jdi na vlastní test/obsah stránky
Password protect iTunes or Google Play accounts.Back up user data on a regular basis.Ensure that the operating system software and applications contain the latest updates.Unmount all unused disk partitions.Execute a factory reset once a month to remove all unidentified malicious software.Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Password protect iTunes or Google Play accounts.
Back up user data on a regular basis.
Ensure that the operating system software and applications contain the latest updates.
Unmount all unused disk partitions.
Execute a factory reset once a month to remove all unidentified malicious software.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
inkjet printerimpact printerthermal printerpiezoelectric printer
inkjet printer
impact printer
thermal printer
piezoelectric printer
What happened after the error occurred?What happened before the error occurred?Is this the first time the error occurred?What error messages were displayed when the error occurred?
What happened after the error occurred?
What happened before the error occurred?
Is this the first time the error occurred?
What error messages were displayed when the error occurred?
Test the theory to determine cause.Establish a plan of action.Identify the exact problem.Document findings and outcomes.
Test the theory to determine cause.
Establish a plan of action.
Identify the exact problem.
Document findings and outcomes.
143224438053
143
22
443
80
53
Use a can of compressed air to remove excess dust.Use a moistened cotton swab to remove excess dust.Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.Ignore the dust, as it does not affect the computer.
Use a can of compressed air to remove excess dust.
Use a moistened cotton swab to remove excess dust.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Ignore the dust, as it does not affect the computer.
when opening a computer casewhen installing RAMwhen installing a hard drivewhen replacing a power supply unit
when opening a computer case
when installing RAM
when installing a hard drive
when replacing a power supply unit
Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure the wireless network is on a different frequency than the offending source.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the humidity and temperature levels are set as low as possible.
if the battery only supports the system for a reduced period of timeif the device feels warm to the touchif the screen brightness begins to dimif there are signs of swelling
if the battery only supports the system for a reduced period of time
if the device feels warm to the touch
if the screen brightness begins to dim
if there are signs of swelling
Data resources and access are centrally controlled.Personnel costs are lower because a dedicated network administrator is no longer necessary.The total cost of the new solution is considerably lower.Data is more secure in the event of hardware failures.Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Individual users are in control of their own computers and network resources.
a fixed value that represents the level of access of a user to system filesthe location of the Documents folder of a particular usera variable set by the administrator for each user of the systeman environment variable that is set by the operating system
a fixed value that represents the level of access of a user to system files
the location of the Documents folder of a particular user
a variable set by the administrator for each user of the system
an environment variable that is set by the operating system
scannerswitchbiometric identification deviceKVMdigitizer
scanner
switchbiometric identification device
KVM
digitizer
CompactFlash cardexternal flash driveSecure Digital cardexternal hard drive
CompactFlash card
external flash drive
Secure Digital card
external hard drive
to connect multiple storage devices for redundancy or speedto connect peripheral devices to a PC to improve performanceto allow older PCI technology expansion slots to be usedto provide enhanced audio and graphic capabilities
to connect multiple storage devices for redundancy or speed
to connect peripheral devices to a PC to improve performance
to allow older PCI technology expansion slots to be used
to provide enhanced audio and graphic capabilities
FinderDisk UtilityDeja DupTime Machine
Finder
Disk Utility
Deja Dup
Time Machine
An expiration period should be established so that passwords frequently change.The system administrator should assign passwords to the users.Lockout policies should be avoided in order to increase user access.Passwords should be physically stored in a convenient location.Passwords should contain mainly numbers for better encryption.
An expiration period should be established so that passwords frequently change.
The system administrator should assign passwords to the users.
Lockout policies should be avoided in order to increase user access.
Passwords should be physically stored in a convenient location.
