jdi na vlastní test/obsah stránky
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure the wireless network is on a different frequency than the offending source.Ensure the humidity and temperature levels are set as low as possible.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the wireless network is on a different frequency than the offending source.
Ensure the humidity and temperature levels are set as low as possible.
Terminal Servicesserver clusteringhypervisorRAID
Terminal Services
server clustering
hypervisor
RAID
the location of the Documents folder of a particular usera fixed value that represents the level of access of a user to system filesa variable set by the administrator for each user of the systeman environment variable that is set by the operating system
the location of the Documents folder of a particular user
a fixed value that represents the level of access of a user to system files
a variable set by the administrator for each user of the system
an environment variable that is set by the operating system
soap and waterisopropyl alcohola diluted ammonia solutionrubbing alcohol
soap and water
isopropyl alcohol
a diluted ammonia solution
rubbing alcohol
Document findings and outcomes.Identify the exact problem.Establish a plan of action.Test the theory to determine cause.
Document findings and outcomes.
Identify the exact problem.
Establish a plan of action.
Test the theory to determine cause.
KVMscannerswitchbiometric identification devicedigitizer
KVM
scanner
switchbiometric identification device
digitizer
Remove the keyboard.Consult the service manual for the laptop.Ask a fellow technician for advice.Backup the BIOS settings.
Remove the keyboard.
Consult the service manual for the laptop.
Ask a fellow technician for advice.
Backup the BIOS settings.
Ignore the dust, as it does not affect the computer.Use a moistened cotton swab to remove excess dust.Use a can of compressed air to remove excess dust.Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Ignore the dust, as it does not affect the computer.
Use a moistened cotton swab to remove excess dust.
Use a can of compressed air to remove excess dust.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
The computer displays an “Invalid Boot Disk” error after POST.The computer locks up without any error messages.The computer displays an ‘Inaccessible Boot Device’ error after POST.The computer displays a “BOOTMGR is missing” error after POST.The computer continually restarts without displaying the desktop.
The computer displays an “Invalid Boot Disk” error after POST.
The computer locks up without any error messages.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
The computer displays a “BOOTMGR is missing” error after POST.
The computer continually restarts without displaying the desktop.
804431435322
80
443
143
53
22
Secure Digital cardexternal flash driveCompactFlash cardexternal hard drive
Secure Digital card
external flash drive
CompactFlash card
external hard drive
pickup rollersprimary coronafuser assemblytransfer rollerssecondary coronapaper trays
pickup rollers
primary corona
fuser assembly
transfer rollers
secondary corona
paper trays
AGPDIMMPCIISAPCIe
AGP
DIMM
PCI
ISA
PCIe
FinderTime MachineDisk UtilityDeja Dup
Finder
Time Machine
Disk Utility
Deja Dup
inkjet printerthermal printerpiezoelectric printerimpact printer
inkjet printer
thermal printer
piezoelectric printer
impact printer
Dust diminishes the range of wireless services.Dust is considered a fire hazard that poses danger to personnel and equipment.Dust can cause network equipment to overheat and cause problems on the network.Dust increases electromagnetic interference in nearby connected cables.Dust can encourage insects and other pests to live in the equipment closets.
Dust diminishes the range of wireless services.
Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust can cause network equipment to overheat and cause problems on the network.
Dust increases electromagnetic interference in nearby connected cables.
Dust can encourage insects and other pests to live in the equipment closets.
if the battery only supports the system for a reduced period of timeif there are signs of swellingif the screen brightness begins to dimif the device feels warm to the touch
if the battery only supports the system for a reduced period of time
if there are signs of swelling
if the screen brightness begins to dim
if the device feels warm to the touch
Passwords should contain mainly numbers for better encryption.Lockout policies should be avoided in order to increase user access.Passwords should be physically stored in a convenient location.The system administrator should assign passwords to the users.An expiration period should be established so that passwords frequently change.
Passwords should contain mainly numbers for better encryption.
Lockout policies should be avoided in order to increase user access.
Passwords should be physically stored in a convenient location.
The system administrator should assign passwords to the users.
An expiration period should be established so that passwords frequently change.
Press the F12 key during the boot process and start the computer in Safe Mode.Create a System Repair Disc and restore the image.Boot from a Windows 7 installation media and access the System Restore utility.Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
Press the F12 key during the boot process and start the computer in Safe Mode.
Create a System Repair Disc and restore the image.
Boot from a Windows 7 installation media and access the System Restore utility.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
The operating system has encountered an error.The touchscreen is not calibrated.A power-intensive app is running at the background.An app is not compatible with the device.
The operating system has encountered an error.
The touchscreen is not calibrated.
A power-intensive app is running at the background.
An app is not compatible with the device.
basic functionality of computer portswireless signal strength and access point positioningcopper cable locationquality of electricity in computer components
basic functionality of computer ports
wireless signal strength and access point positioning
copper cable location
quality of electricity in computer components
SaaSITaaSIaaSPaaS
SaaS
ITaaS
IaaS
PaaS
What were you doing when the problem occurred?Can the laptop operate using the AC adapter?Have you changed your password recently?What software has been installed recently?
What were you doing when the problem occurred?
Can the laptop operate using the AC adapter?
Have you changed your password recently?
What software has been installed recently?
NTFS allows faster formatting of drives.NTFS is easier to configure.NTFS allows the automatic detection of bad sectors.NTFS supports larger files.NTFS allows faster access to external peripherals such as a USB drive.NTFS provides more security features.
NTFS allows faster formatting of drives.
NTFS is easier to configure.
NTFS allows the automatic detection of bad sectors.
NTFS supports larger files.
NTFS allows faster access to external peripherals such as a USB drive.
NTFS provides more security features.
when installing RAMwhen replacing a power supply unitwhen installing a hard drivewhen opening a computer case
when installing RAM
when replacing a power supply unit
when installing a hard drive
when opening a computer case
allowing the user interface to be extensively customizednot properly creating or maintaining sandboxing featuresenabling app access to the root directoryimproving device performanceenabling features that are disabled by a cellular carrier
allowing the user interface to be extensively customized
not properly creating or maintaining sandboxing features
enabling app access to the root directory
improving device performance
enabling features that are disabled by a cellular carrier
only the failed attempts, so that future technicians will know what not to tryeverything that was done to try to solve the problemonly the solution, because this solved the problema description of the problem and solution
only the failed attempts, so that future technicians will know what not to try
everything that was done to try to solve the problem
only the solution, because this solved the problem
a description of the problem and solution
to specify procedures in the use of humidity control and prevention of moisture damageto specify procedures for the operation of sensitive components and prevention of electrostatic dischargeto specify procedures for dealing with potentially hazardous materialsto specify procedures in designing and building common computer systems
to specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures for dealing with potentially hazardous materials
to specify procedures in designing and building common computer systems
standby power supplypower inverteruninterruptible power supplysurge suppressor
standby power supply
power inverter
uninterruptible power supply
surge suppressor
Tapping and holding the arrow at the bottom left will display the Home screen.Unpinning an app from this view will uninstall the app from the phone.Tile sizes depend on the size of the app.Text messages, news, photos and other content can be displayed in the different tiles.Icons and buttons are used to represent the different apps on the phone.
Tapping and holding the arrow at the bottom left will display the Home screen.
Unpinning an app from this view will uninstall the app from the phone.
Tile sizes depend on the size of the app.
Text messages, news, photos and other content can be displayed in the different tiles.
Icons and buttons are used to represent the different apps on the phone.
the optical drivethe network interface cardthe video cardthe power supply
the optical drive
the network interface card
the video card
the power supply
to connect peripheral devices to a PC to improve performanceto connect multiple storage devices for redundancy or speedto allow older PCI technology expansion slots to be usedto provide enhanced audio and graphic capabilities
to connect peripheral devices to a PC to improve performance
to connect multiple storage devices for redundancy or speed
to allow older PCI technology expansion slots to be used
to provide enhanced audio and graphic capabilities
The default gateway is incorrect.The operating system is not compatible with the remote sites.The TCP/IP protocol stack is not loaded.The NIC driver is out of date.
The default gateway is incorrect.
The operating system is not compatible with the remote sites.
The TCP/IP protocol stack is not loaded.
The NIC driver is out of date.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.The user must browse the Internet, then download and install the proper driver.The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.Nothing. Windows automatically provides the driver.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.
The user must browse the Internet, then download and install the proper driver.
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
Nothing. Windows automatically provides the driver.
Infected computers are called daemons.Many hosts participate in a coordinated attack.It is easy to identify the source of the attack.All hosts must be in the same geographic area.
Infected computers are called daemons.
Many hosts participate in a coordinated attack.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
DB-15HDMIDVIPS/2
DB-15
HDMI
DVI
PS/2
What error messages were displayed when the error occurred?Is this the first time the error occurred?What happened after the error occurred?What happened before the error occurred?
What error messages were displayed when the error occurred?
Is this the first time the error occurred?
What happened after the error occurred?
What happened before the error occurred?
The computer returns an error message that indicates the I/O address of the failing device.The computer automatically boots into Safe Mode and displays a warning on the screen.The computer emits a pattern of beeps indicating the failing device.The screen flashes with a red background and displays a warning message.
The computer returns an error message that indicates the I/O address of the failing device.
The computer automatically boots into Safe Mode and displays a warning on the screen.
The computer emits a pattern of beeps indicating the failing device.
The screen flashes with a red background and displays a warning message.
Data resources and access are centrally controlled.The total cost of the new solution is considerably lower.Data is more secure in the event of hardware failures.Personnel costs are lower because a dedicated network administrator is no longer necessary.Individual users are in control of their own computers and network resources.
Data resources and access are centrally controlled.
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
Individual users are in control of their own computers and network resources.
Execute a factory reset once a month to remove all unidentified malicious software.Password protect iTunes or Google Play accounts.Use airplane mode if you are accessing the Internet at an open Wi-Fi site.Ensure that the operating system software and applications contain the latest updates.Unmount all unused disk partitions.Back up user data on a regular basis.
Execute a factory reset once a month to remove all unidentified malicious software.
Password protect iTunes or Google Play accounts.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Ensure that the operating system software and applications contain the latest updates.
Unmount all unused disk partitions.
Back up user data on a regular basis.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.Preventive maintenance enables the IT manager to check on the location and state of the computer assets.Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
touchpadexternal monitorAC power connectorweb camerafingerprint readerPS/2 keyboard
touchpad
external monitor
AC power connector
web camera
fingerprint reader
PS/2 keyboard
The display is not correctly installed.The LCD cutoff switch is damaged.Power to the pixels has been removed.The display settings have been changed.The GPU is not cooling correctly.
The display is not correctly installed.
The LCD cutoff switch is damaged.
Power to the pixels has been removed.
The display settings have been changed.
The GPU is not cooling correctly.
TPMdrive encryptionpasswordsTKIP keyfile encryptionMAC filtering
TPM
drive encryption
passwords
TKIP key
file encryption
MAC filtering
networkapplicationdata linktransport
network
application
data link
transport
application license protectionsupport for Windows Firewallsupport for Windows backupstorage of digital certificatessecurity for user authentication informationhashed encryption of the hard drive volume
application license protection
support for Windows Firewall
support for Windows backup
storage of digital certificates
security for user authentication information
hashed encryption of the hard drive volume
My ComputerComputer ManagementDevice ManagerSystem Tools
My Computer
Computer Management
Device Manager
System Tools
ping cisco.comipconfig /flushdnsnslookup cisco.comnbtstat cisco.comnet cisco.com
ping cisco.com
ipconfig /flushdns
nslookup cisco.com
nbtstat cisco.com
net cisco.com
WPALEAPWEPWPA2
WPA
LEAP
WEP
WPA2
solid-state hybrid disksolid-state driveUSB flash driveembedded multimedia card
solid-state hybrid disk
solid-state drive
USB flash drive
embedded multimedia card
Event ViewerTask ManagerAdd or Remove ProgramsSystem Restore
Event Viewer
Task Manager
Add or Remove Programs
System Restore
DNSAPIPADHCPICMP
DNS
APIPA
DHCP
ICMP
jdi nahoru, na obsah
Hry (587)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo