CPU?

A. Computers would process and display data.
B. Computers would receive signals and display data.
C. Computers would receive signals and process data.
D. Computers would receive signals, process, and print data.

Answers

Assuming it has all the correct inputs and a CPU it would only be able to receive signals via the input and process that data. There are no display outputs or printer so the answer is probably C.

What would happen if computers only had input peripherals and a CPU is that: C. Computers would receive signals and process data.

A computer can be defined as an electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an information (output) that could be used by an end user.

Basically, the main part of a computer include the following;

Central processing unit (CPU): this is the brain of a computer and it does all the processing and logical control.Input devices (peripherals): keyboard, mouse, scanner, etc.Output devices (peripherals): printer, monitor, speaker, etc..Motherboard.Memory and storage device: random access memory (RAM) and read only memory (ROM).

Hence, if a computer only has input peripherals and a central processing unit (CPU) it would receive signals and process data respectively.

Find more information: https://brainly.com/question/17402566

David’s gross pay is $450, and his total deductions were $49. What is his net pay?

Answers

the net pay is the gross pay after deductions so his net pay would be 401 dollars
His net pay would be $401. 
This is the answer because $49 was the amount of the total deductions from his gross pay. 
$450 - $49 = $401.
So $401 is the correct answer.

Hard disk storage technology can be classified as ____ storage.

Answers

Persistent (between boots) or permanent.

Proprietary file types are easily displayed in Word documents, Web pages, etc.
Question 15 options:

True


False

Answers

it should be true :)

Answer:

It is true

Explanation:

I took the test

Other Questions
How is the present-progressive tense formed in Spanish?It's formed with a present tense form of the verb ser, plus the present participle of a second verb.It's formed with a present tense form of the verb estar, plus the present participle of a second verb.It's formed the same way as the simple-present tense.none of the above An ion with an atomic number of 34 and 36 electrons has a __________ charge 70 is 20% of what number What would happen if you put a mixture of proteins and starch in a solution containing trypsin PLEASE HELP 20 PTSA group of middle school students were given a short course in speed-reading. The instructor was curious if a monetary incentive would influence performance on a reading test taken at the end of the course. Half the students were offered $5 for obtaining a certain level of performance on the test, the other half were not offered money.What is the Control group?What is the Independent Variable?What is the Dependent Variable? Which represents a rational Number and how can you tell?[tex] \sqrt{17} \sqrt{36} \sqrt{50} \sqrt{101} [/tex] Describe the factors of production required to deliver a service like education How do you make 1718 using only hundreds tens and ones blocks in two different ways An axon has many branches, each of which swells at its tip. these are known as The use of emotional terms in presenting your opinion on a given topic will further strengthen your argument. true or false How were the Spanish able to conquer and colonize the Americas? which spanish territory was turned over to great british after the french and indian war A. cuba B. new Mexico C. florida D. LOUSIANIA Elton pours 41 1/4 ounces of water from a large pitcher into a bottle. That amount is 2/5 of the water that was in the pitcher. There were _____ ounces of water in the pitcher.Write your answer as a mixed number in lower terms. Which part of the cell breaks down carbohydrates? A business buyers purchase process ends with: What El Salvadoran entity was created to secure the coffee plantations? Which of the following will cause an increase in the weight of an object? A: Increase in the gravitational pullB: Decrease in the gravitational pullC: Increase in the temperature of the objectD: Decrease in the temperature of the object Which statements below best explains why Robert E,Lee was so effective as a miliary general What significance did the domination of southern Spain by the Umayyad Caliphate have on Europe? 1) Europeans became dependent on goods from the Middle East and Asia.2) An influx of gold from Mansa Musa Is empire improved the European economy.3) Spain became the center of Muslim culture due to the increased volume of art and architecture.4) Spaniards migrated to Africa to escape the invasion of the Umayyad Caliphate. Two of the primary consumers in the food web are theA. coyote and hawkB. grass and cactusC. rabbit and grasshopper.D roadrunner and lizardPlease help me someone Steam Workshop Downloader