answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
2 years ago
7

Why is it important to ground both computers and network devices (Netacad)

Computers and Technology
2 answers:
allsm [11]2 years ago
8 0

Grounding is the smart way to protect humans and other resources at home, office or any place. Grounding will protect against heavy loads. There may be situation where suddenly the load of electricity is high, the earth accepts the unwanted high voltage and protect the place and lives.  

Grounding helps to “direct” the electricity throughout the electrical system. It defines the clear path.

It also stabilizes levels of voltage. It transfers equal amount of electricity to each and every portion of the electrical system.

olga_2 [115]2 years ago
4 0

<u>Answer</u>:

It is important to ground both computers and network devices because  the most important reasons for grounding is that it protects your appliances.

<u>Explanation</u>:

  • If you are using any electronic device without proper grounded electrical system, the electronic devices which we are using are going to damage.
  • So if we are using the appliances without grounding means there is problem to both the appliances and the person who is handling that electronic device.
  • So it is important to ground the computers which we are using to reduce the hazards.
You might be interested in
Based on virtualization technologies, how many types can we classify them? Please give a brief statement on each of them?
geniusboy [140]

Answer:

Software and Hardware virtualization.

Explanation:

Virtualization is a process or the ability of a system to run multiple operating systems and virtually using all the physical resources, as though they are individual systems.

Hardware virtualization allows for hardware components like the storage, CPU, memory etc to be virtually used by multiple virtual machines. Software virtualization uses software managers to run individual guest operating systems on virtual machines.

6 0
2 years ago
What are the possible consequences if you fail to identify system requirements correctly and completely?
AlladinOne [14]
There are a few consequences for failing to identify system requirements. 

1. Strain on time and effort which can cost money for either a company or yourself (depending if you are an employer, employee, etc).

2. Additional costs for hardware. If you decide to upgrade your hardware on a later time. It will cost additional money for repairs and replacements to adjust.

3. It can cause dissatisfaction to a user if you are working as a technician (for example) which can leave a negative mark on your reputation/resume) 
4 0
2 years ago
Joe runs a handyman service. He enjoys writing and keeping up on the latest trends. He wants to share this information with his
Step2247 [10]

He is looking to create a blog.

8 0
2 years ago
Give at least one example computer application for which a connection-oriented service is appropriate and at least one example c
Leni [432]
Apple devices would be one
8 0
2 years ago
Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
Alex73 [517]

Answer:

Here is the C++ program:

#include <fstream>  //to create, write and read a file

#include <iostream>  // to use input output functions

using namespace std;  //to access objects like cin cout

const int MAXNAME = 20;  //MAXNAME is set to 20 as a constant

int main(){  //start of main() function

ifstream inData;  //creates an object of ifstream class

inData.open("grades.txt");  //uses that object to access and opens the text file using open() method

char name[MAXNAME + 1];   // holds the names

float average;   //stores the average

inData.get(name,MAXNAME+1);  //Extracts names characters from the file and stores them as a c-string until MAXNAME+1 characters have been extracted

while (inData){  //iterates through the file

 inData >> average;  //reads averages from file using the stream extraction operator

 cout << name << " has a(n) " << average << " average." << endl; //prints the names along with their averages

 inData.ignore(50,'\n');  //ignores 50 characters and resumes when  new line character is reached. It is used to clear characters from input buffer

 inData.get(name,MAXNAME+1);}  //keeps extracting names from file

return 0; }

Explanation:  

The program is well explained in the comments added to each line of the code. The program uses fstream object inData to access the grades.txt file. It gets and extracts the contents of the file using get() method, reads and extracts averages from file using the stream extraction operator. Then program displays the names along with their averages from grades.txt on output screen.

The grades.txt file, program and its output is attached.

3 0
2 years ago
Other questions:
  • Which of the following elements of the CIA triad refers to preventing the disclosure of secure information to unauthorized indiv
    10·1 answer
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • You decide to buy some stocks for a certain price and then sell them at anotherprice. Write a program that determines whether or
    11·1 answer
  • Program documentation _____. Group of answer choices describes the inputs, outputs, and processing logic for all program modules
    6·1 answer
  • Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint: Initialize a
    5·1 answer
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • 1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
    15·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document again?
    12·1 answer
  • What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
    8·1 answer
  • A data scientist is writing a Machine Learning (ML) algorithm using a large data set.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!