Lock the doors and windows of the laboratory when computer room is not in use.
Reinforce the windows by installing metallic grills and burglar proof doors.
Restrict access to the computer room by use of security personnel and fitting security alarms at strategic positions.
Maintain tidiness always by keeping the computer room clean.
Keep the computer free from dust and smoke by covering them with dust covers.
Restrict access to computers by use of security constraints such as passwords or access privileges.
Keep the computers away from any form of liquid and moisture.
Ensure that there is a stable and reliable power supply.
isaacmuthini answered the question on December 1, 2017 at 13:43
- Outline seven safety precautions and practices that computer users observe while in computer laboratory(Solved)
Outline seven safety precautions and practices that computer users observe while in computer laboratory
Date posted: December 1, 2017. Answers (1)
- List down five qualities of a good computer laboratory. (Solved)
List down five qualities of a good computer laboratory.
Date posted: December 1, 2017. Answers (1)
- What is a personal computer(PC)?(Solved)
What is a personal computer(PC)?
Date posted: December 1, 2017. Answers (1)
- Explain computer classification according to functionality or technology(Solved)
Explain computer classification according to functionality or technology.
Date posted: December 1, 2017. Answers (1)
- Describe the classification of computers based on purpose.(Solved)
Describe the classification of computers based on purpose.
Date posted: December 1, 2017. Answers (1)
- Define a web portal(Solved)
Define a web portal
Date posted: November 30, 2017. Answers (1)
- Describe the term hyperlink(Solved)
Describe the term hyperlink
Date posted: November 30, 2017. Answers (1)
- Define a blog(Solved)
Define a blog
Date posted: November 30, 2017. Answers (1)
- Define the term webpage as used in internet.(Solved)
Define the term webpage as used in internet
Date posted: November 30, 2017. Answers (1)
- List any two file organization methods(Solved)
List any two file organization methods.
Date posted: November 30, 2017. Answers (1)
- State and explain any one type of computer processing file.(Solved)
State and explain any one type of computer processing file
Date posted: November 30, 2017. Answers (1)
- Distinguish between a superscript and a subscript used in a word document. (Solved)
Distinguish between a superscript and a subscript used in a word document.
Date posted: November 30, 2017. Answers (1)
- Differentiate between drop cap and case in word processing(Solved)
Differentiate between drop cap and case in word processing.
Date posted: November 30, 2017. Answers (1)
- Give the meaning of the term alteration as applied by computer criminals.(Solved)
Give the meaning of the term alteration as applied by computer criminals.
Date posted: November 30, 2017. Answers (1)
- Define the term fraud in respect to computer crime(Solved)
Define the term fraud in respect to computer crime
Date posted: November 30, 2017. Answers (1)
- Describe the classification of computers based on purpose(Solved)
Describe the classification of computers based on purpose
Date posted: November 30, 2017. Answers (1)
- List down six characteristics of mainframe computers. (Solved)
List down six characteristics of mainframe computers.
Date posted: November 30, 2017. Answers (1)
- Outline six characteristics of micro computer(Solved)
Outline six characteristics of micro computer
Date posted: November 30, 2017. Answers (1)
- Give the importance of having standard furniture in computer laboratory.(Solved)
Give the importance of having standard furniture in a computer laboratory.
Date posted: November 29, 2017. Answers (1)
- Discuss common reasons for losing data for a computer based system(Solved)
Discuss common reasons for losing data for a computer based system.
Date posted: November 28, 2017. Answers (1)