Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Should You Leave Your PC On, or Power it Down?

b2ap3_thumbnail_on_off_400.jpgAt the end of the workday, you’ve got an important decision to make: power down your desktop or log off? Each option has its own set of pros and cons, but are you confident that you’re making the right decision? Here’s how to find out for sure.

First off, the answer to this question is dependent upon how frequently the machine is used. For the sake of this blog article, let’s address the computing needs of the average office worker who uses their PC for the Monday through Friday, 9-to-5 grind.

Secondly, we feel the need to address a common perception about turning a computer on and off: it does NOT cause physical harm to the equipment. This was the case in the early days of the PC, back when the power surge from powering it on was actually bad for the components, but this issue has been resolved since 1993.

Another factor to consider is power consumption. If you’re the kind of person that likes to make sure every light is turned off before going home and you pride yourself in finding ways to lower your electricity bill, then you may want to power down your machine for the night. Although, if you’re looking to leave it on in order to get a jump start on your workday, then put your PC in sleep mode (aka, Standby or Hibernate) before leaving the office, instead of turning it off. Sleep mode is designed to use as little energy as possible, which equates to less than what’s used by a traditional light bulb.

Your geographical location should also factor into this decision. For example, if you live in a place that’s prone to natural disasters and the power grid sporadically blackouts, then you’re going to want to power off your machine at the end of the work day. Unless your IT infrastructure is equipped to handle power inconsistencies with tools like an Uninterrupted Power Supply, a powered-on computer can be damaged by a sudden loss of power.

Also, as explained by Computer Hope, while turning off a PC can protect from a sudden loss of power, turning it off does nothing to prevent damage from a power surge:

A power surge destroys electrical devices regardless if it is on or off. Therefore, turning the computer off does not prevent this from occurring. The only way to prevent power surges is to unplug all power cables, phone cables, and network cables.

Another factor that you’ll want to consider is your computer’s maintenance schedule. For example, it’s best practice to run a daily virus scan at night so that the scan doesn’t interfere with your work during the day. Also, if you're taking advantage of managed IT services like what Total Tech Care provides, then you’ll want to leave your desktop powered on so that we can remote into it (or all of them) and run scans, apply patches and updates, and more. If the machine is powered down, then we won’t be able to access it and do our job.

After considering all of these different factors, only you can know if it’s best to turn off your PC at the end of the day, or keep it on. Whatever you decide, Total Tech Care is here to support your decision, along with your company’s IT infrastructure. This is one service that you’ll never want to turn off.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Managed IT Services Phishing Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Chrome Virtualization Gadgets Social Media Saving Money Tech Term Holiday Microsoft Office Managed IT Services Automation Managed Service Operating System Facebook Computers Artificial Intelligence Cybercrime IT Support Hacking Internet of Things Wi-Fi BYOD Health Mobile Device Management Networking Spam Managed Service Provider Remote Office 365 Telephone Systems Information Technology Alert Covid-19 Information Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Applications Remote Monitoring Data Breach Big Data Law Enforcement App History Mobile Computing Password Money Application Human Resources Encryption Mobile Office Government Office Tips Blockchain Private Cloud Paperless Office Training How To Managed IT VPN Apps Data Storage Patch Management Remote Computing HaaS Google Drive Servers Avoiding Downtime Data Security Wireless Flexibility Marketing Gmail WiFi IT solutions Bring Your Own Device Settings Data Management Entertainment Work/Life Balance Website Infrastructure Budget Voice over Internet Protocol Two-factor Authentication Vulnerability Windows 7 Word Mouse Safety Data Protection HIPAA User Error Sports Redundancy Meetings Keyboard Vendor Management Risk Management Hacker Vendor Managed Services Staff The Internet of Things Software as a Service Display Telephone System Save Time Lithium-ion battery Machine Learning Connectivity Remote Work Employee/Employer Relationship Cleaning RMM Firewall USB Conferencing Virtual Reality Apple End of Support Education Physical Security Scam Social IT Management Cryptocurrency Botnet PDF Procurement IT Plan Workplace Strategy Comparison Net Neutrality Wearable Technology Proactive IT CES Hard Drives Help Desk Unsupported Software Retail Printing Instant Messaging Best Practice Robot YouTube Charger Excel Black Market Content Management Business Technology Access Control Biometrics Compliance Virus OneNote Virtual Desktop Computer Care Managed Services Provider Current Events Virtual Assistant Document Management Telephony Authentication Database Unified Threat Management Computer Accessories DDoS Solid State Drive Wireless Technology Samsung Downtime Remote Workers How to SharePoint Value Processor Data storage Update Automobile Spam Blocking Electronic Medical Records Printer Customer Service Hard Drive Bluetooth Environment Google Docs Computing Infrastructure Hiring/Firing Identity Theft Going Green Fax Server Computing SaaS Battery Augmented Reality IT Consultant Shadow IT Fraud Legal Business Intelligence Remote Worker Network Congestion Humor Digital Signage eWaste Audit Internet Exlporer Worker Public Computer Recycling Saving Time Tablets Procedure Regulations Wiring dark theme Practices Shopping Entrepreneur Notifications Transportation Google Search Computer Fan Cache AI Consultant Rootkit Amazon Web Services IT Infrastructure Criminal Analytics Bing Safe Mode FinTech Shortcut GDPR Relocation Workers Hosted Computing Social Network Cost Management Benefits FENG Wireless Internet Social Networking Best Available Online Shopping Investment WIndows 7 IBM Employee/Employer Relationships Video Games File Sharing Employees Worker Commute Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Experience Running Cable Wire Video Conferencing Evernote ROI Supercomputer Bitcoin Memory Travel Shortcuts Scalability Software Tips Sales Business Owner Sync Printers Point of Sale Emails Personal Millennials Cryptomining Smart Office Supply Chain Management NarrowBand Wireless Charging User Batteries PowerPoint Windows Media Player Search Monitoring Virtual Private Network Windows 8.1 iPhone Netflix Digitize Two Factor Authentication Workforce Science Root Cause Analysis Cables Windows Server 2008 R2 Managing Stress Knowledge Music HBO Customer relationships Skype Project Management Email Best Practices Files Nanotechnology IT Assessment Telecommuting Manufacturing Cameras Distributed Denial of Service Data loss Customer Relationship Management Chromecast Cortana Leadership Digital Signature Managed IT Service Analyitcs Troubleshooting Security Cameras Outlook Computer Tips Start Menu Warranty Virtual CIO Colocation OneDrive Programming Uninterrupted Power Supply Biometric Security Screen Mirroring HVAC Peripheral Loyalty Google Apps Frequently Asked Questions Digital Security Cameras Monitor Analysis Using Data Books Mobile Administrator Antivirus Windows 10s Devices Copiers 5G Windows 8 Printer Server Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics IT service Reputation webinar Accountants Streaming Media Emergency Smartwatch Content Professional Services Microchip Public Cloud Thought Leadership Development Tech Support Employer Employee Relationship Credit Cards OLED Laptop Assessment Password Manager Virtual Machine Tablet Techology Password Management PCI DSS Windows Server 2008 2FA Domains Customers Fiber Optics Multi-Factor Security Employee Audiobook Tools Search Engine Twitter Messaging Cabling Touchpad Television Business Mangement Hypervisor IaaS NIST Policy Maintenance Dark mode Smart Tech Trend Micro Bloatware Trending Politics Advertising Addiction SMS Amazon Default App

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code