jdi na vlastní test/obsah stránky
to conserve the battery life by reducing the bus speed between the CPU and RAMto reduce the heat that the CPU may generateto ensure the CPU is running at its peak speedWhat tool is included in the Mac OS X for backing up disks to image files and recovering disk images?to enhance the performance of the CPU
to conserve the battery life by reducing the bus speed between the CPU and RAM
to reduce the heat that the CPU may generate
to ensure the CPU is running at its peak speed
What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?
to enhance the performance of the CPU
Update the driver for the graphics card.Use the System Restore utility.Use the recovery partition to reinstall Windows.Run the programs in Compatibility Mode.
Update the driver for the graphics card.
Use the System Restore utility.
Use the recovery partition to reinstall Windows.
Run the programs in Compatibility Mode.
Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.Ensure that the laptop Bluetooth switch is enabled.Enable Bluetooth in BIOS Setup.Disconnect AC power.Remove the battery.
Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop.
Ensure that the laptop Bluetooth switch is enabled.
Enable Bluetooth in BIOS Setup.
Disconnect AC power.
Remove the battery.
A Molex power connector supplies power to a motherboard.A SATA power connector is used to connect to a hard disk drive or an optical drive.A Molex connector and a SATA connector can be used on the same drive at the same time.An ATX main power connector supplies power to a video adapter.
A Molex power connector supplies power to a motherboard.
A SATA power connector is used to connect to a hard disk drive or an optical drive.
A Molex connector and a SATA connector can be used on the same drive at the same time.
An ATX main power connector supplies power to a video adapter.
The data center makes use of more devices to process data.Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.Data centers require cloud computing but cloud computing does not require data centers.A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.
The data center makes use of more devices to process data.
Cloud computing solutions are network resources and services provided to the clients through the use of services from data centers.
Data centers require cloud computing but cloud computing does not require data centers.
A data center provides access to shared computing resources, wheras a cloud is a private on-premise facility that stores and processes local data.
MANWANLANPAN
MAN
WAN
LAN
PAN
A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.A full format will delete files from the disk while analyzing the disk drive for errors.A full format will delete every partition on the hard drive.A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.
A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.
A full format will delete files from the disk while analyzing the disk drive for errors.
A full format will delete every partition on the hard drive.
A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.
FAT32NTFSFAT16HPFS
FAT32
NTFS
FAT16
HPFS
passwordFTP server port numberFTP server IP addressFTP client IP addressFTP client port numberusername
password
FTP server port number
FTP server IP address
FTP client IP address
FTP client port number
username
Passwords must contain encrypted characters.Passwords should contain no more than eight characters.Passwords should contain only capital letters.Passwords should contain letters and numbers.Passwords should be set to expire every 60 days.
Passwords must contain encrypted characters.
Passwords should contain no more than eight characters.
Passwords should contain only capital letters.
Passwords should contain letters and numbers.
Passwords should be set to expire every 60 days.
Disk Error-CheckingSystem RestoreDeja DupDisk Utility
Disk Error-Checking
System Restore
Deja Dup
Disk Utility
Set the device to not store credentials.Disable or remove apps that allow connections to the GPS.Turn off the GPS when not in use.Use a VPN connection whenever possible.Set the device to connect only to known WiFi networks.
Set the device to not store credentials.
Disable or remove apps that allow connections to the GPS.
Turn off the GPS when not in use.
Use a VPN connection whenever possible.
Set the device to connect only to known WiFi networks.
environmental controlloose cablesshort circuitsunseated adapter cards
environmental control
loose cables
short circuits
unseated adapter cards
reduction in the number of equipment failurestime savings for technicians making repairselimination of the need for repairsextension of the life of componentsimprovement in RAM access timeimprovement in data protection
reduction in the number of equipment failures
time savings for technicians making repairs
elimination of the need for repairs
extension of the life of components
improvement in RAM access time
improvement in data protection
Inform the customer of the need to call back later.Ask the customer further questions to diagnose and attempt to fix the problem.Escalate the customer to a level two technician.Document the reason the customer called and create a support ticket.Place the customer on hold until the customer has time to cool down.
Inform the customer of the need to call back later.
Ask the customer further questions to diagnose and attempt to fix the problem.
Escalate the customer to a level two technician.
Document the reason the customer called and create a support ticket.
Place the customer on hold until the customer has time to cool down.
The default gateway is not set.The TCP/IP protocol stack is not loaded.The operating system is not compatible with the remote sites.The NIC driver is out of date.
The default gateway is not set.
The TCP/IP protocol stack is not loaded.
The operating system is not compatible with the remote sites.
The NIC driver is out of date.
if the screen brightness begins to dimif there are signs of swellingif the battery only supports the system for a reduced period of timeif the device feels warm to the touch
if the screen brightness begins to dim
if there are signs of swelling
if the battery only supports the system for a reduced period of time
if the device feels warm to the touch
device driver errorsout-of-date browserRAM failingpower supply failurelack of antivirus software
device driver errors
out-of-date browser
RAM failing
power supply failure
lack of antivirus software
The CPU fan is not functioning.The CMOS battery has failed.The hard drive is failing.The BIOS is corrupt.
The CPU fan is not functioning.
The CMOS battery has failed.
The hard drive is failing.
The BIOS is corrupt.
Grant the users read permissions on all files.Make the users members of a group called Backup Operators.Give the users administrator rights on their computers.Check the Folder is Ready for Archiving box in the properties of each folder.
Grant the users read permissions on all files.
Make the users members of a group called Backup Operators.
Give the users administrator rights on their computers.
Check the Folder is Ready for Archiving box in the properties of each folder.
Ask the customer open-ended questions about the problemSearch helpdesk repair logs for more information.Disconnect the computer from the network.Discuss solutions with the customer.Log in as a different user.
Ask the customer open-ended questions about the problem
Search helpdesk repair logs for more information.
Disconnect the computer from the network.
Discuss solutions with the customer.
Log in as a different user.
\\ username\WORK2\\installs\\work1\installs\\username\Work2\installs\\username\password/WORK1/installs// WORK2/installs\WORK2|installs
\\ username\WORK2\\installs
\\work1\installs
\\username\Work2\installs
\\username\password/WORK1/installs
// WORK2/installs
\WORK2|installs
media playerCPUcameraLCD screen
media player
CPU
camera
LCD screen
Replace the hard drive on the computer.Scan for and remove any virus found.Use the System Recovery Options to select the correct active partition.Run chkdsk /F /R to fix the hard drive file entries.
Replace the hard drive on the computer.
Scan for and remove any virus found.
Use the System Recovery Options to select the correct active partition.
Run chkdsk /F /R to fix the hard drive file entries.
Both laser and inkjet printers produce poor quality images.A laser printer is significantly slower than an inkjet printer.Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.Inkjet printers are less expensive as an initial purchase than laser printers.The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
Both laser and inkjet printers produce poor quality images.
A laser printer is significantly slower than an inkjet printer.
Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper.
Inkjet printers are less expensive as an initial purchase than laser printers.
The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
The sensitive data was transferred with the FTP protocol.Encrypted files cannot be transferred across a network.The new computer doesn’t have an NTFS partition.The network proxy decrypted the data to scan it for malware.
The sensitive data was transferred with the FTP protocol.
Encrypted files cannot be transferred across a network.
The new computer doesn’t have an NTFS partition.
The network proxy decrypted the data to scan it for malware.
Avoid lifting the equipment using the strength in your back.Avoid bending your knees when lifting the printer.Lift the equipment using the strength in your legs and knees.Bend your back to pick the printer up.Avoid lifting the printer close to your body.
Avoid lifting the equipment using the strength in your back.
Avoid bending your knees when lifting the printer.
Lift the equipment using the strength in your legs and knees.
Bend your back to pick the printer up.
Avoid lifting the printer close to your body.
Windows UpdateEFSBitLockerTPM
Windows Update
EFS
BitLocker
TPM
Reinsert the laptop battery.Reconfigure TCP/IP settings on the laptop.Verify that the laptop is plugged into an electrical outlet.Try moving the laptop to different places to see if a signal can be detected.Verify in the laptop software whether any wireless networks are detected.
Reinsert the laptop battery.
Reconfigure TCP/IP settings on the laptop.
Verify that the laptop is plugged into an electrical outlet.
Try moving the laptop to different places to see if a signal can be detected.
Verify in the laptop software whether any wireless networks are detected.
The printer has an incorrect IP address.The printer does not have enough memory.The printer toner is low.The printer drum is damaged.
The printer has an incorrect IP address.
The printer does not have enough memory.
The printer toner is low.
The printer drum is damaged.
POST cardUSB expansion cardadvanced graphics cardBIOS card
POST card
USB expansion card
advanced graphics card
BIOS card
System RegistryAdministrative ToolsCommand PromptBIOSSafe mode
System Registry
Administrative Tools
Command Prompt
BIOS
Safe mode
The widget is corrupt.The widget is associated with the app and this is the normal behavior.The security settings of the Android OS have been compromised.The user has downloaded a virus.
The widget is corrupt.
The widget is associated with the app and this is the normal behavior.
The security settings of the Android OS have been compromised.
The user has downloaded a virus.
Assign a drive letter to the partition.Extend the partition.Format the partition.Shrink the partition.
Assign a drive letter to the partition.
Extend the partition.
Format the partition.
Shrink the partition.
application, presentation, session, transportapplication, transport, internet, network accessphysical, data link, network, transportapplication, presentation, internet, network accessapplication, transport, network, data link
application, presentation, session, transport
application, transport, internet, network access
physical, data link, network, transport
application, presentation, internet, network access
application, transport, network, data link
failure of DNS to resolve names to IP addresseshardware failure of the ISR used to connect the customer to the ISPimproper IP address configuration on the hostbad cables or connections at the customer site
failure of DNS to resolve names to IP addresses
hardware failure of the ISR used to connect the customer to the ISP
improper IP address configuration on the host
bad cables or connections at the customer site
It cannot be used for campus-wide deployment.It does not require purchase in order to use the software.It requires registration instead of purchasing.It requires acknowledged completion of a professional training course prior to use.It allows users to modify and share the source code.
It cannot be used for campus-wide deployment.
It does not require purchase in order to use the software.
It requires registration instead of purchasing.
It requires acknowledged completion of a professional training course prior to use.
It allows users to modify and share the source code.
when a customer appears to be very knowledgeablewhen a problem requires expertise from another technicianwhen the technician cannot understand the problem as explained by the customerwhen a customer demands talking to a particular technician
when a customer appears to be very knowledgeable
when a problem requires expertise from another technician
when the technician cannot understand the problem as explained by the customer
when a customer demands talking to a particular technician
backlightbatteryCCFLmotherboardinverter
backlight
battery
CCFL
motherboard
inverter
Steps 1, 2, 4Steps 2, 3, 4Steps 1, 4, 3Steps 1, 3, 2
Steps 1, 2, 4
Steps 2, 3, 4
Steps 1, 4, 3
Steps 1, 3, 2
Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.Confirm the issues and give detailed instructions to solve the problem.Explain that the original technician is no good and the supervisor will be told.Suggest that the customer purchase a new computer.
Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.
Confirm the issues and give detailed instructions to solve the problem.
Explain that the original technician is no good and the supervisor will be told.
Suggest that the customer purchase a new computer.
identification of the problemimplementation of the solutiondocumentation of the problem and its solutionpreparation of a plan of action
identification of the problem
implementation of the solution
documentation of the problem and its solution
preparation of a plan of action
to enable pictures and documents to be included in email messagesto re-synchronize the email account with other devicesto remotely lock the email account if the device is stolento encrypt the email messages
to enable pictures and documents to be included in email messages
to re-synchronize the email account with other devices
to remotely lock the email account if the device is stolen
to encrypt the email messages
Task ManagerMsconfigRegeditNtldr
Task Manager
Msconfig
Regedit
Ntldr
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.Ensure the number of wireless NICs exceeds the number of wireless phones.Ensure the humidity and temperature levels are set as low as possible.Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
Ensure the number of wireless NICs exceeds the number of wireless phones.
Ensure the humidity and temperature levels are set as low as possible.
Ensure the wireless network is on a different frequency than the offending source.
Disk ManagementDevice ManagerEvent ViewerTask Manager
Disk Management
Device Manager
Event Viewer
isopropyl alcohola HEPA-capable vacuuma lint-free clotha damp cloth
isopropyl alcohol
a HEPA-capable vacuum
a lint-free cloth
a damp cloth
Turn offDeny allUnblockAsk me laterKeep blockingTurn on
Turn off
Deny all
Unblock
Ask me later
Keep blocking
Turn on
communication etiquette ruleschain of custody proceduresmaximum number of service calls per dayguaranteed service response time
communication etiquette rules
chain of custody procedures
maximum number of service calls per day
guaranteed service response time
satellitemicrowaveISDNcellular
satellite
microwave
ISDN
cellular
POSTboot sequenceallocation of memory to applicationsvirtualization supportenabling device drivers
POST
boot sequence
allocation of memory to applications
virtualization support
enabling device drivers
Run Windows Startup Repair.Reinstall the correct drivers.Use the msconfig command to adjust the startup settings for the program.Run sfc/scannow in Safe Mode.Reinstall the program that is associated with the corrupt DLL file.
Run Windows Startup Repair.
Reinstall the correct drivers.
Use the msconfig command to adjust the startup settings for the program.
Run sfc/scannow in Safe Mode.
Reinstall the program that is associated with the corrupt DLL file.
jdi nahoru, na obsah
Hry (588)Hardware (16)Software (10)Programování (6)Internet (57)Ostatní technika (38)
Uživatelské jméno
Heslo