jdi na vlastní test/obsah stránky
The GPU is not cooling correctly.The display is not correctly installed.The LCD cutoff switch is damaged.The display settings have been changed.Power to the pixels has been removed.
The GPU is not cooling correctly.
The display is not correctly installed.
The LCD cutoff switch is damaged.
The display settings have been changed.
Power to the pixels has been removed.
Icons and buttons are used to represent the different apps on the phone.Tapping and holding the arrow at the bottom left will display the Home screen.Tile sizes depend on the size of the app.Text messages, news, photos and other content can be displayed in the different tiles.Unpinning an app from this view will uninstall the app from the phone.
Icons and buttons are used to represent the different apps on the phone.
Tapping and holding the arrow at the bottom left will display the Home screen.
Tile sizes depend on the size of the app.
Text messages, news, photos and other content can be displayed in the different tiles.
Unpinning an app from this view will uninstall the app from the phone.
Back up user data on a regular basis.Ensure that the operating system software and applications contain the latest updates.Password protect iTunes or Google Play accounts.Unmount all unused disk partitions.Execute a factory reset once a month to remove all unidentified malicious software.Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Back up user data on a regular basis.
Ensure that the operating system software and applications contain the latest updates.
Password protect iTunes or Google Play accounts.
Unmount all unused disk partitions.
Execute a factory reset once a month to remove all unidentified malicious software.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Identify the exact problem.Establish a plan of action.Document findings and outcomes.Test the theory to determine cause.
Identify the exact problem.
Establish a plan of action.
Document findings and outcomes.
Test the theory to determine cause.
switchbiometric identification deviceKVMscannerdigitizer
switchbiometric identification device
KVM
scanner
digitizer
What happened before the error occurred?Is this the first time the error occurred?What happened after the error occurred?What error messages were displayed when the error occurred?
What happened before the error occurred?
Is this the first time the error occurred?
What happened after the error occurred?
What error messages were displayed when the error occurred?
Dust increases electromagnetic interference in nearby connected cables.Dust can encourage insects and other pests to live in the equipment closets.Dust is considered a fire hazard that poses danger to personnel and equipment.Dust diminishes the range of wireless services.Dust can cause network equipment to overheat and cause problems on the network.
Dust increases electromagnetic interference in nearby connected cables.
Dust can encourage insects and other pests to live in the equipment closets.
Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust diminishes the range of wireless services.
Dust can cause network equipment to overheat and cause problems on the network.
to specify procedures for dealing with potentially hazardous materialsto specify procedures in designing and building common computer systemsto specify procedures for the operation of sensitive components and prevention of electrostatic dischargeto specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures for dealing with potentially hazardous materials
to specify procedures in designing and building common computer systems
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures in the use of humidity control and prevention of moisture damage
The computer automatically boots into Safe Mode and displays a warning on the screen.The computer returns an error message that indicates the I/O address of the failing device.The computer emits a pattern of beeps indicating the failing device.The screen flashes with a red background and displays a warning message.
The computer automatically boots into Safe Mode and displays a warning on the screen.
The computer returns an error message that indicates the I/O address of the failing device.
The computer emits a pattern of beeps indicating the failing device.
The screen flashes with a red background and displays a warning message.
All hosts must be in the same geographic area.Many hosts participate in a coordinated attack.It is easy to identify the source of the attack.Infected computers are called daemons.
All hosts must be in the same geographic area.
Many hosts participate in a coordinated attack.
It is easy to identify the source of the attack.
Infected computers are called daemons.
passwordsMAC filteringfile encryptiondrive encryptionTPMTKIP key
passwords
MAC filtering
file encryption
drive encryption
TPM
TKIP key
The NIC driver is out of date.The TCP/IP protocol stack is not loaded.The default gateway is incorrect.The operating system is not compatible with the remote sites.
The NIC driver is out of date.
The TCP/IP protocol stack is not loaded.
The default gateway is incorrect.
The operating system is not compatible with the remote sites.
Individual users are in control of their own computers and network resources.Personnel costs are lower because a dedicated network administrator is no longer necessary.The total cost of the new solution is considerably lower.Data is more secure in the event of hardware failures.Data resources and access are centrally controlled.
