jdi na vlastní test/obsah stránky
device driver errorslack of antivirus softwareRAM failingout-of-date browserpower supply failure
device driver errors
lack of antivirus software
RAM failing
out-of-date browser
power supply failure
isopropyl alcohola damp clotha HEPA-capable vacuuma lint-free cloth
isopropyl alcohol
a damp cloth
a HEPA-capable vacuum
a lint-free cloth
cellularISDNsatellitemicrowave
cellular
ISDN
satellite
microwave
Run chkdsk /F /R to fix the hard drive file entries.Replace the hard drive on the computer.Scan for and remove any virus found.Use the System Recovery Options to select the correct active partition.
Run chkdsk /F /R to fix the hard drive file entries.
Replace the hard drive on the computer.
Scan for and remove any virus found.
Use the System Recovery Options to select the correct active partition.
Search helpdesk repair logs for more information.Discuss solutions with the customer.Ask the customer open-ended questions about the problemLog in as a different user.Disconnect the computer from the network.
Search helpdesk repair logs for more information.
Discuss solutions with the customer.
Ask the customer open-ended questions about the problem
Log in as a different user.
Disconnect the computer from the network.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.Inkjet printers are less expensive as an initial purchase than laser printers.Both laser and inkjet printers produce poor quality images.A laser printer is significantly slower than an inkjet printer.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Inkjet printers are less expensive as an initial purchase than laser printers.
Both laser and inkjet printers produce poor quality images.
A laser printer is significantly slower than an inkjet printer.
Turn off the GPS when not in use.Set the device to connect only to known WiFi networks.Disable or remove apps that allow connections to the GPS.Use a VPN connection whenever possible.Set the device to not store credentials.
Turn off the GPS when not in use.
Set the device to connect only to known WiFi networks.
Disable or remove apps that allow connections to the GPS.
Use a VPN connection whenever possible.
Set the device to not store credentials.
Ask me laterUnblockDeny allTurn offKeep blockingTurn on
Ask me later
Unblock
Deny all
Turn off
Keep blocking
Turn on
The printer has an incorrect IP address.The printer drum is damaged.The printer toner is low.The printer does not have enough memory.
The printer has an incorrect IP address.
The printer drum is damaged.
The printer toner is low.
The printer does not have enough memory.
POST cardBIOS cardadvanced graphics cardUSB expansion card
POST card
BIOS card
advanced graphics card
USB expansion card
EFSWindows UpdateTPMBitLocker
EFS
Windows Update
TPM
BitLocker
LCD screencameramedia playerCPU
LCD screen
camera
media player
CPU
HPFSFAT16NTFSFAT32
HPFS
FAT16
NTFS
FAT32
if there are signs of swellingif the battery only supports the system for a reduced period of timeif the device feels warm to the touchif the screen brightness begins to dim
if there are signs of swelling
if the battery only supports the system for a reduced period of time
if the device feels warm to the touch
if the screen brightness begins to dim
The user has downloaded a virus.The security settings of the Android OS have been compromised.The widget is corrupt.The widget is associated with the app and this is the normal behavior.
The user has downloaded a virus.
The security settings of the Android OS have been compromised.
The widget is corrupt.
The widget is associated with the app and this is the normal behavior.
Encrypted files cannot be transferred across a network.The network proxy decrypted the data to scan it for malware.The sensitive data was transferred with the FTP protocol.The new computer doesn’t have an NTFS partition.
Encrypted files cannot be transferred across a network.
The network proxy decrypted the data to scan it for malware.
The sensitive data was transferred with the FTP protocol.
The new computer doesn’t have an NTFS partition.
implementation of the solutionpreparation of a plan of actionidentification of the problemdocumentation of the problem and its solution
implementation of the solution
preparation of a plan of action
identification of the problem
documentation of the problem and its solution
Avoid lifting the equipment using the strength in your back.Bend your back to pick the printer up.Avoid lifting the printer close to your body.Lift the equipment using the strength in your legs and knees.Avoid bending your knees when lifting the printer.
Avoid lifting the equipment using the strength in your back.
Bend your back to pick the printer up.
Avoid lifting the printer close to your body.
Lift the equipment using the strength in your legs and knees.
Avoid bending your knees when lifting the printer.
The CPU fan is not functioning.The hard drive is failing.The CMOS battery has failed.The BIOS is corrupt.
The CPU fan is not functioning.
The hard drive is failing.
The CMOS battery has failed.
The BIOS is corrupt.
An ATX main power connector supplies power to a video adapter.A Molex power connector supplies power to a motherboard.A Molex connector and a SATA connector can be used on the same drive at the same time.A SATA power connector is used to connect to a hard disk drive or an optical drive.
An ATX main power connector supplies power to a video adapter.
A Molex power connector supplies power to a motherboard.
A Molex connector and a SATA connector can be used on the same drive at the same time.
A SATA power connector is used to connect to a hard disk drive or an optical drive.
elimination of the need for repairsimprovement in RAM access timeextension of the life of componentsreduction in the number of equipment failurestime savings for technicians making repairsimprovement in data protection
elimination of the need for repairs
improvement in RAM access time
extension of the life of components
reduction in the number of equipment failures
time savings for technicians making repairs
improvement in data protection
application, presentation, internet, network accessphysical, data link, network, transportapplication, transport, internet, network accessapplication, transport, network, data linkapplication, presentation, session, transport
application, presentation, internet, network access
physical, data link, network, transport
application, transport, internet, network access
application, transport, network, data link
application, presentation, session, transport
Update the driver for the graphics card.Use the System Restore utility.Use the recovery partition to reinstall Windows.Run the programs in Compatibility Mode.
Update the driver for the graphics card.
Use the System Restore utility.
Use the recovery partition to reinstall Windows.
Run the programs in Compatibility Mode.
Reinsert the laptop battery.Reconfigure TCP/IP settings on the laptop.Verify that the laptop is plugged into an electrical outlet.Verify in the laptop software whether any wireless networks are detected.Try moving the laptop to different places to see if a signal can be detected.
Reinsert the laptop battery.
Reconfigure TCP/IP settings on the laptop.
Verify that the laptop is plugged into an electrical outlet.
Verify in the laptop software whether any wireless networks are detected.
Try moving the laptop to different places to see if a signal can be detected.
PANWANLANMAN
PAN
WAN
LAN
MAN
A full format will delete every partition on the hard drive.A full format will delete files from the disk while analyzing the disk drive for errors.A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.
A full format will delete every partition on the hard drive.
A full format will delete files from the disk while analyzing the disk drive for errors.
A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.
A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.
FTP client port numberFTP server port numberFTP client IP addresspasswordusernameFTP server IP address
FTP client port number
FTP server port number
FTP client IP address
password
username
FTP server IP address
CCFLbatterymotherboardinverterbacklight
CCFL
battery
motherboard
inverter
backlight
Steps 1, 3, 2Steps 1, 2, 4Steps 1, 4, 3Steps 2, 3, 4
Steps 1, 3, 2
Steps 1, 2, 4
Steps 1, 4, 3
Steps 2, 3, 4
Check the Folder is Ready for Archiving box in the properties of each folder.Grant the users read permissions on all files.Make the users members of a group called Backup Operators.Give the users administrator rights on their computers.
Check the Folder is Ready for Archiving box in the properties of each folder.
Grant the users read permissions on all files.
Make the users members of a group called Backup Operators.
Give the users administrator rights on their computers.
NtldrRegeditMsconfigTask Manager
Ntldr
Regedit
Msconfig
Task Manager
Run sfc/scannow in Safe Mode.Reinstall the program that is associated with the corrupt DLL file.Use the msconfig command to adjust the startup settings for the program.Reinstall the correct drivers.Run Windows Startup Repair.
Run sfc/scannow in Safe Mode.
Reinstall the program that is associated with the corrupt DLL file.
Use the msconfig command to adjust the startup settings for the program.
Reinstall the correct drivers.
Run Windows Startup Repair.
A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.Data centers require cloud computing but cloud computing does not require data centers.Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.The data center makes use of more devices to process data.
A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.
Data centers require cloud computing but cloud computing does not require data centers.
Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.
The data center makes use of more devices to process data.
loose cablesenvironmental controlshort circuitsunseated adapter cards
loose cables
environmental control
short circuits
unseated adapter cards
Ask the customer further questions to diagnose and attempt to fix the problem.Document the reason the customer called and create a support ticket.Inform the customer of the need to call back later.Place the customer on hold until the customer has time to cool down.Escalate the customer to a level two technician.
Ask the customer further questions to diagnose and attempt to fix the problem.
Document the reason the customer called and create a support ticket.
Inform the customer of the need to call back later.
Place the customer on hold until the customer has time to cool down.
Escalate the customer to a level two technician.
Passwords should contain letters and numbers.Passwords should contain no more than eight characters.Passwords should contain only capital letters.Passwords must contain encrypted characters.Passwords should be set to expire every 60 days.
Passwords should contain letters and numbers.
Passwords should contain no more than eight characters.
Passwords should contain only capital letters.
Passwords must contain encrypted characters.
Passwords should be set to expire every 60 days.
The NIC driver is out of date.The TCP/IP protocol stack is not loaded.The operating system is not compatible with the remote sites.The default gateway is not set.
The NIC driver is out of date.
The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The default gateway is not set.
Event ViewerDevice ManagerDisk ManagementTask Manager
Event Viewer
Device Manager
Disk Management
Assign a drive letter to the partition.Shrink the partition.Format the partition.Extend the partition.
Assign a drive letter to the partition.
Shrink the partition.
Format the partition.
Extend the partition.
System RegistrySafe modeBIOSAdministrative ToolsCommand Prompt
System Registry
Safe mode
BIOS
Administrative Tools
Command Prompt
Disk Error-CheckingDeja DupDisk UtilitySystem Restore
Disk Error-Checking
Deja Dup
Disk Utility
System Restore
to enhance the performance of the CPUto conserve the battery life by reducing the bus speed between the CPU and RAMto ensure the CPU is running at its peak speedWhat tool is included in the Mac OS X for backing up disks to image files and recovering disk images?to reduce the heat that the CPU may generate
to enhance the performance of the CPU
to conserve the battery life by reducing the bus speed between the CPU and RAM
to ensure the CPU is running at its peak speed
What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?
to reduce the heat that the CPU may generate
when the technician cannot understand the problem as explained by the customerwhen a problem requires expertise from another technicianwhen a customer appears to be very knowledgeablewhen a customer demands talking to a particular technician
when the technician cannot understand the problem as explained by the customer
when a problem requires expertise from another technician
when a customer appears to be very knowledgeable
when a customer demands talking to a particular technician
bad cables or connections at the customer siteimproper IP address configuration on the hostfailure of DNS to resolve names to IP addresseshardware failure of the ISR used to connect the customer to the ISP
bad cables or connections at the customer site
improper IP address configuration on the host
failure of DNS to resolve names to IP addresses
hardware failure of the ISR used to connect the customer to the ISP
POSTboot sequenceenabling device driversvirtualization supportallocation of memory to applications
POST
boot sequence
enabling device drivers
virtualization support
allocation of memory to applications
Explain that the original technician is no good and the supervisor will be told.Confirm the issues and give detailed instructions to solve the problem.Suggest that the customer purchase a new computer.Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.
Explain that the original technician is no good and the supervisor will be told.
Confirm the issues and give detailed instructions to solve the problem.
Suggest that the customer purchase a new computer.
Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.
It requires acknowledged completion of a professional training course prior to use.It does not require purchase in order to use the software.It cannot be used for campus-wide deployment.It allows users to modify and share the source code.It requires registration instead of purchasing.
It requires acknowledged completion of a professional training course prior to use.
It does not require purchase in order to use the software.
It cannot be used for campus-wide deployment.
It allows users to modify and share the source code.
It requires registration instead of purchasing.
communication etiquette ruleschain of custody proceduresmaximum number of service calls per dayguaranteed service response time
communication etiquette rules
chain of custody procedures
maximum number of service calls per day
guaranteed service response time
to remotely lock the email account if the device is stolento enable pictures and documents to be included in email messagesto encrypt the email messagesto re-synchronize the email account with other devices
to remotely lock the email account if the device is stolen
to enable pictures and documents to be included in email messages
to encrypt the email messages
to re-synchronize the email account with other devices
Ensure the wireless network is on a different frequency than the offending source.Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the humidity and temperature levels are set as low as possible.Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Remove the battery.Disconnect AC power.Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.Enable Bluetooth in BIOS Setup.Ensure that the laptop Bluetooth switch is enabled.
Remove the battery.
Disconnect AC power.
Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.
Enable Bluetooth in BIOS Setup.
Ensure that the laptop Bluetooth switch is enabled.
\\work1\installs// WORK2/installs\\username\password/WORK1/installs\\ username\WORK2\\installs\WORK2|installs\\username\Work2\installs
\\work1\installs
// WORK2/installs
\\username\password/WORK1/installs
\\ username\WORK2\\installs
\WORK2|installs
\\username\Work2\installs
jdi nahoru, na obsah
Hry (588)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (39)
Uživatelské jméno
Heslo