jdi na vlastní test/obsah stránky
Create a System Repair Disc and restore the image.Access the Control Panel and choose Restore Files from Backup from the System and Security menu.Press the F12 key during the boot process and start the computer in Safe Mode.Boot from a Windows 7 installation media and access the System Restore utility.
Create a System Repair Disc and restore the image.
Access the Control Panel and choose Restore Files from Backup from the System and Security menu.
Press the F12 key during the boot process and start the computer in Safe Mode.
Boot from a Windows 7 installation media and access the System Restore utility.
Establish a plan of action.Identify the exact problem.Test the theory to determine cause.Document findings and outcomes.
Establish a plan of action.
Identify the exact problem.
Test the theory to determine cause.
Document findings and outcomes.
standby power supplyuninterruptible power supplypower invertersurge suppressor
standby power supply
uninterruptible power supply
power inverter
surge suppressor
a variable set by the administrator for each user of the systema fixed value that represents the level of access of a user to system filesan environment variable that is set by the operating systemthe location of the Documents folder of a particular user
a variable set by the administrator for each user of the system
a fixed value that represents the level of access of a user to system files
an environment variable that is set by the operating system
the location of the Documents folder of a particular user
the optical drivethe power supplythe video cardthe network interface card
the optical drive
the power supply
the video card
the network interface card
The display settings have been changed.The LCD cutoff switch is damaged.Power to the pixels has been removed.The display is not correctly installed.The GPU is not cooling correctly.
The display settings have been changed.
The LCD cutoff switch is damaged.
Power to the pixels has been removed.
The display is not correctly installed.
The GPU is not cooling correctly.
534431432280
53
443
143
22
80
DB-15PS/2HDMIDVI
DB-15
PS/2
HDMI
DVI
Individual users are in control of their own computers and network resources.The total cost of the new solution is considerably lower.Data resources and access are centrally controlled.Data is more secure in the event of hardware failures.Personnel costs are lower because a dedicated network administrator is no longer necessary.
Individual users are in control of their own computers and network resources.
The total cost of the new solution is considerably lower.
Data resources and access are centrally controlled.
Data is more secure in the event of hardware failures.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
My ComputerSystem ToolsDevice ManagerComputer Management
My Computer
System Tools
Device Manager
Computer Management
external hard driveSecure Digital cardexternal flash driveCompactFlash card
external hard drive
Secure Digital card
external flash drive
CompactFlash card
to specify procedures in designing and building common computer systemsto specify procedures in the use of humidity control and prevention of moisture damageto specify procedures for the operation of sensitive components and prevention of electrostatic dischargeto specify procedures for dealing with potentially hazardous materials
to specify procedures in designing and building common computer systems
to specify procedures in the use of humidity control and prevention of moisture damage
to specify procedures for the operation of sensitive components and prevention of electrostatic discharge
to specify procedures for dealing with potentially hazardous materials
APIPADHCPDNSICMP
APIPA
DHCP
DNS
ICMP
when installing a hard drivewhen opening a computer casewhen replacing a power supply unitwhen installing RAM
when installing a hard drive
when opening a computer case
when replacing a power supply unit
when installing RAM
networkapplicationtransportdata link
network
application
transport
data link
KVMscannerdigitizerswitchbiometric identification device
KVM
scanner
digitizer
switchbiometric identification device
a diluted ammonia solutionisopropyl alcoholsoap and waterrubbing alcohol
a diluted ammonia solution
isopropyl alcohol
soap and water
rubbing alcohol
Lockout policies should be avoided in order to increase user access.Passwords should be physically stored in a convenient location.An expiration period should be established so that passwords frequently change.The system administrator should assign passwords to the users.Passwords should contain mainly numbers for better encryption.
Lockout policies should be avoided in order to increase user access.
Passwords should be physically stored in a convenient location.
An expiration period should be established so that passwords frequently change.
The system administrator should assign passwords to the users.
Passwords should contain mainly numbers for better encryption.
Terminal ServicesRAIDserver clusteringhypervisor
Terminal Services
RAID
server clustering
hypervisor
Time MachineDeja DupFinderDisk Utility
Time Machine
Deja Dup
Finder
Disk Utility
copper cable locationwireless signal strength and access point positioningbasic functionality of computer portsquality of electricity in computer components
copper cable location
wireless signal strength and access point positioning
basic functionality of computer ports
quality of electricity in computer components
The operating system is not compatible with the remote sites.The NIC driver is out of date.The default gateway is incorrect.The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The NIC driver is out of date.
