jdi na vlastní test/obsah stránky
What happened after the error occurred?Is this the first time the error occurred?What error messages were displayed when the error occurred?What happened before the error occurred?
What happened after the error occurred?
Is this the first time the error occurred?
What error messages were displayed when the error occurred?
What happened before the error occurred?
to connect peripheral devices to a PC to improve performanceto provide enhanced audio and graphic capabilitiesto connect multiple storage devices for redundancy or speedto allow older PCI technology expansion slots to be used
to connect peripheral devices to a PC to improve performance
to provide enhanced audio and graphic capabilities
to connect multiple storage devices for redundancy or speed
to allow older PCI technology expansion slots to be used
TKIP keyTPMdrive encryptionpasswordsMAC filteringfile encryption
TKIP key
TPM
drive encryption
passwords
MAC filtering
file encryption
impact printerinkjet printerthermal printerpiezoelectric printer
impact printer
inkjet printer
thermal printer
piezoelectric printer
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.The user must browse the Internet, then download and install the proper driver.Nothing. Windows automatically provides the driver.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
The user must browse the Internet, then download and install the proper driver.
Nothing. Windows automatically provides the driver.
The computer automatically boots into Safe Mode and displays a warning on the screen.The screen flashes with a red background and displays a warning message.The computer emits a pattern of beeps indicating the failing device.The computer returns an error message that indicates the I/O address of the failing device.
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message that indicates the I/O address of the failing device.
secondary coronafuser assemblypickup rollersprimary coronatransfer rollerspaper trays
secondary corona
fuser assembly
pickup rollers
primary corona
transfer rollers
paper trays
external monitorPS/2 keyboardtouchpadweb cameraAC power connectorfingerprint reader
external monitor
PS/2 keyboard
touchpad
web camera
AC power connector
fingerprint reader
surge suppressoruninterruptible power supplystandby power supplypower inverter
surge suppressor
uninterruptible power supply
standby power supply
power inverter
Can the laptop operate using the AC adapter?Have you changed your password recently?What software has been installed recently?What were you doing when the problem occurred?
Can the laptop operate using the AC adapter?
Have you changed your password recently?
What software has been installed recently?
What were you doing when the problem occurred?
Task ManagerSystem RestoreEvent ViewerAdd or Remove Programs
Task Manager
System Restore
Event Viewer
Add or Remove Programs
when installing RAMwhen opening a computer casewhen installing a hard drivewhen replacing a power supply unit
when installing RAM
when opening a computer case
when installing a hard drive
when replacing a power supply unit
Ensure the wireless network is on a different frequency than the offending source.Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the humidity and temperature levels are set as low as possible.
Ensure the wireless network is on a different frequency than the offending source.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the humidity and temperature levels are set as low as possible.
HDMIDB-15PS/2DVI
HDMI
DB-15
PS/2
DVI
The computer displays an ‘Inaccessible Boot Device’ error after POST.The computer continually restarts without displaying the desktop.The computer displays a “BOOTMGR is missing” error after POST.The computer displays an “Invalid Boot Disk” error after POST.The computer locks up without any error messages.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
The computer continually restarts without displaying the desktop.
The computer displays a “BOOTMGR is missing” error after POST.
The computer displays an “Invalid Boot Disk” error after POST.
The computer locks up without any error messages.
to specify procedures for the operation of sensitive components and prevention of electrostatic dischargeto specify procedures in the use of humidity control and prevention of moisture damageto specify procedures in designing and building common computer systemsto specify procedures for dealing with potentially hazardous materials
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures in designing and building common computer systems
to specify procedures for dealing with potentially hazardous materials
The TCP/IP protocol stack is not loaded.The operating system is not compatible with the remote sites.The NIC driver is out of date.The default gateway is incorrect.
The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The NIC driver is out of date.
The default gateway is incorrect.
wireless signal strength and access point positioningquality of electricity in computer componentsbasic functionality of computer portscopper cable location
wireless signal strength and access point positioning
quality of electricity in computer components
basic functionality of computer ports
copper cable location
DNSDHCPICMPAPIPA
DNS
DHCP
ICMP
APIPA
Test the theory to determine cause.Establish a plan of action.Identify the exact problem.Document findings and outcomes.
Test the theory to determine cause.
Establish a plan of action.
Identify the exact problem.
Document findings and outcomes.
digitizerswitchbiometric identification devicescannerKVM
digitizer
switchbiometric identification device
scanner
KVM
143443532280
143
443
53
22
80
The display settings have been changed.The GPU is not cooling correctly.Power to the pixels has been removed.The LCD cutoff switch is damaged.The display is not correctly installed.
The display settings have been changed.
The GPU is not cooling correctly.
Power to the pixels has been removed.
The LCD cutoff switch is damaged.
The display is not correctly installed.
ITaaSSaaSPaaSIaaS
ITaaS
SaaS
PaaS
IaaS
enabling features that are disabled by a cellular carrierimproving device performanceallowing the user interface to be extensively customizedenabling app access to the root directorynot properly creating or maintaining sandboxing features
enabling features that are disabled by a cellular carrier
improving device performance
allowing the user interface to be extensively customized
enabling app access to the root directory
not properly creating or maintaining sandboxing features
My ComputerComputer ManagementDevice ManagerSystem Tools
My Computer
Computer Management
Device Manager
System Tools
the power supplythe video cardthe network interface cardthe optical drive
the power supply
the video card
the network interface card
the optical drive
Tile sizes depend on the size of the app.Icons and buttons are used to represent the different apps on the phone.Text messages, news, photos and other content can be displayed in the different tiles.Tapping and holding the arrow at the bottom left will display the Home screen.Unpinning an app from this view will uninstall the app from the phone.
Tile sizes depend on the size of the app.
Icons and buttons are used to represent the different apps on the phone.
Text messages, news, photos and other content can be displayed in the different tiles.
Tapping and holding the arrow at the bottom left will display the Home screen.
Unpinning an app from this view will uninstall the app from the phone.
WPA2WPALEAPWEP
WPA2
WPA
LEAP
WEP
rubbing alcoholisopropyl alcohola diluted ammonia solutionsoap and water
rubbing alcohol
isopropyl alcohol
a diluted ammonia solution
soap and water
All hosts must be in the same geographic area.Infected computers are called daemons.It is easy to identify the source of the attack.Many hosts participate in a coordinated attack.
All hosts must be in the same geographic area.
Infected computers are called daemons.
It is easy to identify the source of the attack.
Many hosts participate in a coordinated attack.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.Unmount all unused disk partitions.Back up user data on a regular basis.Ensure that the operating system software and applications contain the latest updates.Execute a factory reset once a month to remove all unidentified malicious software.Password protect iTunes or Google Play accounts.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Unmount all unused disk partitions.
Back up user data on a regular basis.
Ensure that the operating system software and applications contain the latest updates.
Execute a factory reset once a month to remove all unidentified malicious software.
Password protect iTunes or Google Play accounts.
NTFS is easier to configure.NTFS provides more security features.NTFS supports larger files.NTFS allows the automatic detection of bad sectors.NTFS allows faster access to external peripherals such as a USB drive.NTFS allows faster formatting of drives.
NTFS is easier to configure.
NTFS provides more security features.
NTFS supports larger files.
NTFS allows the automatic detection of bad sectors.
NTFS allows faster access to external peripherals such as a USB drive.
NTFS allows faster formatting of drives.
Consult the service manual for the laptop.Remove the keyboard.Backup the BIOS settings.Ask a fellow technician for advice.
Consult the service manual for the laptop.
Remove the keyboard.
Backup the BIOS settings.
