determine the factors using computer failures and defects​

Answers

Answer 1

Answer:

Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.

Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.

Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.

Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.

Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.

Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.

Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.

UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.

Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.

Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.

Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.

Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.

Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.

Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.

Explantion: I hope this helps!!!!! :)


Related Questions

are used for mechanical power transmission over long distances
A. Spur Gears
B. Helical Gears
C. Planetary Gears
D. Chain and Sprockets

Answers

Answer:

D. Chain and Sprockets

Explanation:

Chains and sprockets are power transmission tools. The roller chain is connected to a toothed wheel which is the sprocket. The combination provides mechanical power to the wheels of vehicles.

An advantage they possess is their ability to transmit mechanical power over both short and long distances. They have a high degree of efficiency but they require constant lubrication. They also produce noise during operation.

what percent of records are temporary, if you are not in the OSD?​

Answers

Answer:

Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.

Explanation:

HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.

social media
wireless devices
smart phones
automobiles
printed newspapers

Answers

Answer:

(1). social media

(2). wireless devices

(3). smart phones

Explanation:

The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.

Here,

Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.

Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.

Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.

Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.

Know more about communication technologies,

https://brainly.com/question/33037966

#SPJ6

Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of a mailbox for storage.
Creating an Outlook data file
data files in storage on a computer.

Answers

Answer:

Archiving data files manages the size of a mailbox for  

local

storage.

Creating an Outlook data file  

protects

data files in storage on a computer.

Explanation:

Because its right.

Answer:

an increase in cloud computing

Explanation:

If we use 6 bits for representing positive and negative numbers using 2's
complement methods, what is the value of 11100?

Answers

Answer:

-4


Explanation:
In binary, 11100 is 28
But in the two’s complement method, it will equals = (-4).
the last number always represents negative number.
In other words, if this (101010) with 6 digits. Without using two’s complement method, it would be 42 in binary. But with two’s complement method, it would ( - 22)


I hope this helps. Please don’t hesitate to ask if u concerning my answer
Yeeeeeeeeeeeeeeeeeeeeeeee

Help fast

When comparing and what is the main difference?
O The first symbol is for reviewing text and the second for enlarging text.
The first symbol is for spacing and the second for sizing.
O The first symbol is for viewing text and the second for inserting text.
O The first symbol is for inserting text and the second for viewing text.

Answers

Answer:

The first symbol is for inserting text and the second for viewing text

Explanation:

Other Questions
1. According to the map, what is the total population of each of the five areas?Area A:Area B:Area C:Area DArea E:2. How might the data shown on this map be useful to the Columbus City School District, the schooldistrict that is responsible for the areas shown?3Imagine you are a small business owner who plans to open a new hair salon. In which section (A-E)would you place your new business? Explain your choice using evidence from the map.4. Imagine you work for a large corporation that wants to build a warehouse distribution center for itsproducts. In which section (A-E) would you place the warehouse? Explain your choice usingevidence from the map. PLEASE HELP ME!! I WILL GIVE YOU BRAINLYEST!! Write a paragraph about the following question: Do you think people today are too addicted to technology?Take a side by stating your claim (thesis), give key details, and a good closing. Think about the counterclaim (See theother side of the argument.)PLSS THIS IS DO IN 30 MINUTES!! HELP ASAP!! giving brainliest !!! I need help for this assignment its la familia hidden word puzzle in Spanish please help i'm horrible at math ajdbvkdfjgvnfjglbdfg What does Alfonso do in this passage?What is Alfonso's reason for his actions?Alfonso sat on the porch trying to push his crooked teethto where he thought they belonged. He hated the way helooked. Last week he did fifty sit-ups a day, thinking thathe would burn those already apparent ripples on hisstomach to even deeper ripples, dark ones, so when hewent swimming at the canal next summer, girls in cut-offs would notice. And the guys would think he wastough, someone who could take a punch and give it back.--"Broken Chain,"Gary Soto "To what extent did technology help with spreading Nazi propaganda to the German people 11 The table below shows the amount of a decayingradioactive substance that remained for selectedyears after 1990.0259141719Years After 1990 (X)Amount (9)7504512198425128Write an exponential regression equation for thisset of data, rounding all values to the nearestx thousandth. Using this equation, determine theamount of the substance that remained in 2002, tothe nearest integer. For each expression, select all equivalent expressions from the list 1. 24x - 18 A. 6(4x -3) B. 6 C. 4(6x - 4) D. 12x - 9 PART B WHICH TWO PHASES FROMTHE TEXT BEST SUPPORT THE ANSWER TO A WORTH 67 PTS!! I WILL GIVE BRAIBLIEST! Write an expression that is equivalent to 3/4a + 2/3 - 1/2a - 1/3 + 1/2a3/4a + 2/3 - 1/2a - 1/3 + 1/2a= _a + _ Who moved the capital of the Roman Empire to the city of Byzantium ? Augusts CaesarDiocletianConstantineJulius Caesar How many moles are in 1.6g HCl ? In the functions in the table, x is the price of each chair. The functions give the revenue (R) and costs (C) that Carries business can expect in a year at a given price for the item. Use graphing tools to examine the graphs for each set of equations. Then select the correct answer from each drop-down menu. a thesis statement about the glorious revolution's influence on American and French revolutions would connect which phrase select all that applyA limiting the power of monarchs B a government's responsibility to its peopleC the role of a state supported Church D social and economic reform 12.74. Mariana compr 46 pies de listn azul, para hacer adornos navideos, cuntoscentmetros de listn tiene? (1 pie=0.3048 m)1314 Solve the inequality. HELPPP ME PLZZ 3/4x 2/3 5/6Choose the solution that is graphed on this number line.A. x < 2B. x > 2C. x 2D. x 2 An object travels 60 miles in 1/2 hour. How many miles does the objecttravel in 6 hours Please help.Algebra. HelpDont use for points or will take it back