When designing a home network, what guidelines should you follow for locating the desktop computer?

What will be an ideal response?

Locate desktop computers so they are out of harm's way. This is likely to be in places such as a bedroom, home office, or in a corner of a living or dining room. Plug the computer and peripherals into a power strip with a surge protector (or combination surge protector and UPS) and connect it to a reliable, grounded outlet. If you use a DSL telephone cable connection, connect that through the surge protector.

Computer Science & Information Technology

You might also like to view...

A disk drive that plugs into an external port on your computer is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In information security, a framework or security model customized to an organization, including implementation details, is known as a(n) __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology