Cisco it essentials pc hardware and software exam

cisco it essentials pc hardware and software exam

Chapter 2. PC Assembly. Install components to build, repair, or upgrade personal computers. Chapter 3. Advanced Computer Hardware. Install and configure. Cisco ITE latest or IT Essentials v Final Exam Answers All in One PC hardware and software (ITE Version ) collection year Learn how to apply skills and procedures to install, configure, and troubleshoot computers, mobile devices, and software. By Cisco Networking Academy. The. WINSCP IPHONE WITHOUT JAILBREAK Сообщаю Для вас, что.

The System Restore tool is a Windows tool for allowing an administrator to roll back the operating system to a previous configuration. A new technician has joined the IT team and is about to service a heavy printer.

Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? Choose two. Avoid lifting the equipment using the strength in your back. Lift the equipment using the strength in your legs and knees. Avoid bending your knees when lifting the printer. Bend your back to pick the printer up. Avoid lifting the printer close to your body. When lifting heavy objects, avoiding bending or using the strength of the back, keeping heavy weights close to the body when carrying them, and using the strength of the legs and knee to lift something, all contribute to avoid injury.

What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss? An uninterruptible power supply or UPS contains a battery backup that provides consistent power through brownouts and blackouts until the battery power is emptied. Many UPS systems can safely shut down a computer prior to the loss of battery power. Which measure can help control RFI effects on wireless networks? Ensure the humidity and temperature levels are set as low as possible.

Ensure the number of wireless NICs exceeds the number of wireless phones. Ensure the wireless network is on a different frequency than the offending source. A wireless network IEEE What can be tested with a digital multimeter? A digital multimeter can test the integrity of circuits and the quality of electricity in computer components. When should a technician avoid wearing an antistatic wrist strap?

A power supply unit or CRT monitor are both able to retain large amounts of power after being turned off. These types of devices are too dangerous to connect an antistatic wrist strap to. Antistatic wrist straps are commonly worn when upgrading RAM or replacing a hard drive.

Refer to the exhibit. As part of the process of building a computer, what is the proper order of the first three steps in the installation of a power supply? Device tracking relies on GPS function. Turning off the GPS when not in use and disabling or removing apps that use the GPS function may prevent a device from being tracked.

What is a characteristic of a computer power connector? A Molex power connector supplies power to a motherboard. An ATX main power connector supplies power to a video adapter. An ATX main power connector provides the motherboard with power from the power supply. When the computer encounters errors on startup, an error code is displayed on the card. Graphics cards and USB expansion cards do not have this ability.

BIOS is found on a chip on the motherboard. The computer boot sequence and support for virtualization can configured from within BIOS. The computer operating system typically allocates memory to applications and enables device drivers. POST is typically not configurable. What factor should be taken into consideration more with laptops than with desktops? Laptops are designed to be mobile and will most likely be used in situations that lack both environmental control and air filtration.

Desktop computers are designed to be permanent workstations and are more likely to be used in controlled environments. Choose three. Preventive maintenance can reduce the need for future repairs, but cannot eliminate them entirely. Preventive maintenance does not affect a technician making repairs. Preventive maintenance has no effect on RAM access time. The remaining options are all benefits of performing preventive maintenance. Which step in the troubleshooting process is important to help avoid repeating repair processes that were performed previously?

The technician checks the computer BIOS to see if there might be a configuration problem that is causing the computer to behave consistently in this manner. While the technician is reviewing the information, the computer once again freezes. What is the probable cause of the computer problem? The BIOS is corrupt. The hard drive is failing. The CPU fan is not functioning. The CMOS battery has failed.

A problem with the CPU or overheating can cause the computer to freeze. Why is a full format more beneficial than a quick format when preparing for a clean OS installation? A full format is the only method of installing Windows 8. A full format will delete files from the disk while analyzing the disk drive for errors. A full format will delete every partition on the hard drive. A full format removes files from a partition while scanning the disk for bad sectors.

A quick format will remove files from a partition but does not scan a disk for bad sectors. What is the default file system used during a fresh installation of Windows 7? What is the first step an administrator should take when splitting a single partition into multiple partitions? Format the partition. Assign a drive letter to the partition.

Extend the partition. Shrink the partition. The first step in the process of splitting a partition is to use the shrink volume feature of the Disk Manager utility. Afterwards, the new partition must be formatted and assigned a drive letter. A user notices that some of the programs that are installed before upgrading Windows to a new version no longer function properly after the upgrade. What can the user do to fix this problem? Use the System Restore utility.

Update the driver for the graphics card. Run the programs in Compatibility Mode. Use the recovery partition to reinstall Windows. Compatibility mode allows an application designed for an earlier version of Windows to operate in later versions.

Right-click on the command that starts an application and select Properties to access compatibility mode. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application? This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.

A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems? After a Windows operating system has been installed, which program would a technician use to select the programs that will run at startup? Msconfig is a system utility that can be used to performs diagnostic procedures on the Windows startup files.

Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure? A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.

A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? The total cost of the new solution is considerably lower.

Data is more secure in the event of hardware failures. Individual users are in control of their own computers and network resources. Data resources and access are centrally controlled. Personnel costs are lower because a dedicated network administrator is no longer necessary. Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources.

The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem? What would be the correct path for mapping the network drive? Note that the path statement is not case sensitive. A customer who travels frequently wants to know which technology is the most suitable for being connected to the corporate network at all times at low cost.

Which network technology would a network administrator recommend? Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff.

A user complains about being unable to connect to the wireless network. Which two actions should be part of troubleshooting the wireless connection? Verify that the laptop is plugged into an electrical outlet. Reinsert the laptop battery. Try moving the laptop to different places to see if a signal can be detected. Verify in the laptop software whether any wireless networks are detected. Also check if the computer has a button that enables wireless connectivity.

A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem? The NIC driver is out of date. The operating system is not compatible with the remote sites. The default gateway is not set. In order to access remote networks, a host IP configuration must include the address of the device that will be used to access the Internet or other networks.

Pings to remote networks will fail if the default gateway is incorrect. Because the user can access local hosts, there are no problems with the NIC or operating system. An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt.

The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? A technician needs to configure a Bluetooth headset for a laptop user.

Which two steps should the technician take before installing the headset? Remove the battery. Disconnect AC power. Ensure that the antistatic wrist strap is attached to a nonpainted portion of the laptop. Ensure that the laptop Bluetooth switch is enabled. When attaching any wireless device to a laptop, power does not have to be removed either AC or the DC battery. Also, you do not have to worry about ESD when installing a wireless device. What laptop component converts DC power to AC so that the display can illuminate?

Which closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on? Can the laptop operate using the AC adapter? Have you changed your password recently?

What software has been installed recently? What were you doing when the problem occurred? Open-ended questions help the technician to identify the issue by allowing the customer to elaborate on the issue. Closed-ended questions are used to narrow the focus of the problem. Closed-ended questions commonly have definite answers such as yes, no, a date, a time, or other specifics.

A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are two possible causes of this distortion? Power to the pixels has been removed. The display settings have been changed. The GPU is not cooling correctly. The LCD cutoff switch is damaged. The display is not correctly installed. When flashing lines are appearing on a laptop screen, the most common problems are an overheating GPU, faulty GPU, or a display that is not connected properly.

When the power to the pixels has been cut off, pixels on the screen will appear dead. If the images on a laptop screen are distorted, a technician should verify that the display settings have not been modified. What is a possible cause? The user has downloaded a virus. The widget is corrupt. The security settings of the Android OS have been compromised.

The widget is associated with the app and this is the normal behavior. Widgets are programs that when installed associate with the application they were built for. This will cause the application to launch when the widget icon is touched on the touchscreen of the Android device. Which component uses the greatest amount of power on most mobile devices? The LCD screen consumes the most power on most mobile devices.

What is the purpose of using the MIME email protocol on mobile devices? The MIME email protocol allows pictures and documents to be included in email messages. What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced? Because a swelling battery is physically hazardous, it should immediately be replaced with a new one from the manufacturer.

A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? Inkjet printers are less expensive as an initial purchase than laser printers. A laser printer is significantly slower than an inkjet printer. Both laser and inkjet printers produce poor quality images. The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper. For cleaning a laser printer, what should be used to pick up excess particles of toner? The toner used in a laser printer consists of microscopic particles. What characterizes a DDoS attack? Many hosts participate in a coordinated attack. Infected computers are called daemons.

It is easy to identify the source of the attack. All hosts must be in the same geographic area. Which two password control policies should an organization implement to ensure strong passwords? Passwords should be set to expire every 60 days. Passwords should contain no more than eight characters. Passwords must contain encrypted characters.

Passwords should contain letters and numbers. Passwords should contain only capital letters. A computer technician has been asked to secure all Windows 7 computers by encrypting all the data on each computer. Which Windows feature should be used to provide this level of encryption? BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume.

Encrypting File System EFS is a Windows feature that can be used to encrypt files and folders linked to a specific user account. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data.

The activity of a previously unknown program triggers an alert by Windows firewall. What three options will the user have for dealing with this event? If a program is blocked by Windows firewall, the user will be presented with three options for dealing with this event: Keep blocking, Unblock, or Ask me later. A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC?

Log in as a different user. Disconnect the computer from the network. Search helpdesk repair logs for more information. Discuss solutions with the customer. Ask the customer open-ended questions about the problem. Several actions can be taken by a technician when security issues are suspected as the possible cause of a problem with a computer. Logging in as a different user or disconnecting the PC from the network to isolate the cause of the problem are two possible actions.

A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?

Explain that the original technician is no good and the supervisor will be told. Suggest that the customer purchase a new computer. Confirm the issues and give detailed instructions to solve the problem. When dealing with customers, a technician must show professionalism in all aspects. When explaining the solution to solve the problem, a technician should provide a simple step-by-step process of instructions.

The technician should speak in plain terms and avoid the industry jargon. What expectation is defined in the service level agreement between an organization and service vendor? The service level agreement, or SLA, is a legal agreement between an organization and a service vendor. The agreement is a binding contract that spells out service expectations of the service vendor. The SLA typically contains response time guarantees, part availability, and time of service availability.

In which circumstance should a level one technician initiate an escalated work order? The primary responsibility of a level one technician is to gather information from the customer. The level one technician needs to accurately enter all the information into the work order. When the problems are very simple to resolve, a level one technician can take care of these without escalating the work order.

However, when a problem requires the expertise of a level two technician, the level one technician initiates an escalated work order so that a level two technician will be involved to solve the problem. An application appears frozen and is not responding to a mouse or the keyboard.

What Windows OS tool can be used to stop the application? In Task Manager, the application or process that is not responding can be identified and closed. Device Manager is used to manage devices and their drivers. Disk Management is used to manage the partition and file systems of storage devices.

Event Viewer is used to review the alerts and notifications sent from the system. Which two issues are likely to cause BSOD errors? Device driver errors are the most likely cause of BSOD errors. Software issues such as browsers and antivirus do not produce BSOD errors.

A power supply failure would prevent the machine from starting. Which two key pieces of information should the user ensure are configured correctly on the FTP client? Without the correct connection information for the FTP server, file transfer services cannot occur. A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system.

How should the technician give users this functionality? Grant the users read permissions on all files. Give the users administrator rights on their computers. Make the users members of a group called Backup Operators. Check the Folder is Ready for Archiving box in the properties of each folder. It is better to grant permissions at group level than individual permissions. This way any member of a group would have the respective permissions to carry out the permitted tasks and allows for a tighter control of what the group members can do in a given environment.

It also makes it easier to administer the environment. What could cause this problem? Encrypted files cannot be transferred across a network. The network proxy decrypted the data to scan it for malware. The sensitive data was transferred with the FTP protocol. When encrypted files are transferred to a new computer that is not using an NTFS formatted hard drive, the files will no longer be encrypted.

Match the facility access control devices to the correct descriptions. Not all options are used. A biometric identification device is an input device that can identify a user based on a unique physical feature such as a fingerprint or voice. A digitizer is used with a stylus pen to design and create images or blueprints.

A scanner is used to digitize an image or document. A KVM switch can connect multiple computers to one keyboard, monitor, and mouse. What type of external storage should be used by a technician to back up over 2 TB of music and video data files? CompactFlash card external flash drive external hard drive Secure Digital card Explanation:. An external hard drive will provide for the largest amount of data storage for backing up the music and video data files.

CompactFlash and Secure Digital card technology does not support as much data storage as an external hard drive. A USB flash drive does not hold as much data storage as an external hard drive. What is the purpose of a Safety Data Sheet? A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements.

The SDS explains how to dispose of potentially hazardous materials in the safest manner. Which solution should be used to clean a CPU and a heat sink? Isopropyl alcohol should be used to clean the surface of a heat sink and CPU. All the other solutions contain impurities which may damage the CPU. A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated? The computer automatically boots into Safe Mode and displays a warning on the screen.

The screen flashes with a red background and displays a warning message. The computer emits a pattern of beeps indicating the failing device. Which three features can be configured in the BIOS settings to secure a computer? What is the most important reason for a company to ensure that computer preventive maintenance is done?

Preventive maintenance provides an opportunity for junior technicians to obtain more experience in a non-threatening or problem environment. Preventive maintenance helps to protect the computer equipment against future problems. Preventive maintenance allows the IT department to regularly monitor the contents of user hard drives to ensure computer use policies are being followed. Preventive maintenance enables the IT manager to check on the location and state of the computer assets.

Preventive maintenance includes tasks such as cleaning the device, which can prolong the life of the device. A technician opens up a PC to work on it, and finds that it is very dusty inside. What should the technician do? Ignore the dust, as it does not affect the computer.

Use a lint-free cloth sprayed with a cleaning solution to remove excess dust. Use a can of compressed air to remove excess dust. Use a moistened cotton swab to remove excess dust. Choose three. If there is not a current backup of the data and the technician is not able to create one, then a liability release form signed by the customer should contain the following information: Permission to work on the computer without a current backup available Release from liability if data is lost or corrupted Description of the work to be performed What should a technician do before beginning any troubleshooting steps on a customer computer?

Perform a data backup. Document the findings. Identify the problem. Establish a plan of action. Because a technician could be held liable for any data loss as a result of working on a customer computer, a backup should be performed before beginning any troubleshooting.

After consulting the manufacturer manuals, a technician applies a series of recommended solutions that resolve a problem with a workstation computer. What is the next step in the troubleshooting process that the technician should perform? Verify the solution and confirm full system functionality. Test the theory of probable cause. Determine the next steps to resolve the problem. After the recommended solutions have been applied to resolve the problem, full system functionality should be verified and preventive measures implemented if applicable.

This would be followed by documenting the solution and actions. Determining the next steps to resolve the problem and testing the theory of probable cause have already been completed in this scenario. A customer asks for a solution to a printer problem that is beyond the knowledge level of the technician.

What should the technician do? Try to fix the problem anyway. Tell the customer to call the printer manufacturer to fix the problem. Ask the customer to call again when another technician can provide a solution to the problem. Trying to fix a problem that is beyond the knowledge level of the technician may create additional problems.

A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented? Everything that was done to solve a problem should be documented, including failed attempts and the eventual solution.

A description of the problem would have been previously documented. A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved.

Which step, if any, is next? No further action is needed. Establish a plan of action to resolve the problem and implement the solution. Verify full system functionality and, if applicable, implement preventive measures. Test the theory to determine the cause. No technical job is finished until the documentation is complete.

My name is Greg. How may I help you today? Which troubleshooting step is being used at this point? Implement a solution. What is the purpose of documenting the information that is obtained from the customer in the work order? It is always important to document the information that is obtained from the customer in the work order and repair journal. This information can assist in solving the problem. The information can also be useful if another technician is assigned to the case or for future problems.

What is the next step after a possible solution is implemented during a troubleshooting process? Test another possible solution. Identify other possible causes for the problem. Document the cause and the solution for the problem. Verify the full system functionality and apply maintenance procedures.

After the repairs have been completed, continue the troubleshooting process by verifying full system functionality and implementing any needed preventive measures. An employee reports that the output of a workstation display is distorted. The technician checks the manufacturer website and downloads the latest version of the video driver. After the video driver is installed, what should the technician do next?

Schedule the next system checkup with the employee. Log the previous and current version numbers of the video driver. Move the display card to another slot to see if the video performs better. Open a video editing application to verify the video performance. After the repairs have been completed, continue the troubleshooting process by verifying full system functionality.

Which two types of data should be backed up before troubleshooting a computer for a customer? Choose two. BIOS system file driver files for the hard disk Internet Explorer favorites files Windows operating system files documents that are created by the customer Explanation:. Only customer created data is necessary for backup as a precaution to the troubleshooting process. In which step of the troubleshooting process would a technician have to do more research on the Internet or within the computer manual in order to solve a problem?

Document findings, actions, and outcomes. Once the cause of the problem is determined, a technician should research possible solutions, sometimes by visiting various web sites and consulting with manuals. What are three benefits of computer preventive maintenance? Preventive maintenance can reduce the need for future repairs, but cannot eliminate them entirely.

Preventive maintenance does not affect a technician making repairs. Preventive maintenance has no effect on RAM access time. The remaining options are all benefits of performing preventive maintenance. What is the best way to determine if a CPU fan is spinning properly?

Spin the blades of the fan quickly with a finger. Spray compressed air on the fan to make the blades spin. Visually inspect the fan when the power is on to ensure it is spinning. Listen for the sound of the fan spinning when the power is on. Spinning the fan blades with the power off, especially by using compressed air, can damage the fan. The best way to ensure the fan is working is to visually inspect it with the power on.

A technician is performing hardware maintenance of PCs at a construction site. What task should the technician perform as part of a preventive maintenance plan? Remove dust from intake fans. Back up the data, reformat the hard drive, and reinstall the data. Develop and install forensic tracking software. Perform an audit of all software that is installed.

Construction sites are normally very dusty environments. The accumulation of dust in a PC can lead to failure of various components. There is a high risk of overheating due to cooling fans failing because of excessive dust buildup. The technician should ensure that all dust is removed from the intake fans as part of the maintenance process. What is a primary benefit of preventive maintenance on a PC? It extends the life of the components.

It enhances the troubleshooting processes.

Cisco it essentials pc hardware and software exam anydesk for linux download

Last Updated on January 20, by Admin.

How much does teamviewer license cost 95
Cisco it essentials pc hardware and software exam Ultravnc sc creator tool download
Virl cisco ios isr software Visually inspect the fan when the power is on to ensure it is spinning. Explanation: It is always important to document the information that is obtained from the customer in the work order and repair journal. Inform the customer of the need to call back later. Explanation: During the troubleshooting, when the technician listens and understands the computer problems from the customer, some more questions may need to be asked to gather further information. Explanation: When lifting heavy objects, avoiding bending or using the strength of the back, keeping heavy weights close to the body when carrying them, and using the strength of the legs and knee to lift something, all contribute to avoid injury. Touchpads, fingerprint readers, and web cameras are common devices on modern laptops. Explanation: Typical causes of a computer operating system not being found are as follows: The partition is not set as active.
Fortinet fortimail 400cm After a Windows operating system has been installed, which program would a technician use to select the programs that will run at startup? In order to access remote networks, a host IP configuration must include the address of the device that will be used to access the Internet or other networks. The computer emits a pattern of beeps indicating the failing device. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Determining the next steps to resolve the problem and testing the theory of probable cause have already been completed in this scenario.
Splashtop streamer app Explain that the original technician is no good and the supervisor will be told. Explanation: The TPM module stores information specific to a host system, such as encryption keys, digital certificates, and passwords. Ensure that the operating system software and applications contain the latest updates. What is the best administrative tool to force the release of system resources from the unresponsive application? Explanation: After the repairs have been completed, continue the troubleshooting process by verifying full system functionality.
Cisco it essentials pc hardware and software exam Import json to mysql workbench
Cisco it essentials pc hardware and software exam 18
Splashtop protocol Uninstall ultravnc server
cisco it essentials pc hardware and software exam

Apologise, but execute sql script in mysql workbench reserve

USING WINSCP TO OVERWRITE PERMISSION DENIED

Сообщаю Для вас, что.

Step 5. Verify full system functionality and, if applicable, implement preventive measures. Step 6. Document findings, actions, and outcomes. Hold the fan blades in place when you clean the inside of the computer with compressed air to prevent over-spinning the rotor or moving the fan in the wrong direction. Spinning the fan blades with the power off, especially by using compressed air, can damage the fan.

The best way to ensure the fan is working is to visually inspect it with the power on. A failing power supply could also cause a computer to reboot unexpectedly. If the power cord does not attach properly, then it is likely that the wrong type of power cord is being used. Each light on the front of the case is powered by the motherboard through a cable that attaches somewhere on the board.

If this cable comes loose, a particular light on the front of the case will not work. After the repairs have been completed, continue the troubleshooting process by verifying full system functionality. Once all repairs have been made, the last step of the troubleshooting process is to verify to the customer the problem and the solutions and demonstrate how the solution corrected the problem. Once the cause of the problem is determined, a technician should research possible solutions, sometimes by visiting various web sites and consulting with manuals.

A burning electronics smell is often detected when a power supply is overloaded and damaged. A technician should seek to determine the exact cause of a computer problem by testing theories of probable cause one at a time, beginning with the quickest and easiest to eliminate. Posted on October 12, by Admin. Recommend IT Essentials v7. Always perform a backup before beginning any troubleshooting.

To remove dust inside a computer, use a can of compressed air. IT Essentials v7. Final Exam Answers Ch 1 - 9. Final Exam Answers Ch 10 - Final Exam Composite Answers Ch 1 - IT Essentials 7. Chapter 4 Exam Answers. Chapter 4 Quiz Answers. Chapter 5 Exam Answers. Chapter 5 Quiz Answers. Checkpoint Exam Answers 1 - Chapters Explanation: Preventive maintenance helps reduce software and hardware problems by preventing undue wear on components, thereby extending the life of the components.

A customer needs additional storage space on an older computer. What will the technician look at in the computer to determine if an additional hard drive can be added? PATA supports two devices per cable. PATA cables sometimes have only one device connector. A new PATA cable could be purchased that had two device connectors. Which component controls the communications and interactions between the CPU and other components on the motherboard?

The chipset controls communication between the CPU and other computer components. It is used in conjunction with a dedicated GPU. It processes massive amounts of data at the fastest speeds. It is used for main memory. It has a low power consumption and is used for cache memory.

Hard drives in a grocery warehouse keep failing because of vibrations in the warehouse environment. What would be a possible solution for this high failure rate? Install an SSD drive in each computer. Install a more powerful power supply in each computer.

Install an antistatic mat under each computer. Install each computer in a specialized high airflow case. SSD drives are an outstanding choice in extreme temperatures, in unusual environments, and in an environment where there are vibrations. Refer to the exhibit. Which two port types are shown in the graphic? ITE v7. The port on the left is the USB port. The port on the right is the network port.

From which type of data storage does the CPU load information for processing during normal operation? ROM is read-only memory. Its content will not be altered by the CPU during normal operation. Both the hard drive and an SSD are data storage devices. Which type of adapter is shown? The card that is shown in the exhibit is a network interface adapter with an RJ port which is used to connect the computer to a network via a network cable.

Which type of device would be used on a laptop to verify the identity of a user? As biometric identification devices, laptops commonly use a fingerprint scanner or, for facial recognition, a camera. Which two devices are considered input devices?

Biometric authentication devices and digital cameras are considered input devices. Speakers, projectors, and printers are all considered as output devices. What is an active cooling solution for a PC? Reduce the speed of the CPU. Add a heatsink to the CPU. Add an additional case fan. Use a painted computer case. Active cooling solutions require power like adding a case fan while passive cooling solutions do not.

Which tool can protect computer components from the effects of ESD? An antistatic wrist strap equalizes the electrical charge between the technician and the equipment and protects the equipment from electrostatic discharge. Which type of interface was originally developed for high-definition televisions and is also popular to use with computers to connect audio and video devices? High definition multimedia interface, or HDMI, was originally a television standard.

However, because it has many digital features, it is also a popular interface to connect audio and video devices to computers. It has the highest power consumption. It is used for cache memory. It has a connector with pins. SRAM is used for cache memory. It takes a small, but constant source of power to function. A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers?

Skip to content. Recommend IT Essentials v7. Notify of. Newest Oldest Most Voted. Inline Feedbacks.

Cisco it essentials pc hardware and software exam citrix goto

Digital Talent Scholarship 2020 -IT Essentials, Final Exam - Composite (Chapters 1-14)

Следующая статья call recording software for cisco call manager price

Другие материалы по теме

  • Citrix receiver you need additional software to use this app
  • Scom citrix management pack
  • Ultravnc options
  • Uninstall manageengine passwordmanager pro
  • 2 комментариев к “Cisco it essentials pc hardware and software exam”

    1. Akit :

      meraki vnc server port

    2. Kami :

      mysql workbench overheat mac


    Оставить отзыв