Passwords should contain mainly numbers for better encryption.
pickup rollerstransfer rollersfuser assemblyprimary coronasecondary coronapaper trays
pickup rollers
transfer rollers
fuser assembly
primary corona
secondary corona
paper trays
ping cisco.comnet cisco.comipconfig /flushdnsnslookup cisco.comnbtstat cisco.com
ping cisco.com
net cisco.com
ipconfig /flushdns
nslookup cisco.com
nbtstat cisco.com
enabling features that are disabled by a cellular carrierallowing the user interface to be extensively customizedenabling app access to the root directorynot properly creating or maintaining sandboxing featuresimproving device performance
enabling features that are disabled by a cellular carrier
allowing the user interface to be extensively customized
enabling app access to the root directory
not properly creating or maintaining sandboxing features
improving device performance
the optical drivethe network interface cardthe power supplythe video card
the optical drive
the network interface card
the power supply
the video card
support for Windows backupapplication license protectionsupport for Windows Firewallhashed encryption of the hard drive volumestorage of digital certificatessecurity for user authentication information
support for Windows backup
application license protection
support for Windows Firewall
hashed encryption of the hard drive volume
storage of digital certificates
security for user authentication information
solid-state hybrid disksolid-state driveembedded multimedia cardUSB flash drive
solid-state hybrid disk
solid-state drive
embedded multimedia card
USB flash drive
transportdata linknetworkapplication
transport
data link
network
application
IaaSSaaSPaaSITaaS
IaaS
SaaS
PaaS
ITaaS
The TCP/IP protocol stack is not loaded.The operating system is not compatible with the remote sites.The default gateway is incorrect.The NIC driver is out of date.
The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The default gateway is incorrect.
The NIC driver is out of date.
to specify procedures for dealing with potentially hazardous materialsto specify procedures for the operation of sensitive components and prevention of electrostatic dischargeto specify procedures in the use of humidity control and prevention of moisture damageto specify procedures in designing and building common computer systems
to specify procedures for dealing with potentially hazardous materials
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures in designing and building common computer systems
A power-intensive app is running at the background.The touchscreen is not calibrated.The operating system has encountered an error.An app is not compatible with the device.
A power-intensive app is running at the background.
The touchscreen is not calibrated.
The operating system has encountered an error.
An app is not compatible with the device.
NTFS allows faster formatting of drives.NTFS allows the automatic detection of bad sectors.NTFS is easier to configure.NTFS provides more security features.NTFS supports larger files.NTFS allows faster access to external peripherals such as a USB drive.
NTFS allows faster formatting of drives.
NTFS allows the automatic detection of bad sectors.
NTFS is easier to configure.
NTFS provides more security features.
NTFS supports larger files.
NTFS allows faster access to external peripherals such as a USB drive.
Backup the BIOS settings.Remove the keyboard.Consult the service manual for the laptop.Ask a fellow technician for advice.
Backup the BIOS settings.
Remove the keyboard.
Consult the service manual for the laptop.
Ask a fellow technician for advice.
The computer emits a pattern of beeps indicating the failing device.The computer automatically boots into Safe Mode and displays a warning on the screen.The screen flashes with a red background and displays a warning message.The computer returns an error message that indicates the I/O address of the failing device.
The computer emits a pattern of beeps indicating the failing device.
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer returns an error message that indicates the I/O address of the failing device.
WEPLEAPWPAWPA2
WEP
LEAP
WPA
WPA2
TPMdrive encryptionfile encryptionTKIP keyMAC filteringpasswords
TPM
drive encryption
file encryption
TKIP key
MAC filtering
passwords
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.The user must browse the Internet, then download and install the proper driver.Nothing. Windows automatically provides the driver.The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.
The user must browse the Internet, then download and install the proper driver.
Nothing. Windows automatically provides the driver.
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
standby power supplyuninterruptible power supplypower invertersurge suppressor
standby power supply
uninterruptible power supply
power inverter
surge suppressor
Power to the pixels has been removed.The display settings have been changed.The LCD cutoff switch is damaged.The display is not correctly installed.The GPU is not cooling correctly.
Power to the pixels has been removed.
The display settings have been changed.
The LCD cutoff switch is damaged.
The display is not correctly installed.
The GPU is not cooling correctly.
Infected computers are called daemons.Many hosts participate in a coordinated attack.All hosts must be in the same geographic area.It is easy to identify the source of the attack.
Infected computers are called daemons.
Many hosts participate in a coordinated attack.
All hosts must be in the same geographic area.
It is easy to identify the source of the attack.
The computer locks up without any error messages.The computer displays an ‘Inaccessible Boot Device’ error after POST.The computer displays a “BOOTMGR is missing” error after POST.The computer continually restarts without displaying the desktop.The computer displays an “Invalid Boot Disk” error after POST.
The computer locks up without any error messages.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
The computer displays a “BOOTMGR is missing” error after POST.
The computer continually restarts without displaying the desktop.
The computer displays an “Invalid Boot Disk” error after POST.
external monitorPS/2 keyboardfingerprint readertouchpadAC power connectorweb camera
external monitor
PS/2 keyboard
fingerprint reader
touchpad
AC power connector
web camera
isopropyl alcoholrubbing alcoholsoap and watera diluted ammonia solution
isopropyl alcohol
rubbing alcohol
soap and water
a diluted ammonia solution
DIMMPCIISAAGPPCIe
DIMM
PCI
ISA
AGP
PCIe
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
everything that was done to try to solve the problemonly the failed attempts, so that future technicians will know what not to tryonly the solution, because this solved the problema description of the problem and solution
everything that was done to try to solve the problem
only the failed attempts, so that future technicians will know what not to try
only the solution, because this solved the problem
a description of the problem and solution
Add or Remove ProgramsTask ManagerSystem RestoreEvent Viewer
Add or Remove Programs
Task Manager
System Restore
Event Viewer
copper cable locationbasic functionality of computer portswireless signal strength and access point positioningquality of electricity in computer components
copper cable location
basic functionality of computer ports
wireless signal strength and access point positioning
quality of electricity in computer components
Boot from a Windows 7 installation media and access the System Restore utility.Press the F12 key during the boot process and start the computer in Safe Mode.Access the Control Panel and choose Restore Files from Backup from the System and Security menu.Create a System Repair Disc and restore the image.
Boot from a Windows 7 installation media and access the System Restore utility.
Press the F12 key during the boot process and start the computer in Safe Mode.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
Create a System Repair Disc and restore the image.
Icons and buttons are used to represent the different apps on the phone.Text messages, news, photos and other content can be displayed in the different tiles.Tile sizes depend on the size of the app.Unpinning an app from this view will uninstall the app from the phone.Tapping and holding the arrow at the bottom left will display the Home screen.
Icons and buttons are used to represent the different apps on the phone.
Text messages, news, photos and other content can be displayed in the different tiles.
Tile sizes depend on the size of the app.
Unpinning an app from this view will uninstall the app from the phone.
Tapping and holding the arrow at the bottom left will display the Home screen.
Terminal Serviceshypervisorserver clusteringRAID
Terminal Services
hypervisor
server clustering
RAID
DB-15DVIPS/2HDMI
DB-15
DVI
PS/2
HDMI
ICMPDHCPDNSAPIPA
ICMP
DHCP
DNS
APIPA
Dust can encourage insects and other pests to live in the equipment closets.Dust increases electromagnetic interference in nearby connected cables.Dust can cause network equipment to overheat and cause problems on the network.Dust diminishes the range of wireless services.Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust can encourage insects and other pests to live in the equipment closets.
Dust increases electromagnetic interference in nearby connected cables.
Dust can cause network equipment to overheat and cause problems on the network.
Dust diminishes the range of wireless services.
Dust is considered a fire hazard that poses danger to personnel and equipment.
What software has been installed recently?Can the laptop operate using the AC adapter?Have you changed your password recently?What were you doing when the problem occurred?
What software has been installed recently?
Can the laptop operate using the AC adapter?
Have you changed your password recently?
What were you doing when the problem occurred?
System ToolsComputer ManagementMy ComputerDevice Manager
System Tools
Computer Management
My Computer
Device Manager
jdi nahoru, na obsah
Hry (588)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo