Get premium membership and access questions with answers, video lessons as well as revision papers.
The power delivered to computers should be stable and constant but sometimes fluctuations in power supply occur. For example, voltage surges and spikes, a blackout or brownout can cause a computer to shut down abruptly. Information that is stored only in short-term memory will be lost. As well, the fluctuation can physically damage computer components such as the power supply unit. Computer systems can be protected from such interruptions through:
i) Use of uninterruptible Power Supply (UPS)
A UPS is a device that allows a computer to keep running for at least a short time after the primary power source is lost. The device also provides protection against power surges and drops.
ii) Use of power surge protectors/suppressors
A surge protector or suppressor is an appliance designed to protect electrical devices from voltage spikes caused by events like lightning strikes and short circuits. Voltage spikes might damage a computer’s electronic parts, melting plastic and metal parts or even corrupting the data stored on the computer. Surge protectors limit the voltage supplied to a device by either blocking the unwanted voltages or by shorting the voltages to ground.
Kavungya answered the question on May 17, 2019 at 09:54
- What is Biometric authentication?(Solved)
What is Biometric authentication?
Date posted: May 17, 2019. Answers (1)
- Define Token authentication?(Solved)
Define Token authentication?
Date posted: May 17, 2019. Answers (1)
- What is Password authentication?(Solved)
What is Password authentication?
Date posted: May 17, 2019. Answers (1)
- Define Dumpster Diving.(Solved)
Define Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- What is Wiretapping?(Solved)
What is Wiretapping?
Date posted: May 17, 2019. Answers (1)
- What is Eavesdropping on Emanations?(Solved)
What is Eavesdropping on Emanations?
Date posted: May 17, 2019. Answers (1)
- Describe Denial or Degradation of Service.(Solved)
Describe Denial or Degradation of Service.
Date posted: May 17, 2019. Answers (1)
- Define Masquerading.(Solved)
Define Masquerading.
Date posted: May 17, 2019. Answers (1)
- Define software piracy.(Solved)
Define software piracy.
Date posted: May 17, 2019. Answers (1)
- What is Traffic Analysis?(Solved)
What is Traffic Analysis?
Date posted: May 17, 2019. Answers (1)
- Describe Trap Doors.(Solved)
Describe Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Define Botnets.(Solved)
Define Botnets.
Date posted: May 17, 2019. Answers (1)
- Define a Ransomware.(Solved)
Define a Ransomware.
Date posted: May 17, 2019. Answers (1)
- Define Salamis.(Solved)
Define Salamis.
Date posted: May 17, 2019. Answers (1)
- Describe Logic Bombs.(Solved)
Describe Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- What is Data Diddling?(Solved)
What is Data Diddling?
Date posted: May 17, 2019. Answers (1)
- Define IP Spoofing.(Solved)
Define IP Spoofing.
Date posted: May 17, 2019. Answers (1)
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)