Individual users are in control of their own computers and network resources.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Data resources and access are centrally controlled.
DB-15PS/2DVIHDMI
DB-15
PS/2
DVI
HDMI
basic functionality of computer portswireless signal strength and access point positioningquality of electricity in computer componentscopper cable location
basic functionality of computer ports
wireless signal strength and access point positioning
quality of electricity in computer components
copper cable location
Nothing. Windows automatically provides the driver.The user must browse the Internet, then download and install the proper driver.The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
Nothing. Windows automatically provides the driver.
The user must browse the Internet, then download and install the proper driver.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
the optical drivethe power supplythe network interface cardthe video card
the optical drive
the power supply
the network interface card
the video card
solid-state hybrid diskUSB flash drivesolid-state driveembedded multimedia card
solid-state hybrid disk
USB flash drive
solid-state drive
embedded multimedia card
primary coronapaper trayssecondary coronatransfer rollerspickup rollersfuser assembly
primary corona
paper trays
secondary corona
transfer rollers
pickup rollers
fuser assembly
support for Windows backupsupport for Windows Firewallstorage of digital certificatesapplication license protectionsecurity for user authentication informationhashed encryption of the hard drive volume
support for Windows backup
support for Windows Firewall
storage of digital certificates
application license protection
security for user authentication information
hashed encryption of the hard drive volume
Use a can of compressed air to remove excess dust.Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.Ignore the dust, as it does not affect the computer.Use a moistened cotton swab to remove excess dust.
Use a can of compressed air to remove excess dust.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Ignore the dust, as it does not affect the computer.
Use a moistened cotton swab to remove excess dust.
uninterruptible power supplypower invertersurge suppressorstandby power supply
uninterruptible power supply
power inverter
surge suppressor
standby power supply
PCIePCIAGPDIMMISA
PCIe
PCI
AGP
DIMM
ISA
server clusteringTerminal ServicesRAIDhypervisor
server clustering
Terminal Services
RAID
hypervisor
data linktransportnetworkapplication
data link
transport
network
application
System RestoreTask ManagerAdd or Remove ProgramsEvent Viewer
System Restore
Task Manager
Add or Remove Programs
Event Viewer
when installing a hard drivewhen replacing a power supply unitwhen opening a computer casewhen installing RAM
when installing a hard drive
when replacing a power supply unit
when opening a computer case
when installing RAM
rubbing alcoholsoap and watera diluted ammonia solutionisopropyl alcohol
rubbing alcohol
soap and water
a diluted ammonia solution
isopropyl alcohol
nbtstat cisco.comnslookup cisco.comping cisco.comnet cisco.comipconfig /flushdns
nbtstat cisco.com
nslookup cisco.com
ping cisco.com
net cisco.com
ipconfig /flushdns
Passwords should be physically stored in a convenient location.Lockout policies should be avoided in order to increase user access.Passwords should contain mainly numbers for better encryption.The system administrator should assign passwords to the users.An expiration period should be established so that passwords frequently change.
Passwords should be physically stored in a convenient location.
Lockout policies should be avoided in order to increase user access.
Passwords should contain mainly numbers for better encryption.
The system administrator should assign passwords to the users.
An expiration period should be established so that passwords frequently change.
Consult the service manual for the laptop.Ask a fellow technician for advice.Remove the keyboard.Backup the BIOS settings.
Consult the service manual for the laptop.
Ask a fellow technician for advice.
Remove the keyboard.
Backup the BIOS settings.
a fixed value that represents the level of access of a user to system filesthe location of the Documents folder of a particular usera variable set by the administrator for each user of the systeman environment variable that is set by the operating system
a fixed value that represents the level of access of a user to system files
the location of the Documents folder of a particular user
a variable set by the administrator for each user of the system
an environment variable that is set by the operating system
Can the laptop operate using the AC adapter?Have you changed your password recently?What software has been installed recently?What were you doing when the problem occurred?
Can the laptop operate using the AC adapter?
Have you changed your password recently?
What software has been installed recently?
What were you doing when the problem occurred?
piezoelectric printerinkjet printerthermal printerimpact printer
piezoelectric printer
inkjet printer
thermal printer
impact printer
ITaaSIaaSSaaSPaaS
ITaaS
IaaS
SaaS
PaaS
The computer displays an ‘Inaccessible Boot Device’ error after POST.The computer continually restarts without displaying the desktop.The computer displays a “BOOTMGR is missing” error after POST.The computer displays an “Invalid Boot Disk” error after POST.The computer locks up without any error messages.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
The computer continually restarts without displaying the desktop.
The computer displays a “BOOTMGR is missing” error after POST.
The computer displays an “Invalid Boot Disk” error after POST.
The computer locks up without any error messages.
enabling features that are disabled by a cellular carrierenabling app access to the root directoryallowing the user interface to be extensively customizednot properly creating or maintaining sandboxing featuresimproving device performance
enabling features that are disabled by a cellular carrier
enabling app access to the root directory
allowing the user interface to be extensively customized
not properly creating or maintaining sandboxing features
improving device performance
CompactFlash cardexternal flash driveexternal hard driveSecure Digital card
CompactFlash card
external flash drive
external hard drive
Secure Digital card
APIPAICMPDNSDHCP
APIPA
ICMP
DNS
DHCP
System ToolsComputer ManagementDevice ManagerMy Computer
System Tools
Computer Management
Device Manager
My Computer
LEAPWPA2WEPWPA
LEAP
WPA2
WEP
WPA
to connect multiple storage devices for redundancy or speedto provide enhanced audio and graphic capabilitiesto allow older PCI technology expansion slots to be usedto connect peripheral devices to a PC to improve performance
to connect multiple storage devices for redundancy or speed
to provide enhanced audio and graphic capabilities
to allow older PCI technology expansion slots to be used
to connect peripheral devices to a PC to improve performance
AC power connectorPS/2 keyboardweb cameratouchpadfingerprint readerexternal monitor
AC power connector
PS/2 keyboard
web camera
touchpad
fingerprint reader
external monitor
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.Preventive maintenance enables the IT manager to check on the location and state of the computer assets.Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
NTFS allows the automatic detection of bad sectors.NTFS allows faster formatting of drives.NTFS is easier to configure.NTFS supports larger files.NTFS provides more security features.NTFS allows faster access to external peripherals such as a USB drive.
NTFS allows the automatic detection of bad sectors.
NTFS allows faster formatting of drives.
NTFS is easier to configure.
NTFS supports larger files.
NTFS provides more security features.
NTFS allows faster access to external peripherals such as a USB drive.
143532280443
143
53
22
80
443
A power-intensive app is running at the background.An app is not compatible with the device.The touchscreen is not calibrated.The operating system has encountered an error.
A power-intensive app is running at the background.
An app is not compatible with the device.
The touchscreen is not calibrated.
The operating system has encountered an error.
if there are signs of swellingif the battery only supports the system for a reduced period of timeif the device feels warm to the touchif the screen brightness begins to dim
if there are signs of swelling
if the battery only supports the system for a reduced period of time
if the device feels warm to the touch
if the screen brightness begins to dim
Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure the humidity and temperature levels are set as low as possible.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the wireless network is on a different frequency than the offending source.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the humidity and temperature levels are set as low as possible.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the wireless network is on a different frequency than the offending source.
FinderDisk UtilityTime MachineDeja Dup
Finder
Disk Utility
Time Machine
Deja Dup
Create a System Repair Disc and restore the image.Press the F12 key during the boot process and start the computer in Safe Mode.Boot from a Windows 7 installation media and access the System Restore utility.Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
Create a System Repair Disc and restore the image.
Press the F12 key during the boot process and start the computer in Safe Mode.
Boot from a Windows 7 installation media and access the System Restore utility.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
a description of the problem and solutioneverything that was done to try to solve the problemonly the solution, because this solved the problemonly the failed attempts, so that future technicians will know what not to try
a description of the problem and solution
everything that was done to try to solve the problem
only the solution, because this solved the problem
only the failed attempts, so that future technicians will know what not to try
jdi nahoru, na obsah
Hry (588)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo