It essentials pc hardware and software download free




















The power management features are incorrectly set. One of the RAM modules is failing. Laptop CPUs do not use cooling devices. Laptops use fewer components than desktops use. Laptop motherboards have standard form factors. What are two examples of components that should be included? Where would the technician configure a new wireless connection? Which type of cable is needed to accomplish this? Bluetooth connections are wireless. A custom OS may reduce sandboxing features. The operation of the carrier cellular network may be affected.

The root directory of the device is blocked. Flash memory has a drive head that moves, reducing the seek time to locate data. Flash memory is not affected by ESD. Flash memory is highly resistant to water and cold. Mobile devices change so rapidly in design and functionality it is always better to replace the device rather than repair it. Mobile device problems always result in sending the device to the manufacturer for troubleshooting.

Every time a mobile devices freezes, the owner can reinitialize it by pressing the reset button. What corrective action should be taken? Use a hair dryer to dry the phone. Open the device and replaced damaged components. If the mobile device does not turn on, throw it away and buy a new one. What should the user do to fix this problem?

Buy a new power button and replace it. Disassemble the phone and look for heat related damage. Place the phone in a refrigerated space and allow the unit to cool down. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues?

The software copyright was not obtained before the installation. The correct patches were not installed. Permission was not obtained from the manufacturer. The GPS locator must be enabled. The passcode must be disabled. Sandboxing must be enabled. If the network SSID is not being broadcast, the device will not be able to connect to the network. If a Wi-Fi network is secured with a password, the network must be manually configured on the device.

First generation cellular standards are mostly digital standards. Cellular standards have made it more difficult and expensive to make calls to people that are on a different network. Data on Android devices cannot be synchronized with a PC.

The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use? Heat is applied to the ink reservoir of each nozzle. The vibration of the crystal controls the flow of ink. A charge is applied to the printhead. None of the users can print but all of the users can access the shared resources on the computer to which the printer is locally connected.

What is a possible cause of this? The printer needs a new ribbon. The printer has the wrong paper loaded. The printer spool is full. Copy the printer driver to the System32 folder. Windows will detect the printer and install the needed drivers. Which printer will the computer choose to be the first option for printing? What can be done to solve this problem? Replace the fuser. Replace the drum. Adjust the printer spool. What would be the cause of this problem?

The printer is not configured for duplex printing. The paper is not adequate for photograph printing. The printer is not configured for the proper paper orientation. It is not possible to configure per-document options. Global options take precedence over per-document options. It is not possible to configure global options. It prints faster than other languages do.

It requires less printer memory than other languages require. It allows the page to be rendered in the local workstation. What were you doing when the problem occurred? What recent software or hardware changes have been made to your computer? What error messages were displayed when the problem occurred? Which step of the troubleshooting process is the technician applying?

What is a probable cause of this problem? Which step in the troubleshooting process did the technician just perform? Clean inkjet print heads when they stop working. Replace laser printer toner at set predetermined time intervals. Disconnect the printer from the power source when it is not in use.

Clean the inside of the printer with a vacuum cleaner with a HEPA filter. Wipe the outside of the printer with a damp cloth. Keep the paper dry in a low humidity environment. Which security threat does this phone call represent? Perform daily data backups. Replace any software firewalls with a hardware firewall. Ensure that all operating system and antivirus software is up to date.

Which two actions can help prevent this problem in the future? Configure the Windows Firewall to block the ports that are used by viruses. Repair, delete, or quarantine the infected files. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue? Set the user folder permissions to Deny. Disable the users' accounts. Change the user file permissions to Read Only. What is the recommended procedure to achieve this?

Use data wiping. Drill through the HDD. Immerse the HDD in a weak solution of bicarbonate of soda. How should future expansion be done? When do the assets need protecting? What insurance coverage is required? Port 25 has been defined as the trigger port and port as an open port. What effect does this have on network traffic? Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port All traffic that is sent into port 25 to the internal network will also be allowed to use port Any traffic that comes into port 25 allows outgoing port to be used.

Have you scanned your computer recently for viruses? Did you open any attachments from a suspicious email message? Is your security software up to date? Install rogue antivirus software on the host. Log on to the host as a different user. Disable ActiveX and Silverlight on the host. The computer was compromised by an attacker as a result of the user having a weak password.

Which action should the technician take as a preventive measure against this type of attack happening in the future? Check the computer for the latest OS patches and updates. Scan the computer with protection software. Verify the physical security of all offices. What is the likely cause of this problem? A virus has damaged the boot sector of the system disk.

UAC has been disabled on the computer. Folder permissions have been changed from Deny to Allow. Confront the customer immediately. Shut down the computer until authorities arrive. Remove and destroy the hard drive. What is expected that the technician do with this information?

Send this information to the manager of the customer. Back up the information just in case the customer needs it some day. Document all information in a log file. Send this information to the technician manager. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician.

The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file? Send the file as it is to the level two technician.

Deliver the file in printed format only. This file should not be shared with the level two technician. The technician should adjust the work chair to a height that is high enough so that wrists angle downwards toward the keyboard. If a customer complains about another technician, the technician who is taking the call should agree with opinion of the customer.

If a technician takes a call from a customer the technician does not like, the technician should pass the call to another technician. The technician can take the call of another technician, even without permission to do so. The technician should give better service to a customer for whom the technician feels more sympathy.

The technician should take the easier calls first, regardless of the urgency. Level one technicians usually work on the problems that require opening up the computer case. Level two technicians are often referred to as "incident screeners," and level one technicians are often referred to as "product specialists.

Level two technicians prepare a work order and escalate it to a level one technician if a problem cannot be resolved within ten minutes. Call the level one technician and ask questions about the problem. Document suggestions to solve the problem in the work order and return it to the level one technician. Send the work order to a level three technician and ask for support.

Which two actions can the technician take to establish a good rapport with the customer? Use technical terms to determine the level of knowledge the customer possesses. Personalize the call by periodically asking questions unrelated to the computer problem. Ask only closed-ended questions. Always gather information from the customer and escalate the problem.

Ask personal questions to get better acquainted with the customer. Explain each step to help the customer understand the troubleshooting process. How should the technician handle the call? Politely step in and gain control of the call by asking the customer social questions. Use open-ended questions and repeat all the information back to the customer to politely show that unnecessary information is being given.

Talk over the customer and quickly gather the necessary information to be of help. A couple of computers have operating system errors. Some computers cannot log in to the network. Two users are requesting an application enhancement. A user is requesting a RAM memory upgrade. Reiterate that you want to solve the problem. Follow a step-by-step approach to solving the problem. Apologize for the wait time if there has been no wait time.

I have restarted the computer several times, but this does not seem to help. The MBR is corrupted. The CPU voltage is set too low. The hard drive is beginning to fail. A technician tests the card reader on a Windows 7 computer and does not detect any problems.

What are two possible solutions to the problem with the XP computer? Install additional RAM. Modify the options in the BIOS. Update the CMOS firmware. After connecting the new hardware and powering up the computer, an "OS not found" error message is displayed. What is the most probable cause for that error message?

The power supply is faulty. The motherboard needs replacing to be able to support the new hard drive. The USB port has too many attached devices to supply adequate power.

The BIOS needs updating. When the PC restarts, it is slower than it was before the upgrade. What is the most probable solution to this problem? Replace the HDD with a higher capacity hard drive. Overclock the CPU. Increase the amount of RAM available. What are the two most probable reasons for this problem? There is a conflict with a newly installed device.

The index service is not indexing in the correct locations. What is a possible solution for this problem? Reinstall the operating system. Upgrade the operating system. Research the boot error beep code to identify the source of the error. Which two conditions may be the cause of the problem? The UAC has been turned off. The user has breached the user security policy. The index service is not running.

The CPU needs to be upgraded. Upgrade the processor. Upgrade the video card. Reset the hard drive jumpers. Access the BIOS and change the boot order options. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off.

What is the most likely cause of this problem? The network switch is faulty. The gateway needs to be fixed. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network.

Which two problems might the technician suspect? The DHCP server is faulty. The antenna on the access point is too powerful. The network passwords need to be reissued to the users. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the The DNS server is not operational. The Internet connectiion is down. The gateway address is incorrect. After attaching an external display and verifying that it works, the technician now has a better idea as to the problem.

What could be the problem? The display driver is incorrect. The motherboard has failed. The CPU has failed. What is the final step the technician should take as part of the troubleshooting process?

Ask a list of closed-ended questions. Research the problem. What is a possible cause of this issue? The laser assembly is faulty. The EP drum is damaged. The pickup rollers are defective. The drum is damaged.

The printer does not have enough memory. The toner level in the EP cartridge is low. The power supply on the printer is failing.

There is dirt or debris in the printer. The technician then attempts to ping the laptop from another computer. While the laptop is able to connect to other devices, the ping requests fail. What is the likely cause? The network drivers for the NIC are out of date. The port speed for the NIC is incorrect. TPM must be enabled. The CMOS battery has failed. A RAM module is not fully inserted into the memory slot.

A virus has altered the Windows kernel. What could cause this problem? A virus has damaged the master boot record on the system that is used by the co-worker. The network adapter on the computer that is used by the co-worker is malfunctioning.

The email client belonging to the co-worker is not configured properly. However, the laptop only displays vertical lines that change color. What is the problem? The BIOS is corrupt. The backlight lamp has failed. The LCD screen inverter has failed. What is a probable cause? The laser printer does not have adequate memory. The drum wiper blade is worn. The fuser has failed. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface.

Which two commands can the technician use to repair the corrupt master boot record? What is the most reliable way to prevent print jobs from being added to the queue while the printer is being repaired? Unplug the printer from the print server. Send a network message to all users telling them to stop sending any print jobs to the printer. Send an email to all users telling them to stop sending any print jobs to the printer.

What is a probable cause for this? The workstation requires flash memory. The workstation lacks an available slot. The workstation requires solid state memory. What advice would you give this technician to avoid any injury when transporting the heavy printer to the service area? Bend your back to pick the printer up. Use your arms and back to lift the printer. Avoid bending your knees when lifting the printer.

The customer later discovered that the applications on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files were missing. What should the customer do next? Run convertfat Restart the computer after updating the hard drive to FAT Reset the file attribute to show hidden files. Which tool is best suited for this task? What are two probable causes for this? The printer service is stopped. The paper is old, and moist from humidity.

The paper tray is empty. Which type of attack might the employees be observing? What should the technician do to try to solve this problem?

Enter the hard drive password to unlock the hard drive. Boot the computer from the Vista installation media, select R - Recovery Console and then issue the fixmbr command. The WLAN is a mixture of old and newer What choice for the new device would provide the most interoperability for present and future growth? Add a new Change the file system to FAT The ping command can only receive a response from local workstations. What could be causing the problem?

The NIC driver is out of date. The operating system is not compatible with the remote sites. After installing the replacement parts, the technician tested the printer with a test page and everything worked as expected.

Which would be a possible next step to complete the troubleshooting process? Search for information on how to configure the printer. Roll back the last device driver. Ask the customer to describe the problem.

The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node? What would be a possible solution for this high failure rate? Install a more powerful power supply in each computer.

Install an antistatic mat under each computer. Install each computer in a specialized high airflow case. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? A user requires access to a new printer. The existing security software requires upgrading. The computer is being moved to a different network. The telephone does not comply with the IEEE The DSL modem is incorrectly configured.

Fiber optic cables use light-emitting diodes to cancel noise on the cable. Twisted-pair cabling pairs two positively-charged wires or two negatively-charged wires, which doubles the signal strength and cancels noise. Coaxial cables have a positively-charged end and a negatively-charged end, which cancel each other's magnetic fields. Programmers cannot modify the source code. Android is one example of the iOS mobile operating system.

A royalty must be paid to change the source code. Which architecture and physical topology should the technician use for supporting this access control method? It is an encryption protocol that is used to encrypt data as the data is sent over the VPN. It is an encryption process that uses identical keys on both ends to establish the VPN.

Asymmetric encryption is an encryption process that compares traffic on both ends to make sure the traffic has not been altered. NTDLR reads the registry files. COM is used to detect any installed hardware. EXE program is started. How should the technician give users this functionality? Check the Folder is Ready for Archiving box in the properties of each folder.

Give the users administrator rights on their computers. Grant the users read permissions on all files. Initially the computer was allowed to access a number of programs over the network, but now the developer has found that new programs cannot be accessed. Which firewall setting should the technician apply to allow new programs while also keeping the computer secure? Enable authentication between computers. Block all incoming programs. Turn on Windows Firewall. The technician thinks that the CMOS battery is losing the charge.

What would be the next step in the troubleshooting process? Establish a plan of action to resolve the problem. What should be done first before attempting to repair a hardware component on a laptop? Ask a fellow technician for advice. Remove the keyboard. Backup the BIOS settings. Which two actions will help solve this problem? Configure a hard drive password. Configure antimalware software to run whenever the computer is experiencing heavy usage.

Encrypt the hard drive contents. Which statement describes the rules the trainer should be teaching? Start by asking close-ended questions about what the customer understands of the problem and then direct the customer through the correction process. Next ask questions that assess the knowledge level of the customer. Ask the customer what the problem is and then introduce yourself.

Assess what the customer knows of the support desk process and then use close-ended questions to guide the customer through the correction process. Which action by the technician most likely caused the customer to complain? The technician ended the call without saying 'Have a nice day'. The technician occasionally confirmed an understanding of the problem.

The customer was escalated to a level-two technician. Avoid the corona wire, which can retain a high voltage. Avoid the platen, which can retain a high voltage.

Avoid the fuser unit, which can become hot. Which security technology uses radio communication with a computer before accepting a username and password?

Disconnect the display from the bottom of the laptop. Use thermal compound to attach the memory to the motherboard. Remove the memory module retaining clips from the slots where the new RAM will insert. What should the technician do? Tell the customer that the call will be put on hold for a few minutes. Mute the line to the customer while discussing the issue with the colleague. Interrupt the customer and ask whether the customer would mind going on hold for a few minutes.

Ensure the humidity and temperature levels are set as low as possible. Ensure the number of wireless NICs exceeds the number of wireless phones. Static IP addresses enable large networks to be managed easily. DHCP is not reliable when used with wireless networks. How can the technician make this application run on the PC? Install the application with elevated permissions as administrator. Install the application in safe mode. Use the Windows Compatibility mode.

After the installation, the technician finds that none of the keys on the keyboard are working. Enable the keyboard in the BIOS.

Install new drivers. What rights does the administrator need to remove from the user? After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state? Boot to Start Windows Normally.

Boot to Emergency Recovery State. Boot to Recovery Console. What type of network cable is most likely used to connect the printer? Ask the customer to call again when another technician can provide a solution to the problem. Tell the customer to call the printer manufacturer to fix the problem. Try to fix the problem anyway. The download and upload rates are the same. The upload rate is faster than the download rate.

The user can select the upload and download rates based on need. The LCD screen has failed. The video display driver is corrupt. The laptop battery is bad. The printer has separate cartridges for each color and the user changed the cyan cartridge recently. What is the action that could fix the problem? Use a different type of paper. Purchase a maintenance kit. Check for loose printer cables. LED monitors require the use of an inverter. The inverter converts DC power to AC power. The inverter converts AC power to DC power.

The PC motherboard has a pin ATX socket but the only available replacement power supply is one with a pin connector. Delivery of new power supplies with pin connectors is not expected until the next day, but the user requires the PC to be operational as soon as possible. What can the technician do in these circumstances? The technician can recover the pin connector from the faulty power supply and attach it to the replacement power supply for connection to the motherboard. The technician can use a pin-topin adaptor to connect the power supply to the motherboard.

Power supplies with pin connectors are not compatible with motherboards with pin sockets, so the technician can do nothing until the new power supplies arrive. The user has a limited budget and is prepared to forego performance to implement this system. Which RAID system would meet these requirements? What command should be issued to check the IP address of the device? USB 3. Which additional component is necessary to complete the RAID installation?

The system has a high end graphics card, liquid cooling, and a 7, rpm EIDE drive. What can the user do to improve system performance? Add two more case fans. Replace the liquid cooling system with a high speed ball bearing fan cooling system. Change the voltage setting for the RAM.

Which two connector types would have to exist on the power supply unit to power on all these devices? Which display type would best meet these requirements? The cable used exceeds the maximum length that allows USB 3. The USB 3. The device was connected to a USB 1. What are these keys called? Which three pieces of information should be immediately documented? What will the technician do to achieve this? Install a second printer. Use a software print server. Use a computer-shared printer. Which two approaches should the technician take in dealing with the customer?

Immediately transfer the customer to a higher level technician. Ask socially related questions to direct the customer away from the problem. Reply to the customer with the same level of anger. Give it back to the customer. Refill it. Throw it away. Use a moistened cotton swab to remove excess dust. Use a lint-free cloth sprayed with a cleaning solution to remove excess dust.

Ignore the dust, as it does not affect the computer. Which two components would the technician use? Make a copy of all the pirated content and send it to the law enforcement authorities. Remove the pirated content and document all work done.

Advise the user that downloading pirated content is illegal and that the user should refrain from doing so. Only the power supply manufacturer can open the casing of a power supply. Power supplies must always be replaced, not repaired. Power supplies are very fragile, expensive, and easy to damage. Which RAID configuration would the technician use?

What would be the result of attempting to install a DDR module in a computer that already has a DDR module installed? The module will not fit. It will be necessary to configure the BIOS to recognize the different memory speeds. The computer will not boot. Explore Audiobooks. Bestsellers Editors' Picks All audiobooks. Explore Magazines. Editors' Picks All magazines. Explore Podcasts All podcasts. Difficulty Beginner Intermediate Advanced.

Explore Documents. Uploaded by Fernan Globen Talonding. Document Information click to expand document information Description: essential it lessons. Did you find this document useful? Is this content inappropriate? Report this Document. Description: essential it lessons. Flag for inappropriate content. Download now. Related titles. Carousel Previous Carousel Next. Astrology for Wealth and Prosperity by Ajatt Oberoi 1. Jump to Page. Search inside document. Zarnigar Altaf. Jimmy Alfaro Hernandez.

Anonymous I5c99xSp9H. Jym Genson. Anonymous yy8In96j0r. KP Ganesh. Ajatt Oberoi. Shourya Rathod. Nuer-alst Kleiflehx. Mateja Rak. Jithin Reddy N. Heng Kimsan. Mike Vloj. Sri Kay. More From Fernan Globen Talonding.

Fernan Globen Talonding. Rommel Lim. Popular in Cisco Systems. Dmitrii Daniliuk.



0コメント

  • 1000 / 1000