Ask a fellow technician for advice.
solid-state driveembedded multimedia cardsolid-state hybrid diskUSB flash drive
solid-state drive
embedded multimedia card
solid-state hybrid disk
USB flash drive
application license protectionsecurity for user authentication informationhashed encryption of the hard drive volumesupport for Windows Firewallsupport for Windows backupstorage of digital certificates
application license protection
security for user authentication information
hashed encryption of the hard drive volume
support for Windows Firewall
support for Windows backup
storage of digital certificates
Disk UtilityTime MachineDeja DupFinder
Disk Utility
Time Machine
Deja Dup
Finder
everything that was done to try to solve the problema description of the problem and solutiononly the solution, because this solved the problemonly the failed attempts, so that future technicians will know what not to try
everything that was done to try to solve the problem
a description of the problem and solution
only the solution, because this solved the problem
only the failed attempts, so that future technicians will know what not to try
networkdata linkapplicationtransport
network
data link
application
transport
Dust can encourage insects and other pests to live in the equipment closets.Dust can cause network equipment to overheat and cause problems on the network.Dust increases electromagnetic interference in nearby connected cables.Dust diminishes the range of wireless services.Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust can encourage insects and other pests to live in the equipment closets.
Dust can cause network equipment to overheat and cause problems on the network.
Dust increases electromagnetic interference in nearby connected cables.
Dust diminishes the range of wireless services.
Dust is considered a fire hazard that poses danger to personnel and equipment.
Press the F12 key during the boot process and start the computer in Safe Mode.Create a System Repair Disc and restore the image.Access the Control Panel and choose Restore Files from Backup from the System and Security menu.Boot from a Windows 7 installation media and access the System Restore utility.
Press the F12 key during the boot process and start the computer in Safe Mode.
Create a System Repair Disc and restore the image.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
Boot from a Windows 7 installation media and access the System Restore utility.
RAIDhypervisorserver clusteringTerminal Services
RAID
hypervisor
server clustering
Terminal Services
ping cisco.comnslookup cisco.comnet cisco.comnbtstat cisco.comipconfig /flushdns
ping cisco.com
nslookup cisco.com
net cisco.com
nbtstat cisco.com
ipconfig /flushdns
Secure Digital cardCompactFlash cardexternal flash driveexternal hard drive
Secure Digital card
CompactFlash card
external flash drive
external hard drive
if there are signs of swellingif the battery only supports the system for a reduced period of timeif the screen brightness begins to dimif the device feels warm to the touch
if there are signs of swelling
if the battery only supports the system for a reduced period of time
if the screen brightness begins to dim
if the device feels warm to the touch
The total cost of the new solution is considerably lower.Data is more secure in the event of hardware failures.Data resources and access are centrally controlled.Individual users are in control of their own computers and network resources.Personnel costs are lower because a dedicated network administrator is no longer necessary.
The total cost of the new solution is considerably lower.
Data is more secure in the event of hardware failures.
Data resources and access are centrally controlled.
Individual users are in control of their own computers and network resources.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
DIMMISAPCIPCIeAGP
DIMM
ISA
PCI
PCIe
AGP
the location of the Documents folder of a particular useran environment variable that is set by the operating systema fixed value that represents the level of access of a user to system filesa variable set by the administrator for each user of the system
the location of the Documents folder of a particular user
an environment variable that is set by the operating system
a fixed value that represents the level of access of a user to system files
a variable set by the administrator for each user of the system
Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance enables the IT manager to check on the location and state of the computer assets.Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
The touchscreen is not calibrated.A power-intensive app is running at the background.An app is not compatible with the device.The operating system has encountered an error.
The touchscreen is not calibrated.
A power-intensive app is running at the background.
An app is not compatible with the device.
The operating system has encountered an error.
The system administrator should assign passwords to the users.Passwords should be physically stored in a convenient location.Passwords should contain mainly numbers for better encryption.An expiration period should be established so that passwords frequently change.Lockout policies should be avoided in order to increase user access.
The system administrator should assign passwords to the users.
Passwords should be physically stored in a convenient location.
Passwords should contain mainly numbers for better encryption.
An expiration period should be established so that passwords frequently change.
Lockout policies should be avoided in order to increase user access.
Use a moistened cotton swab to remove excess dust.Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.Use a can of compressed air to remove excess dust.Ignore the dust, as it does not affect the computer.
Use a moistened cotton swab to remove excess dust.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Use a can of compressed air to remove excess dust.
Ignore the dust, as it does not affect the computer.
jdi nahoru, na obsah
Hry (588)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (38)
Uživatelské jméno
Heslo