The default gateway is incorrect.
The TCP/IP protocol stack is not loaded.
pickup rollerspaper traysfuser assemblysecondary coronaprimary coronatransfer rollers
pickup rollers
paper trays
fuser assembly
secondary corona
primary corona
transfer rollers
Ensure that the operating system software and applications contain the latest updates.Execute a factory reset once a month to remove all unidentified malicious software.Unmount all unused disk partitions.Use airplane mode if you are accessing the Internet at an open Wi-Fi site.Back up user data on a regular basis.Password protect iTunes or Google Play accounts.
Ensure that the operating system software and applications contain the latest updates.
Execute a factory reset once a month to remove all unidentified malicious software.
Unmount all unused disk partitions.
Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
Back up user data on a regular basis.
Password protect iTunes or Google Play accounts.
Unpinning an app from this view will uninstall the app from the phone.Text messages, news, photos and other content can be displayed in the different tiles.Icons and buttons are used to represent the different apps on the phone.Tile sizes depend on the size of the app.Tapping and holding the arrow at the bottom left will display the Home screen.
Unpinning an app from this view will uninstall the app from the phone.
Text messages, news, photos and other content can be displayed in the different tiles.
Icons and buttons are used to represent the different apps on the phone.
Tile sizes depend on the size of the app.
Tapping and holding the arrow at the bottom left will display the Home screen.
Can the laptop operate using the AC adapter?What were you doing when the problem occurred?What software has been installed recently?Have you changed your password recently?
Can the laptop operate using the AC adapter?
What were you doing when the problem occurred?
What software has been installed recently?
Have you changed your password recently?
thermal printerpiezoelectric printerinkjet printerimpact printer
thermal printer
piezoelectric printer
inkjet printer
impact printer
WEPWPA2LEAPWPA
WEP
WPA2
LEAP
WPA
The operating system has encountered an error.The touchscreen is not calibrated.An app is not compatible with the device.A power-intensive app is running at the background.
The operating system has encountered an error.
The touchscreen is not calibrated.
An app is not compatible with the device.
A power-intensive app is running at the background.
The computer continually restarts without displaying the desktop.The computer displays an ‘Inaccessible Boot Device’ error after POST.The computer locks up without any error messages.The computer displays a “BOOTMGR is missing” error after POST.The computer displays an “Invalid Boot Disk” error after POST.
The computer continually restarts without displaying the desktop.
The computer displays an ‘Inaccessible Boot Device’ error after POST.
The computer locks up without any error messages.
The computer displays a “BOOTMGR is missing” error after POST.
The computer displays an “Invalid Boot Disk” error after POST.
Remove the keyboard.Consult the service manual for the laptop.Backup the BIOS settings.Ask a fellow technician for advice.
Remove the keyboard.
Consult the service manual for the laptop.
Backup the BIOS settings.
Ask a fellow technician for advice.
Is this the first time the error occurred?What error messages were displayed when the error occurred?What happened before the error occurred?What happened after the error occurred?
Is this the first time the error occurred?
What error messages were displayed when the error occurred?
What happened before the error occurred?
What happened after the error occurred?
Infected computers are called daemons.It is easy to identify the source of the attack.All hosts must be in the same geographic area.Many hosts participate in a coordinated attack.
Infected computers are called daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
Many hosts participate in a coordinated attack.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.The user must browse the Internet, then download and install the proper driver.The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.Nothing. Windows automatically provides the driver.
The person doing the sharing must use the Additional Drivers button in order to designate the driver to be used by the other Windows 7 computers.
The user must browse the Internet, then download and install the proper driver.
The person doing the sharing must use the Additional Drivers button in order to designate how many device drivers are allowed to be downloaded.
Nothing. Windows automatically provides the driver.
IaaSITaaSPaaSSaaS
IaaS
ITaaS
PaaS
SaaS
The computer returns an error message that indicates the I/O address of the failing device.The screen flashes with a red background and displays a warning message.The computer automatically boots into Safe Mode and displays a warning on the screen.The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message that indicates the I/O address of the failing device.
The screen flashes with a red background and displays a warning message.
The computer automatically boots into Safe Mode and displays a warning on the screen.
