jdi na vlastní test/obsah stránky
The TCP/IP protocol stack is not loaded.The operating system is not compatible with the remote sites.The default gateway is incorrect.The NIC driver is out of date.
The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The default gateway is incorrect.
The NIC driver is out of date.
the power supplythe video cardthe optical drivethe network interface card
the power supply
the video card
the optical drive
the network interface card
Personnel costs are lower because a dedicated network administrator is no longer necessary.The total cost of the new solution is considerably lower.Individual users are in control of their own computers and network resources.Data resources and access are centrally controlled.Data is more secure in the event of hardware failures.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
The total cost of the new solution is considerably lower.
Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
Data is more secure in the event of hardware failures.
801435344322
80
143
53
443
22
enabling app access to the root directoryallowing the user interface to be extensively customizedenabling features that are disabled by a cellular carriernot properly creating or maintaining sandboxing featuresimproving device performance
enabling app access to the root directory
allowing the user interface to be extensively customized
enabling features that are disabled by a cellular carrier
not properly creating or maintaining sandboxing features
improving device performance
Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure the humidity and temperature levels are set as low as possible.Ensure the wireless network is on a different frequency than the offending source.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the humidity and temperature levels are set as low as possible.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
scannerswitchbiometric identification devicedigitizerKVM
scanner
switchbiometric identification device
digitizer
KVM
to connect multiple storage devices for redundancy or speedto provide enhanced audio and graphic capabilitiesto allow older PCI technology expansion slots to be usedto connect peripheral devices to a PC to improve performance
to connect multiple storage devices for redundancy or speed
to provide enhanced audio and graphic capabilities
to allow older PCI technology expansion slots to be used
to connect peripheral devices to a PC to improve performance
Power to the pixels has been removed.The GPU is not cooling correctly.The LCD cutoff switch is damaged.The display settings have been changed.The display is not correctly installed.
Power to the pixels has been removed.
The GPU is not cooling correctly.
The LCD cutoff switch is damaged.
The display settings have been changed.
The display is not correctly installed.
AGPPCIeISAPCIDIMM
AGP
PCIe
ISA
PCI
DIMM
basic functionality of computer portsquality of electricity in computer componentswireless signal strength and access point positioningcopper cable location
basic functionality of computer ports
quality of electricity in computer components
wireless signal strength and access point positioning
copper cable location
TPMpasswordsfile encryptionTKIP keydrive encryptionMAC filtering
TPM
passwords
file encryption
TKIP key
drive encryption
MAC filtering
soap and waterrubbing alcoholisopropyl alcohola diluted ammonia solution
soap and water
rubbing alcohol
isopropyl alcohol
a diluted ammonia solution
thermal printerimpact printerinkjet printerpiezoelectric printer
thermal printer
impact printer
inkjet printer
piezoelectric printer
DNSICMPAPIPADHCP
DNS
ICMP
APIPA
DHCP
ipconfig /flushdnsnet cisco.comnslookup cisco.comping cisco.comnbtstat cisco.com
ipconfig /flushdns
net cisco.com
nslookup cisco.com
ping cisco.com
nbtstat cisco.com
Infected computers are called daemons.Many hosts participate in a coordinated attack.It is easy to identify the source of the attack.All hosts must be in the same geographic area.
Infected computers are called daemons.
Many hosts participate in a coordinated attack.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
primary coronafuser assemblypickup rollerspaper traystransfer rollerssecondary corona
primary corona
fuser assembly
pickup rollers
paper trays
transfer rollers
secondary corona
Ignore the dust, as it does not affect the computer.Use a moistened cotton swab to remove excess dust.Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.Use a can of compressed air to remove excess dust.
Ignore the dust, as it does not affect the computer.
Use a moistened cotton swab to remove excess dust.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Use a can of compressed air to remove excess dust.
What software has been installed recently?Can the laptop operate using the AC adapter?What were you doing when the problem occurred?Have you changed your password recently?
What software has been installed recently?
Can the laptop operate using the AC adapter?
What were you doing when the problem occurred?
Have you changed your password recently?
when installing RAMwhen replacing a power supply unitwhen installing a hard drivewhen opening a computer case
when installing RAM
when replacing a power supply unit
when installing a hard drive
when opening a computer case
embedded multimedia cardsolid-state drivesolid-state hybrid diskUSB flash drive
embedded multimedia card
solid-state drive
solid-state hybrid disk
USB flash drive
The computer continually restarts without displaying the desktop.The computer locks up without any error messages.The computer displays a “BOOTMGR is missing” error after POST.The computer displays an ‘Inaccessible Boot Device’ error after POST.The computer displays an “Invalid Boot Disk” error after POST.
The computer continually restarts without displaying the desktop.
The computer locks up without any error messages.
The computer displays a “BOOTMGR is missing” error after POST.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
The computer displays an “Invalid Boot Disk” error after POST.
Terminal Servicesserver clusteringRAIDhypervisor
Terminal Services
server clustering
RAID
hypervisor
Is this the first time the error occurred?What happened after the error occurred?What happened before the error occurred?What error messages were displayed when the error occurred?
Is this the first time the error occurred?
What happened after the error occurred?
What happened before the error occurred?
What error messages were displayed when the error occurred?
An app is not compatible with the device.A power-intensive app is running at the background.The touchscreen is not calibrated.The operating system has encountered an error.
An app is not compatible with the device.
A power-intensive app is running at the background.
The touchscreen is not calibrated.
The operating system has encountered an error.
DVIDB-15HDMIPS/2
DVI
DB-15
HDMI
PS/2
Dust diminishes the range of wireless services.Dust can cause network equipment to overheat and cause problems on the network.Dust is considered a fire hazard that poses danger to personnel and equipment.Dust increases electromagnetic interference in nearby connected cables.Dust can encourage insects and other pests to live in the equipment closets.
Dust diminishes the range of wireless services.
Dust can cause network equipment to overheat and cause problems on the network.
Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust increases electromagnetic interference in nearby connected cables.
Dust can encourage insects and other pests to live in the equipment closets.
SaaSIaaSITaaSPaaS
SaaS
IaaS
ITaaS
PaaS
everything that was done to try to solve the problemonly the solution, because this solved the problemonly the failed attempts, so that future technicians will know what not to trya description of the problem and solution
everything that was done to try to solve the problem
only the solution, because this solved the problem
only the failed attempts, so that future technicians will know what not to try
a description of the problem and solution
NTFS is easier to configure.NTFS provides more security features.NTFS allows the automatic detection of bad sectors.NTFS allows faster formatting of drives.NTFS allows faster access to external peripherals such as a USB drive.NTFS supports larger files.
NTFS is easier to configure.
NTFS provides more security features.
NTFS allows the automatic detection of bad sectors.
NTFS allows faster formatting of drives.
NTFS allows faster access to external peripherals such as a USB drive.
NTFS supports larger files.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
fingerprint readerweb cameraexternal monitortouchpadPS/2 keyboardAC power connector
fingerprint reader
web camera
external monitor
touchpad
PS/2 keyboard
AC power connector
Test the theory to determine cause.Document findings and outcomes.Identify the exact problem.Establish a plan of action.
Test the theory to determine cause.
Document findings and outcomes.
Identify the exact problem.
Establish a plan of action.
LEAPWPA2WPAWEP
LEAP
WPA2
WPA
WEP
Tile sizes depend on the size of the app.Icons and buttons are used to represent the different apps on the phone.Unpinning an app from this view will uninstall the app from the phone.Tapping and holding the arrow at the bottom left will display the Home screen.Text messages, news, photos and other content can be displayed in the different tiles.
Tile sizes depend on the size of the app.
Icons and buttons are used to represent the different apps on the phone.
Unpinning an app from this view will uninstall the app from the phone.
Tapping and holding the arrow at the bottom left will display the Home screen.
Text messages, news, photos and other content can be displayed in the different tiles.
The system administrator should assign passwords to the users.Passwords should contain mainly numbers for better encryption.Lockout policies should be avoided in order to increase user access.Passwords should be physically stored in a convenient location.An expiration period should be established so that passwords frequently change.
The system administrator should assign passwords to the users.
Passwords should contain mainly numbers for better encryption.
Lockout policies should be avoided in order to increase user access.
Passwords should be physically stored in a convenient location.
An expiration period should be established so that passwords frequently change.
an environment variable that is set by the operating systema fixed value that represents the level of access of a user to system filesthe location of the Documents folder of a particular usera variable set by the administrator for each user of the system
an environment variable that is set by the operating system
a fixed value that represents the level of access of a user to system files
the location of the Documents folder of a particular user
a variable set by the administrator for each user of the system
The computer automatically boots into Safe Mode and displays a warning on the screen.The screen flashes with a red background and displays a warning message.The computer emits a pattern of beeps indicating the failing device.The computer returns an error message that indicates the I/O address of the failing device.
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message that indicates the I/O address of the failing device.
Create a System Repair Disc and restore the image.Press the F12 key during the boot process and start the computer in Safe Mode.Access the Control Panel and choose Restore Files from Backup from the System and Security menu.Boot from a Windows 7 installation media and access the System Restore utility.
Create a System Repair Disc and restore the image.
Press the F12 key during the boot process and start the computer in Safe Mode.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
Boot from a Windows 7 installation media and access the System Restore utility.
if the device feels warm to the touchif there are signs of swellingif the battery only supports the system for a reduced period of timeif the screen brightness begins to dim
if the device feels warm to the touch
if there are signs of swelling
if the battery only supports the system for a reduced period of time
if the screen brightness begins to dim
Deja DupDisk UtilityFinderTime Machine
Deja Dup
Disk Utility
Finder
Time Machine
to specify procedures in the use of humidity control and prevention of moisture damageto specify procedures in designing and building common computer systemsto specify procedures for dealing with potentially hazardous materialsto specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures in designing and building common computer systems
to specify procedures for dealing with potentially hazardous materials
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
Back up user data on a regular basis.Unmount all unused disk partitions.Ensure that the operating system software and applications contain the latest updates.Password protect iTunes or Google Play accounts.Use airplane mode if you are accessing the Internet at an open Wi-Fi site.Execute a factory reset once a month to remove all unidentified malicious software.
Back up user data on a regular basis.
Unmount all unused disk partitions.
Ensure that the operating system software and applications contain the latest updates.
Password protect iTunes or Google Play accounts.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Execute a factory reset once a month to remove all unidentified malicious software.
power inverterstandby power supplysurge suppressoruninterruptible power supply
power inverter
standby power supply
surge suppressor
uninterruptible power supply
Consult the service manual for the laptop.Remove the keyboard.Ask a fellow technician for advice.Backup the BIOS settings.
Consult the service manual for the laptop.
Remove the keyboard.
Ask a fellow technician for advice.
Backup the BIOS settings.
hashed encryption of the hard drive volumesecurity for user authentication informationsupport for Windows Firewallsupport for Windows backupapplication license protectionstorage of digital certificates
hashed encryption of the hard drive volume
security for user authentication information
support for Windows Firewall
support for Windows backup
application license protection
storage of digital certificates
data linktransportapplicationnetwork
data link
transport
application
network
external hard driveexternal flash driveCompactFlash cardSecure Digital card
external hard drive
external flash drive
CompactFlash card
Secure Digital card
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.Nothing. Windows automatically provides the driver.The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.The user must browse the Internet, then download and install the proper driver.
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
Nothing. Windows automatically provides the driver.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.
The user must browse the Internet, then download and install the proper driver.
Device ManagerMy ComputerComputer ManagementSystem Tools
Device Manager
My Computer
Computer Management
System Tools
Add or Remove ProgramsTask ManagerEvent ViewerSystem Restore
Add or Remove Programs
Task Manager
Event Viewer
System Restore
jdi nahoru, na obsah
Hry (587)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo