Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Should You Leave Your PC On, or Power it Down?

b2ap3_thumbnail_on_off_400.jpgAt the end of the workday, you’ve got an important decision to make: power down your desktop or log off? Each option has its own set of pros and cons, but are you confident that you’re making the right decision? Here’s how to find out for sure.

First off, the answer to this question is dependent upon how frequently the machine is used. For the sake of this blog article, let’s address the computing needs of the average office worker who uses their PC for the Monday through Friday, 9-to-5 grind.

Secondly, we feel the need to address a common perception about turning a computer on and off: it does NOT cause physical harm to the equipment. This was the case in the early days of the PC, back when the power surge from powering it on was actually bad for the components, but this issue has been resolved since 1993.

Another factor to consider is power consumption. If you’re the kind of person that likes to make sure every light is turned off before going home and you pride yourself in finding ways to lower your electricity bill, then you may want to power down your machine for the night. Although, if you’re looking to leave it on in order to get a jump start on your workday, then put your PC in sleep mode (aka, Standby or Hibernate) before leaving the office, instead of turning it off. Sleep mode is designed to use as little energy as possible, which equates to less than what’s used by a traditional light bulb.

Your geographical location should also factor into this decision. For example, if you live in a place that’s prone to natural disasters and the power grid sporadically blackouts, then you’re going to want to power off your machine at the end of the work day. Unless your IT infrastructure is equipped to handle power inconsistencies with tools like an Uninterrupted Power Supply, a powered-on computer can be damaged by a sudden loss of power.

Also, as explained by Computer Hope, while turning off a PC can protect from a sudden loss of power, turning it off does nothing to prevent damage from a power surge:

A power surge destroys electrical devices regardless if it is on or off. Therefore, turning the computer off does not prevent this from occurring. The only way to prevent power surges is to unplug all power cables, phone cables, and network cables.

Another factor that you’ll want to consider is your computer’s maintenance schedule. For example, it’s best practice to run a daily virus scan at night so that the scan doesn’t interfere with your work during the day. Also, if you're taking advantage of managed IT services like what Total Tech Care provides, then you’ll want to leave your desktop powered on so that we can remote into it (or all of them) and run scans, apply patches and updates, and more. If the machine is powered down, then we won’t be able to access it and do our job.

After considering all of these different factors, only you can know if it’s best to turn off your PC at the end of the day, or keep it on. Whatever you decide, Total Tech Care is here to support your decision, along with your company’s IT infrastructure. This is one service that you’ll never want to turn off.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Save Money Cloud Computing Data Recovery Office Server Passwords Windows 10 Gadgets Chrome Virtualization Social Media Saving Money Holiday Tech Term Microsoft Office Automation Managed Service Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Health Networking IT Support Internet of Things Managed Service Provider Spam Alert Remote Office 365 Telephone Systems Covid-19 Information Technology Information Social Engineering Mobility Employer-Employee Relationship Recovery Router Bandwidth BDR Remote Monitoring Big Data Password Money App History Mobile Computing Encryption Applications Application Data Breach Human Resources Law Enforcement Mobile Office How To Managed IT Apps Office Tips Blockchain Data Storage Patch Management Training Paperless Office VPN Government Remote Computing Private Cloud HaaS Bring Your Own Device Data Management Work/Life Balance Flexibility Marketing Wireless WiFi Vulnerability Windows 7 IT solutions Entertainment Word Website Gmail Budget Google Drive Settings Servers Infrastructure Voice over Internet Protocol Two-factor Authentication Avoiding Downtime Data Security Mouse Data Protection Save Time User Error Meetings Cleaning Risk Management Hacker Vendor Conferencing Managed Services End of Support Software as a Service Display Telephone System The Internet of Things Staff Lithium-ion battery Education Physical Security Scam Machine Learning Safety Connectivity Remote Work HIPAA USB Sports Employee/Employer Relationship Redundancy Vendor Management Keyboard RMM Firewall Virtual Reality Apple Social Wireless Technology Samsung Cryptocurrency Solid State Drive How to Downtime Value Procurement Comparison Net Neutrality Data storage Workplace Strategy Automobile Spam Blocking Wearable Technology Electronic Medical Records Retail Hard Drives CES Help Desk Virus Instant Messaging Printing Robot Excel Computing Infrastructure Hiring/Firing Going Green Unified Threat Management Business Technology Content Management Access Control Computer Accessories Biometrics Virtual Desktop Managed Services Provider Virtual Assistant Authentication Battery Database DDoS Shadow IT Remote Workers Legal Business Intelligence Printer SharePoint Processor Bluetooth Audit Internet Exlporer Worker Update IT Management Customer Service Botnet Hard Drive PDF IT Plan Google Docs Environment Identity Theft Proactive IT Fax Server IT Consultant Unsupported Software Computing Best Practice YouTube Charger Humor SaaS Black Market Augmented Reality Fraud Compliance Computer Care OneNote Digital Signage Current Events Network Congestion Remote Worker Document Management Telephony eWaste Procedure Tablets Recycling Saving Time Root Cause Analysis HBO Google Search Best Available Knowledge Music Wiring dark theme Entrepreneur Practices Shopping Cache AI Skype Amazon Web Services IT Infrastructure WIndows 7 Files Chromecast Shortcut Safe Mode FinTech Criminal Data loss Bing Outlook Leadership Troubleshooting GDPR Cost Management Hosted Computing Social Network Social Networking Wireless Internet Start Menu Online Shopping Investment Colocation Uninterrupted Power Supply Loyalty File Sharing Employees Employee/Employer Relationships Screen Mirroring Frequently Asked Questions Specifications ISP Monitor Books Camera Windows 365 Inventory Windows Media Player Wire Video Conferencing Mobile Evernote ROI User Windows 10s PowerPoint Running Cable Sales Memory Bitcoin Cast Travel Shortcuts Personal Tip of the week Millennials Cryptomining Reputation webinar Streaming Media Emergency Printers Point of Sale Smart Office Supply Chain Management Content Professional Services Wireless Charging Managing Stress Public Cloud Tech Support Employer Employee Relationship Laptop Assessment Monitoring Batteries Techology Digitize Windows Server 2008 Workforce Customers Cameras Virtual Private Network Windows 8.1 Science Audiobook Tools Cables Windows Server 2008 R2 Touchpad Television Customer relationships Nanotechnology IT Assessment Telecommuting Manufacturing Project Management Email Best Practices Customer Relationship Management Politics Cortana Advertising Distributed Denial of Service Security Cameras Public Computer Computer Tips Analyitcs Digital Signature Managed IT Service OneDrive Regulations Biometric Security Printer Server Notifications Transportation Warranty Virtual CIO Programming HVAC Peripheral Google Apps Computer Fan Rootkit Digital Security Cameras Analysis Using Data Devices Copiers 5G Relocation Workers Antivirus Benefits Administrator Enterprise Content Management Quick Tip Windows 8 FENG Video Games Smartwatch IBM IT service MSP Ergonomics Accountants Thought Leadership Development Worker Commute Flash Credit Cards OLED Smart Technology Microchip Password Management PCI DSS Tablet Experience Password Manager Virtual Machine Scalability Software Tips Multi-Factor Security Employee Supercomputer Domains 2FA Fiber Optics Twitter Messaging Business Owner Sync Cabling Emails Search Engine IaaS NarrowBand Maintenance NIST Policy Business Mangement Hypervisor Search Trending Consultant Dark mode Bloatware Smart Tech Trend Micro Addiction SMS Amazon Default App iPhone Netflix Analytics Two Factor Authentication

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code