The computer emits a pattern of beeps indicating the failing device.
Ensure the humidity and temperature levels are set as low as possible.Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the wireless network is on a different frequency than the offending source.
Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the wireless network is on a different frequency than the offending source.
NTFS is easier to configure.NTFS allows the automatic detection of bad sectors.NTFS provides more security features.NTFS supports larger files.NTFS allows faster access to external peripherals such as a USB drive.NTFS allows faster formatting of drives.
NTFS is easier to configure.
NTFS allows the automatic detection of bad sectors.
NTFS provides more security features.
NTFS supports larger files.
NTFS allows faster access to external peripherals such as a USB drive.
NTFS allows faster formatting of drives.
Dust is considered a fire hazard that poses danger to personnel and equipment.Dust increases electromagnetic interference in nearby connected cables.Dust can cause network equipment to overheat and cause problems on the network.Dust can encourage insects and other pests to live in the equipment closets.Dust diminishes the range of wireless services.
Dust is considered a fire hazard that poses danger to personnel and equipment.
Dust increases electromagnetic interference in nearby connected cables.
Dust can cause network equipment to overheat and cause problems on the network.
Dust can encourage insects and other pests to live in the equipment closets.
Dust diminishes the range of wireless services.
USB flash drivesolid-state driveembedded multimedia cardsolid-state hybrid disk
USB flash drive
solid-state drive
embedded multimedia card
solid-state hybrid disk
enabling features that are disabled by a cellular carrierallowing the user interface to be extensively customizedenabling app access to the root directoryimproving device performancenot properly creating or maintaining sandboxing features
enabling features that are disabled by a cellular carrier
allowing the user interface to be extensively customized
enabling app access to the root directory
improving device performance
not properly creating or maintaining sandboxing features
nslookup cisco.comipconfig /flushdnsping cisco.comnbtstat cisco.comnet cisco.com
nslookup cisco.com
ipconfig /flushdns
ping cisco.com
nbtstat cisco.com
net cisco.com
support for Windows Firewallsupport for Windows backupapplication license protectionhashed encryption of the hard drive volumesecurity for user authentication informationstorage of digital certificates
support for Windows Firewall
support for Windows backup
application license protection
hashed encryption of the hard drive volume
security for user authentication information
storage of digital certificates
MAC filteringdrive encryptionfile encryptionpasswordsTKIP keyTPM
MAC filtering
drive encryption
file encryption
passwords
TKIP key
TPM
to provide enhanced audio and graphic capabilitiesto allow older PCI technology expansion slots to be usedto connect multiple storage devices for redundancy or speedto connect peripheral devices to a PC to improve performance
to provide enhanced audio and graphic capabilities
to allow older PCI technology expansion slots to be used
to connect multiple storage devices for redundancy or speed
to connect peripheral devices to a PC to improve performance
only the solution, because this solved the problemonly the failed attempts, so that future technicians will know what not to trya description of the problem and solutioneverything that was done to try to solve the problem
only the solution, because this solved the problem
only the failed attempts, so that future technicians will know what not to try
a description of the problem and solution
everything that was done to try to solve the problem
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.Preventive maintenance helps to protect the computer equipment against future problems.Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
Preventive maintenance enables the IT manager to check on the location and state of the computer assets.
Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment.
Preventive maintenance helps to protect the computer equipment against future problems.
Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed.
fingerprint readertouchpadweb cameraexternal monitorPS/2 keyboardAC power connector
fingerprint reader
touchpad
web camera
external monitor
PS/2 keyboard
AC power connector
Event ViewerAdd or Remove ProgramsSystem RestoreTask Manager
Event Viewer
Add or Remove Programs
System Restore
Task Manager
Use a moistened cotton swab to remove excess dust.Use a can of compressed air to remove excess dust.Ignore the dust, as it does not affect the computer.Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
Use a moistened cotton swab to remove excess dust.
Use a can of compressed air to remove excess dust.
Ignore the dust, as it does not affect the computer.
Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.
PCIeDIMMAGPISAPCI
PCIe
DIMM
AGP
ISA
PCI
if the battery only supports the system for a reduced period of timeif the device feels warm to the touchif there are signs of swellingif the screen brightness begins to dim
if the battery only supports the system for a reduced period of time
if the device feels warm to the touch
if there are signs of swelling
if the screen brightness begins to dim
jdi nahoru, na obsah
Hry (587)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo