jdi na vlastní test/obsah stránky
The CMOS battery has failed.The BIOS is corrupt.The hard drive is failing.The CPU fan is not functioning.
The CMOS battery has failed.
The BIOS is corrupt.
The hard drive is failing.
The CPU fan is not functioning.
Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure the humidity and temperature levels are set as low as possible.Ensure the wireless network is on a different frequency than the offending source.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the humidity and temperature levels are set as low as possible.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
The printer toner is low.The printer has an incorrect IP address.The printer does not have enough memory.The printer drum is damaged.
The printer toner is low.
The printer has an incorrect IP address.
The printer does not have enough memory.
The printer drum is damaged.
passwordFTP server IP addressFTP client port numberFTP server port numberusernameFTP client IP address
password
FTP server IP address
FTP client port number
FTP server port number
username
FTP client IP address
application, presentation, session, transportapplication, transport, internet, network accessapplication, presentation, internet, network accessapplication, transport, network, data linkphysical, data link, network, transport
application, presentation, session, transport
application, transport, internet, network access
application, presentation, internet, network access
application, transport, network, data link
physical, data link, network, transport
cameraLCD screenmedia playerCPU
camera
LCD screen
media player
CPU
hardware failure of the ISR used to connect the customer to the ISPfailure of DNS to resolve names to IP addressesimproper IP address configuration on the hostbad cables or connections at the customer site
hardware failure of the ISR used to connect the customer to the ISP
failure of DNS to resolve names to IP addresses
improper IP address configuration on the host
bad cables or connections at the customer site
PANMANLANWAN
PAN
MAN
LAN
WAN
a HEPA-capable vacuuma damp clotha lint-free clothisopropyl alcohol
a HEPA-capable vacuum
a damp cloth
a lint-free cloth
isopropyl alcohol
Passwords should contain only capital letters.Passwords should be set to expire every 60 days.Passwords should contain no more than eight characters.Passwords should contain letters and numbers.Passwords must contain encrypted characters.
Passwords should contain only capital letters.
Passwords should be set to expire every 60 days.
Passwords should contain no more than eight characters.
Passwords should contain letters and numbers.
Passwords must contain encrypted characters.
Place the customer on hold until the customer has time to cool down.Document the reason the customer called and create a support ticket.Inform the customer of the need to call back later.Escalate the customer to a level two technician.Ask the customer further questions to diagnose and attempt to fix the problem.
Place the customer on hold until the customer has time to cool down.
Document the reason the customer called and create a support ticket.
Inform the customer of the need to call back later.
Escalate the customer to a level two technician.
Ask the customer further questions to diagnose and attempt to fix the problem.
to conserve the battery life by reducing the bus speed between the CPU and RAMto ensure the CPU is running at its peak speedto reduce the heat that the CPU may generateWhat tool is included in the Mac OS X for backing up disks to image files and recovering disk images?to enhance the performance of the CPU
to conserve the battery life by reducing the bus speed between the CPU and RAM
to ensure the CPU is running at its peak speed
to reduce the heat that the CPU may generate
What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?
to enhance the performance of the CPU
Try moving the laptop to different places to see if a signal can be detected.Verify in the laptop software whether any wireless networks are detected.Reconfigure TCP/IP settings on the laptop.Verify that the laptop is plugged into an electrical outlet.Reinsert the laptop battery.
Try moving the laptop to different places to see if a signal can be detected.
Verify in the laptop software whether any wireless networks are detected.
Reconfigure TCP/IP settings on the laptop.
Verify that the laptop is plugged into an electrical outlet.
Reinsert the laptop battery.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.A laser printer is significantly slower than an inkjet printer.Inkjet printers are less expensive as an initial purchase than laser printers.Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.Both laser and inkjet printers produce poor quality images.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
A laser printer is significantly slower than an inkjet printer.
Inkjet printers are less expensive as an initial purchase than laser printers.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
Both laser and inkjet printers produce poor quality images.
unseated adapter cardsshort circuitsloose cablesenvironmental control
unseated adapter cards
short circuits
loose cables
environmental control
Task ManagerEvent ViewerDevice ManagerDisk Management
Task Manager
Event Viewer
Device Manager
Disk Management
communication etiquette rulesguaranteed service response timemaximum number of service calls per daychain of custody procedures
communication etiquette rules
guaranteed service response time
maximum number of service calls per day
chain of custody procedures
Use the System Recovery Options to select the correct active partition.Replace the hard drive on the computer.Run chkdsk /F /R to fix the hard drive file entries.Scan for and remove any virus found.
Use the System Recovery Options to select the correct active partition.
Replace the hard drive on the computer.
Run chkdsk /F /R to fix the hard drive file entries.
Scan for and remove any virus found.
A full format will delete files from the disk while analyzing the disk drive for errors.A full format will delete every partition on the hard drive.A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.
A full format will delete files from the disk while analyzing the disk drive for errors.
A full format will delete every partition on the hard drive.
A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.
A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.
It requires registration instead of purchasing.It allows users to modify and share the source code.It requires acknowledged completion of a professional training course prior to use.It cannot be used for campus-wide deployment.It does not require purchase in order to use the software.
It requires registration instead of purchasing.
It allows users to modify and share the source code.
It requires acknowledged completion of a professional training course prior to use.
It cannot be used for campus-wide deployment.
It does not require purchase in order to use the software.
System RegistryCommand PromptSafe modeBIOSAdministrative Tools
System Registry
Command Prompt
Safe mode
BIOS
Administrative Tools
MsconfigTask ManagerNtldrRegedit
Msconfig
Ntldr
Regedit
preparation of a plan of actionidentification of the problemdocumentation of the problem and its solutionimplementation of the solution
preparation of a plan of action
identification of the problem
documentation of the problem and its solution
implementation of the solution
Remove the battery.Disconnect AC power.Enable Bluetooth in BIOS Setup.Ensure that the laptop Bluetooth switch is enabled.Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.
Remove the battery.
Disconnect AC power.
Enable Bluetooth in BIOS Setup.
Ensure that the laptop Bluetooth switch is enabled.
Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.
Run the programs in Compatibility Mode.Update the driver for the graphics card.Use the recovery partition to reinstall Windows.Use the System Restore utility.
Run the programs in Compatibility Mode.
Update the driver for the graphics card.
Use the recovery partition to reinstall Windows.
Use the System Restore utility.
Turn onDeny allAsk me laterUnblockKeep blockingTurn off
Turn on
Deny all
Ask me later
Unblock
Keep blocking
Turn off
NTFSHPFSFAT16FAT32
NTFS
HPFS
FAT16
FAT32
Disable or remove apps that allow connections to the GPS.Set the device to not store credentials.Turn off the GPS when not in use.Set the device to connect only to known WiFi networks.Use a VPN connection whenever possible.
Disable or remove apps that allow connections to the GPS.
Set the device to not store credentials.
Turn off the GPS when not in use.
Set the device to connect only to known WiFi networks.
Use a VPN connection whenever possible.
The widget is associated with the app and this is the normal behavior.The user has downloaded a virus.The widget is corrupt.The security settings of the Android OS have been compromised.
The widget is associated with the app and this is the normal behavior.
The user has downloaded a virus.
The widget is corrupt.
The security settings of the Android OS have been compromised.
to re-synchronize the email account with other devicesto remotely lock the email account if the device is stolento encrypt the email messagesto enable pictures and documents to be included in email messages
to re-synchronize the email account with other devices
to remotely lock the email account if the device is stolen
to encrypt the email messages
to enable pictures and documents to be included in email messages
when the technician cannot understand the problem as explained by the customerwhen a customer appears to be very knowledgeablewhen a customer demands talking to a particular technicianwhen a problem requires expertise from another technician
when the technician cannot understand the problem as explained by the customer
when a customer appears to be very knowledgeable
when a customer demands talking to a particular technician
when a problem requires expertise from another technician
Avoid lifting the equipment using the strength in your back.Bend your back to pick the printer up.Lift the equipment using the strength in your legs and knees.Avoid bending your knees when lifting the printer.Avoid lifting the printer close to your body.
Avoid lifting the equipment using the strength in your back.
Bend your back to pick the printer up.
Lift the equipment using the strength in your legs and knees.
Avoid bending your knees when lifting the printer.
Avoid lifting the printer close to your body.
time savings for technicians making repairselimination of the need for repairsextension of the life of componentsimprovement in data protectionreduction in the number of equipment failuresimprovement in RAM access time
time savings for technicians making repairs
elimination of the need for repairs
extension of the life of components
improvement in data protection
reduction in the number of equipment failures
improvement in RAM access time
Suggest that the customer purchase a new computer.Explain that the original technician is no good and the supervisor will be told.Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.Confirm the issues and give detailed instructions to solve the problem.
Suggest that the customer purchase a new computer.
Explain that the original technician is no good and the supervisor will be told.
Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.
Confirm the issues and give detailed instructions to solve the problem.
Search helpdesk repair logs for more information.Ask the customer open-ended questions about the problemDisconnect the computer from the network.Log in as a different user.Discuss solutions with the customer.
Search helpdesk repair logs for more information.
Ask the customer open-ended questions about the problem
Disconnect the computer from the network.
Log in as a different user.
Discuss solutions with the customer.
ISDNmicrowavecellularsatellite
ISDN
microwave
cellular
satellite
Grant the users read permissions on all files.Check the Folder is Ready for Archiving box in the properties of each folder.Make the users members of a group called Backup Operators.Give the users administrator rights on their computers.
Grant the users read permissions on all files.
Check the Folder is Ready for Archiving box in the properties of each folder.
Make the users members of a group called Backup Operators.
Give the users administrator rights on their computers.
Encrypted files cannot be transferred across a network.The new computer doesn’t have an NTFS partition.The network proxy decrypted the data to scan it for malware.The sensitive data was transferred with the FTP protocol.
Encrypted files cannot be transferred across a network.
The new computer doesn’t have an NTFS partition.
The network proxy decrypted the data to scan it for malware.
The sensitive data was transferred with the FTP protocol.
out-of-date browserRAM failingdevice driver errorspower supply failurelack of antivirus software
out-of-date browser
RAM failing
device driver errors
power supply failure
lack of antivirus software
CCFLinverterbacklightbatterymotherboard
CCFL
inverter
backlight
battery
motherboard
if the battery only supports the system for a reduced period of timeif the screen brightness begins to dimif there are signs of swellingif the device feels warm to the touch
if the battery only supports the system for a reduced period of time
if the screen brightness begins to dim
if there are signs of swelling
if the device feels warm to the touch
Disk UtilitySystem RestoreDeja DupDisk Error-Checking
Disk Utility
System Restore
Deja Dup
Disk Error-Checking
allocation of memory to applicationsenabling device driversvirtualization supportboot sequencePOST
allocation of memory to applications
enabling device drivers
virtualization support
boot sequence
POST
\\username\Work2\installs\\ username\WORK2\\installs\WORK2|installs\\work1\installs// WORK2/installs\\username\password/WORK1/installs
\\username\Work2\installs
\\ username\WORK2\\installs
\WORK2|installs
\\work1\installs
// WORK2/installs
\\username\password/WORK1/installs
An ATX main power connector supplies power to a video adapter.A Molex power connector supplies power to a motherboard.A Molex connector and a SATA connector can be used on the same drive at the same time.A SATA power connector is used to connect to a hard disk drive or an optical drive.
An ATX main power connector supplies power to a video adapter.
A Molex power connector supplies power to a motherboard.
A Molex connector and a SATA connector can be used on the same drive at the same time.
A SATA power connector is used to connect to a hard disk drive or an optical drive.
Reinstall the correct drivers.Reinstall the program that is associated with the corrupt DLL file.Run Windows Startup Repair.Use the msconfig command to adjust the startup settings for the program.Run sfc/scannow in Safe Mode.
Reinstall the correct drivers.
Reinstall the program that is associated with the corrupt DLL file.
Run Windows Startup Repair.
Use the msconfig command to adjust the startup settings for the program.
Run sfc/scannow in Safe Mode.
Steps 1, 3, 2Steps 1, 2, 4Steps 1, 4, 3Steps 2, 3, 4
Steps 1, 3, 2
Steps 1, 2, 4
Steps 1, 4, 3
Steps 2, 3, 4
Data centers require cloud computing but cloud computing does not require data centers.A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.The data center makes use of more devices to process data.
Data centers require cloud computing but cloud computing does not require data centers.
A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.
Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.
The data center makes use of more devices to process data.
Format the partition.Extend the partition.Assign a drive letter to the partition.Shrink the partition.
Format the partition.
Extend the partition.
Assign a drive letter to the partition.
Shrink the partition.
EFSBitLockerTPMWindows Update
EFS
BitLocker
TPM
Windows Update
USB expansion cardadvanced graphics cardPOST cardBIOS card
USB expansion card
advanced graphics card
POST card
BIOS card
The TCP/IP protocol stack is not loaded.The operating system is not compatible with the remote sites.The default gateway is not set.The NIC driver is out of date.
The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The default gateway is not set.
The NIC driver is out of date.
jdi nahoru, na obsah
Hry (587)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo